Cybersecurity

Cyber Threat Intelligence, Alerts and Reports

As part of the AHA’s commitment to helping hospitals and health systems prepare for and prevent cyber threats, we have gathered the latest government cyber threat intelligence and alerts and Health Information Sharing and Analysis Center (H-ISAC) reports.

You may be asked to enter your AHA member credentials to view certain reports and intelligence alerts.

Cybersecurity & Risk Advisory

Learn how AHA can help hospitals and health systems prepare for and mitigate cyber threats through the expertise of John Riggi, AHA’s National Advisor for Cybersecurity and Risk.

Learn More

A collection of articles an cybersecurity
Cybersecurity Cybersecurity Awareness is a Board Responsibility AHA Cybersecurity expert John Riggi discusses what trustees should know about their organization’s cyberthreat plan By Nikhil Baviskar Interview The frequency and severity of cyber-attacks on hospitals continues to mount as…
HA has developed What Boards Should Know about Cybersecurity to assist trustees in asking key questions about their hospital or health system’s cybersecurity protocols.
Cyberattacks have far-reaching consequences that directly threaten patient care, patient safety and broader public health and safety, by potentially denying the availability of the hospital and emergency medical care to the community.
Trustees should take steps to understand and reduce the risk of large-scale data breaches.
With proper planning and investment, hospitals and health systems can reduce cyber risks and vulnerabilities.
Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology, it is not surprising that, when we think about our organizations’ vulnerabilities, our information infrastructure must be high on the…
A group of cybersecurity experts, representing everyone from NASA to academic medicine, formed a committee targeting the small but potentially lethal threat in which a hacker takes control of a medical device, an act known by some as “medjacking.”