US cybersecurity agency urges companies to secure device management systems after Stryker hack
CISA issued guidance for securing Microsoft Intune after hackers breached Stryker and remotely wiped thousands of employee devices.

The U.S. Cybersecurity and Infrastructure Security Agency has urged companies to enhance security measures for systems used to remotely manage employee devices following a cyberattack on medical technology company Stryker.
Hackers successfully breached Stryker's systems and used the access to remotely wipe thousands of phones and computers belonging to employees at the major medical device manufacturer. The attack specifically targeted Microsoft Intune, a cloud-based service that allows organizations to manage and secure employee devices remotely.
CISA's advisory comes as a response to the Stryker incident and aims to prevent similar attacks on other organizations that rely on device management platforms. The agency is recommending that companies review and strengthen their security protocols for remote device management systems to prevent unauthorized access.
Stryker is a significant player in the medical technology sector, making the cyberattack particularly concerning given the critical nature of healthcare infrastructure. The mass wiping of devices represents a disruptive attack that could impact business operations and potentially affect patient care systems.
The incident highlights the growing threat posed by cyberattacks targeting enterprise device management platforms, which have become attractive targets for hackers due to their broad access to organizational systems and data. Microsoft Intune and similar platforms are widely used across industries to manage employee devices, making security vulnerabilities in these systems a widespread concern.