Page 67 - index
P. 67
• Favor medical device vendors that utilize techniques, such as digitally signed software,
and encrypt all internal data with passwords that are able to be modified and reset
• Isolate medical devices inside a secure network zone, and protect this zone with an
internal firewall that will allow access to specific services and IP addresses
• Use a technology designed to identify malware and persistent attack vectors that have
already bypassed primary defenses
http://deceive.trapx.com/AOAMEDJACK_210_Landing_Page.html
About TrapX Security
TrapX Security is a leader in the delivery of deception based cyber security defense. Our
solutions enable our customers to rapidly isolate, fingerprint and disable new zero day attacks
and APTs in real-t ime. Uniquely our automation, innovative protection for your core and
extreme accuracy enable us to provide complete and deep insight into malware and malicious
activity unseen by other types of cyber defense. TrapX Security has many thousands of
government and Global 2000 users around the w orld, servicing customers in defense,
healthcare, finance, energy, consumer products and other key industries.
67 Cyber Warnings E-Magazine – July 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide