Healthcare Orgs, Take Control of Your Network! Level Up Cyber Hygiene with Diligent Vendor Vetting and Software Segmentation

Spacelabs Healthcare Banner Ad

 

The digital transformation of healthcare organizations has significantly increased reliance on software and medtech devices, weaving a complex web of interdependencies in their supply chains. This shift raises critical vulnerabilities as highlighted by infamous incidents like the SolarWinds breach, underscoring the urgency for enhanced cyber hygiene practices. With recent executive orders pushing for better security protocols, healthcare organizations are under pressure to fortify their supply chains against escalating cyber threats.

What strategies can healthcare organizations employ to effectively manage the cyber hygiene of their healthcare supply chain, including software and medtech devices?

Robin Berthier, CEO and founder of Network Perception, advocates for rigorous cyber hygiene practices within healthcare supply chains on a recent episode of Expert’s Talk. He emphasizes the necessity of standard vendor questionnaires and robust security protocols and underscores the importance of continuous vendor risk assessments and software segmentation to effectively mitigate potential cyber threats, drawing lessons from major breaches like SolarWinds.

Key takeaways:

  1. Develop Standard Questionnaires for Vendors: Establishing standard questionnaires for all vendors can help assess the risks introduced by third parties and ensure they adhere to secure coding best practices.
  2. Vet Vendor Security Practices: It’s crucial to scrutinize the security practices surrounding the build environments of vendors to prevent incidents similar to the SolarWinds breach, where malware was inserted directly into the source code.
  3. Implement Software Segmentation: By applying segmentation to software, organizations can contain potential breaches within manageable risk levels, thereby minimizing widespread impact.
  4. Regular Patching and Updates: Ensuring that all software and devices within the supply chain are regularly updated and patched can significantly reduce vulnerabilities.
  5. Continuous Risk Assessment: Continual evaluation of the risks posed by vendors and their products is essential to adapting and strengthening cybersecurity measures over time.

Article written by Sonia Gossai

Follow us on social media for the latest updates in B2B!

Image

Latest

cities
Craftsmanship and the Soul of Cities with Top Real Estate Developer Mike Ablon
February 2, 2026

More than half the world already lives in cities—and the UN projects that share will rise to 68% by 2050, adding roughly 2.5 billion more people to urban areas. At the same time, the “experience economy” has reshaped what people value in places: not just what a city has, but how it feels to…

Read More
client engagement
When Client Engagement Becomes True Partnership
February 1, 2026

CG Infinity’s Salesforce Practice is built on deep, day-to-day engagement with the organizations it serves. Rather than operating as an external vendor, the team embeds itself with clients—working closely, consistently, and collaboratively—so decisions are informed by real context, trust, and shared accountability. This approach ensures Salesforce solutions are shaped not just by requirements, but by…

Read More
CG Infinity
How CG Infinity Brings Cross-Functional Teams Together to Deliver High-Impact Outcomes
February 1, 2026

CG Infinity’s Salesforce Practice is built around helping organizations move forward together, especially when initiatives span multiple teams with different priorities. The focus is on alignment—bringing the right stakeholders into the conversation early and ensuring decisions are made collaboratively so solutions serve the whole organization, not just one function. That capability is reflected in a…

Read More
Salesforce
When Building Beats Buying: A Smarter Approach to Salesforce Decisions at CG Infinity
February 1, 2026

Salesforce offers a broad ecosystem of tools and integrations, giving organizations flexibility but also introducing constant decisions about when to buy, build, or customize. The strongest strategies apply discipline to those choices, ensuring specific requirements are met without adding unnecessary cost or complexity. That balance is a hallmark of how Mike Reeves, Vice President…

Read More