{"id":9285,"date":"2020-07-20T13:43:13","date_gmt":"2020-07-20T18:43:13","guid":{"rendered":"https:\/\/sterling.com\/?p=9285"},"modified":"2020-07-20T13:43:13","modified_gmt":"2020-07-20T18:43:13","slug":"securing-healthcare-supply-chain","status":"publish","type":"post","link":"https:\/\/sterling.com\/stargazer\/?p=9285","title":{"rendered":"Securing the Healthcare Supply Chain"},"content":{"rendered":"<p><b><span data-contrast=\"auto\">Who is attacking the healthcare industry?\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Advancement<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">\u00a0in technology ha<\/span><span data-contrast=\"auto\">ve<\/span><span data-contrast=\"auto\">\u00a0offered healthcare\u00a0<\/span><span data-contrast=\"auto\">an opportunity to save lives and operate efficiently.\u00a0<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">T<\/span><span data-contrast=\"auto\">his technology\u00a0<\/span><span data-contrast=\"auto\">has<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">create<\/span><span data-contrast=\"auto\">d<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">vulnerabilities<\/span><span data-contrast=\"auto\"> to threats<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">that\u00a0<\/span><span data-contrast=\"auto\">infiltrate, steal<\/span><span data-contrast=\"auto\">,<\/span><span data-contrast=\"auto\">\u00a0or hijack networks<\/span><span data-contrast=\"auto\">\u00a0of confidential data<\/span><span data-contrast=\"auto\">\u00a0and systems<\/span><span data-contrast=\"auto\">.\u00a0\u00a0<\/span><span data-contrast=\"auto\">Whatever the reason for the threat, hospitals<\/span><span data-contrast=\"auto\">\u00a0and medical facilities are targeted\u00a0<\/span><span data-contrast=\"auto\">using\u00a0<\/span><span data-contrast=\"auto\">a\u00a0<\/span><span data-contrast=\"auto\">differe<\/span><span data-contrast=\"auto\">nt variety of methods.\u00a0 Ransomware,\u00a0<\/span><span data-contrast=\"auto\">phishing, and\u00a0<\/span><span data-contrast=\"auto\">other nefarious software\u00a0<\/span><span data-contrast=\"auto\">loaded into medical equipment,\u00a0<\/span><span data-contrast=\"auto\">infiltrate networks that could potentially compromise patient\u00a0<\/span><span data-contrast=\"auto\">data\u00a0<\/span><span data-contrast=\"auto\">or hospital\u00a0<\/span><span data-contrast=\"auto\">infrastructure<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">N<\/span><span data-contrast=\"auto\">ation-states have\u00a0<\/span><span data-contrast=\"auto\">used these opportunities to<\/span><span data-contrast=\"auto\">\u00a0gather intelligence using software espionage tools and customized malware in social engineering attacks<\/span><span data-contrast=\"auto\">\u00a0to\u00a0<\/span><span data-contrast=\"auto\">steal intellectual property or gain competitive advantage.\u00a0<\/span><span data-contrast=\"auto\">For instance, the second<\/span><span data-contrast=\"auto\">&#8211;<\/span><span data-contrast=\"auto\">largest healthcare insurance provider in the\u00a0<\/span><a href=\"https:\/\/www.forbes.com\/sites\/danmunro\/2014\/12\/21\/the-top-u-s-healthcare-story-for-2014-cybersecurity\/#6430ac284b76\"><span data-contrast=\"none\">United States was affected by a foreign government attack in this way in 2014<\/span><\/a><span data-contrast=\"none\">.<\/span><span data-contrast=\"auto\">\u00a0C<\/span><span data-contrast=\"auto\">yberterrorists, meanwhile, launch disruptive or destructive cyberattacks to cause physical destruction of property, loss of life and spread terror. Hacktivists are internet activists who attack cyber assets to draw attention to their political causes and tend to choose highly visible or high-profile targets.\u00a0<\/span><span data-contrast=\"auto\">\u00a0More recently,\u00a0<\/span><span data-contrast=\"auto\">Cybersecurity Ventures predicts that the healthcare industry will spend more than $65B cumulatively on cybersecurity products and services over the five<\/span><span data-contrast=\"auto\">\u00a0years<\/span><span data-contrast=\"auto\">\u00a0from 2017 to 2021 as published in the\u00a0<\/span><a href=\"https:\/\/www.herjavecgroup.com\/wp-content\/uploads\/2019\/12\/Healthcare-Cybersecurity-Report-2020.pdf\"><span data-contrast=\"none\">2020\u00a0<\/span><span data-contrast=\"none\">Healthcare<\/span><span data-contrast=\"none\">\u00a0Cybersecurity Report.