Telstra Health confirms Argus installations left vulnerable to malware

Telstra Health is recommending that practices check their remote desktop connection and install an up to date version of the Argus secure messaging service following reports that a small number of computers were infected by malware back in January.

Fairfax Media reported today that it appears a problem with password configurations for remote desktop access caused the connections to stay open, allowing hackers to load malware.

A Telstra Health spokesman told Pulse+IT that the company became aware of the issue in January, and since issuing a patch, no additional incidents have been reported.

Posted in Australian eHealth

Tags: Telstra Health, Argus

You need to log in to post comments. If you don't have a Pulse+IT website account, click here to subscribe.

Sign up for Pulse+IT eNewsletters

Sign up for Pulse+IT website access

For more information, click here.

Copyright © 2019 Pulse+IT Magazine
No content published on this website can be reproduced by any person for any reason without the prior written permission of the publisher.