Article

Securing Healthcare Data Amid Heightened Threats & Looming Vulnerabilities

Posted April 1, 2022 | Industry | Technology | Amplify
vulnerable
Cutter Expert San Murugesan looks at why health data is so valuable to cybercriminals, why criminals are often successful in their attacks, and the cost of these breaches. He outlines seven technologies/approaches that can help: authentication and access control, encryption, data anonymization, mobile device security, monitoring and auditing, artificial intelligence, and zero trust. Murugesan concludes with a list of processes that should always be in place to secure health data.
About The Author
San Murugesan
San Murugesan (BE [Hons], MTech, PhD; FACS) is a Cutter Expert and a member of Arthur D. Little's AMP open consulting network. He is also Director of BRITE Professional Services and former Editor-in-Chief of the IEEE's IT Professional. Dr. Murugesan has four decades of experience in both industry and academia, and his expertise and interests include artificial intelligence, quantum computing, the Internet of Everything, cloud computing, green… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.