<\/span><\/a><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Another category of possible attackers is the insider threat.\u00a0<\/span><span data-contrast=\"auto\">I<\/span><span data-contrast=\"auto\">nsider threats may be borne out of negligence, like opening a phishing email by mistake. Data privacy Patient and employee\u00a0<\/span><span data-contrast=\"auto\">Personally Identifiable\u00a0<\/span><span data-contrast=\"auto\">Information<\/span><span data-contrast=\"auto\">\u00a0(<\/span><span data-contrast=\"auto\">PII<\/span><span data-contrast=\"auto\">)<\/span><span data-contrast=\"auto\">, which includes patient diagnosis and treatment data, insurance and financial information<\/span><span data-contrast=\"auto\">,\u00a0<\/span><span data-contrast=\"auto\">research and drug trial data, payroll,\u00a0<\/span><span data-contrast=\"auto\">and\u00a0<\/span><span data-contrast=\"auto\">intellectual property\u00a0<\/span><span data-contrast=\"auto\">may be compromised<\/span><span data-contrast=\"auto\">\u00a0in this way.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">Most of which could be minimized with a secure supply chain model and internal education of staff.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Why is the healthcare industry being attacked?\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The key motivator for the vast majority of cyberattacks\u00a0<\/span><span data-contrast=\"auto\">happen<\/span><span data-contrast=\"auto\">s<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">for\u00a0<\/span><span data-contrast=\"auto\">monetary gain<\/span><span data-contrast=\"auto\">. Healthcare information is 10 times more valuable on the black market than social security numbers and credit card information. But in the healthcare world, not all perpetrators attacking healthcare providers will be motivated by money. Healthcare providers such as hospitals are highly visible targets and attacks against them will <\/span><span data-contrast=\"auto\">cause a major disruption in operations or threat to data housed within a hospital network<\/span><span data-contrast=\"auto\">.<\/span><span data-contrast=\"auto\">\u00a0Disruptive<\/span><span data-contrast=\"auto\">\u00a0attacks can disable, sabotage, or knock\u00a0<\/span><span data-contrast=\"auto\">critical systems\u00a0<\/span><span data-contrast=\"auto\">offline\u00a0<\/span><span data-contrast=\"auto\">inside a hospital. The health and safety of vulnerable patients suffer as a result.\u00a0<\/span><span data-contrast=\"auto\">I<\/span><span data-contrast=\"auto\">ntellectual property, research data, drug trial data, PII, financial\/<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">insurance data, medical records<\/span><span data-contrast=\"auto\">\u00a0could be accessed and used<\/span><span data-contrast=\"auto\">\u00a0in<\/span><span data-contrast=\"auto\">\u00a0various ways.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The healthcare industry is a massive, complex, interconnected ecosystem with thousands of endpoints, systems, and users. The size, complexity, and functions of this\u00a0<\/span><span data-contrast=\"auto\">ecosystem create large and oftentimes unpredictable attack surfaces. In a technical sense, threat actors can use several attack routes to infiltrate or sabotage a system.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">How are they attacking the healthcare industry?\u00a0<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Entry points that threat actors can use to compromise the hospital supply chain range from manufacturers to distribution centers and transportation companies, from third-party contractors to developers of software and mobile apps hospitals use, from past to non-core services staff.<\/span><span data-contrast=\"none\">\u00a0(<\/span><span data-contrast=\"none\">figure 1.