Search

CISA Releases Top 10 Exploited Vulnerabilities

The most exploited security vulnerabilities are mitigated through an aggressive patch program that supports §164.308(a)(5)(ii)(B), Protection from Malicious Software. The US Cybersecurity and Infrastructure Security Agency (CISA) has posted a 2016 - 2019 summary that includes vulnerable products, lists the malware used to exploit these products, provides the mitigation required and includes links that further explain each scenario. The summary also talks to this year's trends among cyber-criminals. Click the graphic below to see the CISA bulletin.


It's easy to align a compliance program with the business outcomes using information that comes in our routine blogs. Contact us if you need a helping hand connecting the dots with your company's decision makers.


Stay (HIPAA) safe,



0 views

Experience                   Integrity                        Results

Proteus Consulting, LLC

10323 N. Strahorn Rd

Hayden, ID, 83835

(208) 215.5607

Copyright © 2013 - 2020 Proteus Consulting, LLC