Skip to main content

Hi folks, 

We just published a report examining the most commonly exposed types of assets belonging to the Internet of Healthcare Things (IoHT) 🏥 in Censys data.

Ransomware and data breaches in healthcare continue to rise, and effective exposure management in this sector is more critical than ever. Healthcare organizations often have sprawling, decentralized infrastructure and under-resourced IT departments, which create significant challenges.

We examined the global external attack surface of publicly accessible medical devices and IoHT applications and found legacy protocols, unauthenticated medical image databases, and data platforms with histories of exploited vulnerabilities.

You can read the full report here: https://censys.com/state-of-internet-of-healthcare-things/
 

Be the first to reply!

Reply