\u00a0<\/span><span data-contrast=\"none\">image supply chain flow)<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h6 style=\"text-align: center;\"><span data-contrast=\"none\"><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-9394 aligncenter\" src=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2020\/07\/figure-1-REV-300x290.jpg\" alt=\"\" width=\"432\" height=\"418\" \/>Figure 1.0 Supply Chain potential Risk access points<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/h6>\n<p><span data-contrast=\"none\">\u201cSupply chain threats arise as a result of outsourcing suppliers, and the lack of verifiable physical and cybersecurity practices in place at the suppliers,\u201d\u00a0<\/span><span data-contrast=\"none\">Sterling OEM,\u00a0<\/span><span data-contrast=\"none\">Trendmicro<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">pointed out<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">\u201c<\/span><span data-contrast=\"none\">Suppliers do not always vet personnel properly, especially companies that have access to patient data, hospital IT systems, or healthcare facilities. Vendors do not always vet their products and software for cybersecurity risk<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">and maybe outsourcing resources as well.\u201d<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The following statistics from the HITRUST Cyber Threat\u00a0<\/span><span data-contrast=\"auto\">XChange<\/span><span data-contrast=\"auto\">\u00a0(CTX) program \u2014 a threat indicator sharing platform \u2014 show a few chosen markers about the\u00a0<\/span><span data-contrast=\"auto\">health<\/span><span data-contrast=\"auto\">care<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">industry cyber<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-contrast=\"auto\">threat landscape that provide a snapshot about the most common infection vectors<\/span><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Other threats, as illustrated in Figure\u00a0<\/span><span data-contrast=\"none\">2<\/span><span data-contrast=\"none\">.\u00a0<\/span><span data-contrast=\"none\">ar<\/span><span data-contrast=\"none\">e supplies, equipment, and software that come from <\/span><span data-contrast=\"none\">unvetted sources<\/span><span data-contrast=\"none\">.\u00a0 Education is key to procurement personnel to know that the supplier has been vetted to eliminate gray market equipment making its way into a hospital or medical facility.\u00a0 As a reseller, Sterling Sr. VP, Jeff Moore states<\/span><span data-contrast=\"none\">\u00a0in a recent\u00a0<\/span><a href=\"https:\/\/www.meritalk.com\/articles\/know-your-resellers-sterlings-jeff-moore-discusses-securing-the-channel\/\"><span data-contrast=\"none\">article published by\u00a0<\/span><span data-contrast=\"none\">MeriTalk<\/span><\/a><span data-contrast=\"none\">, \u201cThe bottom line is that <\/span><span data-contrast=\"none\">facilities<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">need comprehensive assessments of their suppliers to understand the total risk.\u00a0 Training\u00a0<\/span><span data-contrast=\"none\">procurement staff<\/span><span data-contrast=\"none\">\u00a0and buyers<\/span><span data-contrast=\"none\">\u00a0to look beyond the Bill of Materials (BOM<\/span><span data-contrast=\"none\">)<\/span><span data-contrast=\"none\"> and the part number is essential.\u201d\u00a0\u00a0<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p style=\"text-align: left;\"><span data-contrast=\"none\"><span data-contrast=\"none\"><img decoding=\"async\" class=\"wp-image-9401 aligncenter\" src=\"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2020\/07\/cropped-figure-2-300x129.jpg\" alt=\"\" width=\"477\" height=\"205\" \/><\/span><\/span><\/p>\n<h6 style=\"text-align: center;\"><span data-contrast=\"none\"><span data-contrast=\"none\">Figure 2. Distribution of Indicators of Compromise (IoC) types, 2017 Q4 <\/span><\/span>(Source CTX Enhanced Pilot)<\/h6>\n<p><span data-contrast=\"auto\">To date, the majority of publicly reported cyberattacks against hospitals have been one of the following:\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-aria-level=\"1\" data-aria-posinset=\"1\" aria-setsize=\"-1\" data-listid=\"1\" data-font=\"Symbol\" data-leveltext=\"\uf0b7\"><span data-contrast=\"auto\">data breaches\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-aria-level=\"1\" data-aria-posinset=\"2\" aria-setsize=\"-1\" data-listid=\"1\" data-font=\"Symbol\" data-leveltext=\"\uf0b7\"><span data-contrast=\"auto\">ransomware\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-aria-level=\"1\" data-aria-posinset=\"3\" aria-setsize=\"-1\" data-listid=\"1\" data-font=\"Symbol\" data-leveltext=\"\uf0b7\"><span data-contrast=\"auto\">medical device compromise\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><a href=\"https:\/\/cybersecurityventures.com\/cybersecurity-almanac-2019\/\"><span data-contrast=\"none\">Cybersecurity Ventures<\/span><\/a><span data-contrast=\"none\">\u00a0predic<\/span><span data-contrast=\"none\">ted<\/span><span data-contrast=\"none\">\u00a0that healthcare would suffer 2-3X more\u00a0<\/span><span data-contrast=\"none\">cyber-attacks<\/span><span data-contrast=\"none\">\u00a0in 2019 than the average amount for other industries<\/span><span data-contrast=\"none\">\u00a0with\u00a0<\/span><a href=\"https:\/\/www.hipaajournal.com\/healthcare-email-fraud-attacks-have-increased-473-in-2-years\/\"><span data-contrast=\"none\">email fraud attacks increasing 473 percent in the last 2 years.