U.S. Seeks Extra Cybersecurity after Stryker Attack
March 19, 2026
The U.S. is calling on organizations to take extra precautions following the cyberattack against a leading U.S.-based medical technology firm Stryker Corporation.
Here’s what you need to know:
Where things stand
Last week, Stryker experienced a global network disruption to its Microsoft environment because of a cyberattack. Media reports indicated the attack delayed some scheduled procedures due to delayed inventory deliveries.
In an update this week, Stryker officials said all its products across its portfolio were safe to use, and the event was contained to its internal Microsoft environment.
What you can do
The Cybersecurity & Infrastructure Security Agency (CISA) said organizations should “harden endpoint management system configurations using the recommendations and resources provided in this alert.”
Key steps for Microsoft users include:
- Use principles of ‘least privilege’: Assign the minimum permissions necessary to each role for completing day-to-day operation.
- MFA: Enforce phishing-resistant multi-factor authentication (MFA) and privileged access to block unauthorized users.
- Multiple approvals: Sensitive, high-impact actions (device wiping) should require a second administrative approval.
What’s next
“CISA is conducting enhanced coordination with federal partners, including the Federal Bureau of Investigation (FBI), to identify additional threats and determine mitigation actions,” the agency said in a statement.
Additional information and best practices—including phishing-resistant MFA—are available online.