Advisor

Protecting Sensitive Data in Enterprise and Cloud Environments

Posted April 12, 2016 | Technology |

I was reading a press release from a large health care provider notifying customers of a potential data breach. According to the company, “a test database was inadvertently left accessible via the Internet.” Upon learning of the incident, the company secured the database and removed it from public view. It then conducted an “exhaustive investigation,” determining that the database included patients’ names, addresses, telephone numbers, email addresses, medications, and “limited” clinical information.

About The Author
Curt Hall
Curt Hall is a Cutter Expert and a member of Arthur D. Little’s AMP open consulting network. He has extensive experience as an IT analyst covering technology and application development trends, markets, software, and services. Mr. Hall's expertise includes artificial intelligence (AI), machine learning (ML), intelligent process automation (IPA), natural language processing (NLP) and conversational computing, blockchain for business, and customer… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.