<\/span><\/a><span data-contrast=\"none\">\u00a0 Data breach costs will continue to worsen in 2020 according to the latest\u00a0<\/span><a href=\"https:\/\/blackbookmarketresearch.newswire.com\/news\/healthcare-data-breaches-costs-industry-4-billion-by-years-end-2020-21027640\"><span data-contrast=\"none\">Black Book Survey<\/span><\/a><span data-contrast=\"none\">\u00a0research report.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">As healthcare organizations grow, they increase in complexity.<\/span><span data-contrast=\"none\">\u00a0Without a secure<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">s<\/span><span data-contrast=\"none\">upply chain<\/span><span data-contrast=\"none\">, healthcare facilities<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-contrast=\"none\">may\u00a0<\/span><span data-contrast=\"none\">face more<\/span><span data-contrast=\"none\">\u00a0uncertainty.\u00a0<\/span><span data-contrast=\"none\">At the end of the day<\/span><span data-contrast=\"none\">,<\/span><span data-contrast=\"none\">\u00a0healthcare facilities need to\u00a0<\/span><span data-contrast=\"none\">know\u00a0<\/span><span data-contrast=\"none\">their\u00a0<\/span><span data-contrast=\"none\">reseller<\/span><span data-contrast=\"none\">s<\/span><span data-contrast=\"none\">.<\/span><span data-contrast=\"none\">\u202fMoore and Sterling advocate fiercely to maintain a true secure supply chain<\/span><span data-contrast=\"none\">.<\/span><span data-contrast=\"none\">\u202f<\/span><span data-contrast=\"none\">Sterling is O-TTPS Certified (Open Trusted Technology Provider Standard Certification), CMMC certified and has a detailed Supply Chain Risk Management (SCRM) plan in place so customers can be assured of secure product procurement<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Healthcare Supply Chain transformation\u00a0<\/span><span data-contrast=\"none\">provides a future of uninterrupted operations without the compromise of security<\/span><span data-contrast=\"none\">\u00a0to medical, patient, and financial data and systems.<\/span><span data-contrast=\"none\">\u00a0\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p>For more on Secure Supply Chain and Healthcare Security:<\/p>\n<p><strong><a href=\"https:\/\/www.sterling.com\/telehealth\" target=\"_blank\" rel=\"noopener noreferrer\">Security Assessment Request<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/www.sterling.com\/secure-supply-chain-blog\">www.sterling.com\/secure-supply-chain-blog<\/a><\/p>\n<p><a href=\"http:\/\/www.securesupplychain.com\" target=\"_blank\" rel=\"noopener noreferrer\">www.securesupplychain.com<\/a><\/p>\n<p><a href=\"https:\/\/healthitsecurity.com\/news\/41-providers-reported-ransomware-attacks-in-first-half-of-2020?eid=CXTEL000000583545&amp;elqCampaignId=15162&amp;utm_source=nl&amp;utm_medium=email&amp;utm_campaign=newsletter&amp;elqTrackId=5faaed433b7c42e4a441a502e244910b&amp;elq=08bfe415843847f79549bcd1009434e5&amp;elqaid=15916&amp;elqat=1&amp;elqCampaignId=15162\" target=\"_blank\" rel=\"noopener noreferrer\">Ra<\/a><a href=\"https:\/\/healthitsecurity.com\/news\/41-providers-reported-ransomware-attacks-in-first-half-of-2020?eid=CXTEL000000583545&amp;elqCampaignId=15162&amp;utm_source=nl&amp;utm_medium=email&amp;utm_campaign=newsletter&amp;elqTrackId=5faaed433b7c42e4a441a502e244910b&amp;elq=08bfe415843847f79549bcd1009434e5&amp;elqaid=15916&amp;elqat=1&amp;elqCampaignId=15162\" target=\"_blank\" rel=\"noopener noreferrer\">nsomware Attacks in the First Half of 2020<\/a><\/p>\n<p>&nbsp;<\/p>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:432,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Who is attacking the healthcare industry?\u00a0\u00a0 Advancements\u00a0in technology have\u00a0offered healthcare\u00a0an opportunity to save lives and operate efficiently.\u00a0\u00a0This technology\u00a0has\u00a0created\u00a0vulnerabilities to threats\u00a0that\u00a0infiltrate, steal,\u00a0or hijack networks\u00a0of confidential data\u00a0and systems.\u00a0\u00a0Whatever the reason for the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9422,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,13,32,16,11,17],"tags":[],"class_list":["post-9285","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-announcements","category-blog","category-client","category-managed-services","category-news","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing the Healthcare Supply Chain - Sterling<\/title>\n<meta name=\"description\" content=\"Technology\u00a0has\u00a0created\u00a0vulnerabilities\u00a0for threats\u00a0that\u00a0infiltrate, steal,\u00a0or hijack networks\u00a0of confidential data\u00a0and systems.\u00a0Securing the supply chain will minimize these vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing the Healthcare Supply Chain - Sterling\" \/>\n<meta property=\"og:description\" content=\"Technology\u00a0has\u00a0created\u00a0vulnerabilities\u00a0for threats\u00a0that\u00a0infiltrate, steal,\u00a0or hijack networks\u00a0of confidential data\u00a0and systems.\u00a0Securing the supply chain will minimize these vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sterling.com\/stargazer\/?p=9285\" \/>\n<meta property=\"og:site_name\" content=\"Sterling\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/SterlingComp\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-20T18:43:13+00:00\" \/>\n<meta name=\"author\" content=\"Sterling\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:site\" content=\"@sterlingcomp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sterling\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=9285#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=9285\"},\"author\":{\"name\":\"Sterling\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/person\\\/b812a18f3a1e77cd0925429d1546e49d\"},\"headline\":\"Securing the Healthcare Supply Chain\",\"datePublished\":\"2020-07-20T18:43:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=9285\"},\"wordCount\":946,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=9285#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Announcements\",\"Blog\",\"Client\",\"Managed Services\",\"News\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=9285\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=9285\",\"name\":\"Securing the Healthcare Supply Chain - Sterling\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=9285#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=9285#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2020-07-20T18:43:13+00:00\",\"description\":\"Technology\u00a0has\u00a0created\u00a0vulnerabilities\u00a0for threats\u00a0that\u00a0infiltrate, steal,\u00a0or hijack networks\u00a0of confidential data\u00a0and systems.\u00a0Securing the supply chain will minimize these vulnerabilities.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=9285#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=9285\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=9285#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?p=9285#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing the Healthcare Supply Chain\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#website\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\",\"name\":\"Sterling\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#organization\",\"name\":\"Sterling\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Sterling-Computers-Logo-TM.png\",\"contentUrl\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Sterling-Computers-Logo-TM.png\",\"width\":399,\"height\":145,\"caption\":\"Sterling\"},\"image\":{\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/facebook.com\\\/SterlingComp\\\/\",\"https:\\\/\\\/x.com\\\/sterlingcomp\",\"https:\\\/\\\/www.instagram.com\\\/sterlingcomputers\\\/\",\"http:\\\/\\\/youtube.com\\\/@sterlingcomp\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/sterling-computers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/#\\\/schema\\\/person\\\/b812a18f3a1e77cd0925429d1546e49d\",\"name\":\"Sterling\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g\",\"caption\":\"Sterling\"},\"url\":\"https:\\\/\\\/sterling.com\\\/stargazer\\\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing the Healthcare Supply Chain - Sterling","description":"Technology\u00a0has\u00a0created\u00a0vulnerabilities\u00a0for threats\u00a0that\u00a0infiltrate, steal,\u00a0or hijack networks\u00a0of confidential data\u00a0and systems.\u00a0Securing the supply chain will minimize these vulnerabilities.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Securing the Healthcare Supply Chain - Sterling","og_description":"Technology\u00a0has\u00a0created\u00a0vulnerabilities\u00a0for threats\u00a0that\u00a0infiltrate, steal,\u00a0or hijack networks\u00a0of confidential data\u00a0and systems.\u00a0Securing the supply chain will minimize these vulnerabilities.","og_url":"https:\/\/sterling.com\/stargazer\/?p=9285","og_site_name":"Sterling","article_publisher":"http:\/\/facebook.com\/SterlingComp\/","article_published_time":"2020-07-20T18:43:13+00:00","author":"Sterling","twitter_card":"summary_large_image","twitter_creator":"@sterlingcomp","twitter_site":"@sterlingcomp","twitter_misc":{"Written by":"Sterling","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sterling.com\/stargazer\/?p=9285#article","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/?p=9285"},"author":{"name":"Sterling","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/b812a18f3a1e77cd0925429d1546e49d"},"headline":"Securing the Healthcare Supply Chain","datePublished":"2020-07-20T18:43:13+00:00","mainEntityOfPage":{"@id":"https:\/\/sterling.com\/stargazer\/?p=9285"},"wordCount":946,"commentCount":0,"publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/?p=9285#primaryimage"},"thumbnailUrl":"","articleSection":["Announcements","Blog","Client","Managed Services","News","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sterling.com\/stargazer\/?p=9285","url":"https:\/\/sterling.com\/stargazer\/?p=9285","name":"Securing the Healthcare Supply Chain - Sterling","isPartOf":{"@id":"https:\/\/sterling.com\/stargazer\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sterling.com\/stargazer\/?p=9285#primaryimage"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/?p=9285#primaryimage"},"thumbnailUrl":"","datePublished":"2020-07-20T18:43:13+00:00","description":"Technology\u00a0has\u00a0created\u00a0vulnerabilities\u00a0for threats\u00a0that\u00a0infiltrate, steal,\u00a0or hijack networks\u00a0of confidential data\u00a0and systems.\u00a0Securing the supply chain will minimize these vulnerabilities.","breadcrumb":{"@id":"https:\/\/sterling.com\/stargazer\/?p=9285#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sterling.com\/stargazer\/?p=9285"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/?p=9285#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/sterling.com\/stargazer\/?p=9285#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sterling.com\/stargazer\/"},{"@type":"ListItem","position":2,"name":"Securing the Healthcare Supply Chain"}]},{"@type":"WebSite","@id":"https:\/\/sterling.com\/stargazer\/#website","url":"https:\/\/sterling.com\/stargazer\/","name":"Sterling","description":"","publisher":{"@id":"https:\/\/sterling.com\/stargazer\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sterling.com\/stargazer\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sterling.com\/stargazer\/#organization","name":"Sterling","url":"https:\/\/sterling.com\/stargazer\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/","url":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","contentUrl":"https:\/\/sterling.com\/stargazer\/wp-content\/uploads\/2023\/03\/Sterling-Computers-Logo-TM.png","width":399,"height":145,"caption":"Sterling"},"image":{"@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/facebook.com\/SterlingComp\/","https:\/\/x.com\/sterlingcomp","https:\/\/www.instagram.com\/sterlingcomputers\/","http:\/\/youtube.com\/@sterlingcomp","https:\/\/www.linkedin.com\/company\/sterling-computers"]},{"@type":"Person","@id":"https:\/\/sterling.com\/stargazer\/#\/schema\/person\/b812a18f3a1e77cd0925429d1546e49d","name":"Sterling","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49107847cab9312fecfc9475e27da24373a491ca9faf45408ea019ad846f2c44?s=96&d=mm&r=g","caption":"Sterling"},"url":"https:\/\/sterling.com\/stargazer\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts\/9285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9285"}],"version-history":[{"count":0,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/wp\/v2\/posts\/9285\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sterling.com\/stargazer\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}