Cutter Expert San Murugesan looks at why health data is so valuable to cybercriminals, why criminals are often successful in their attacks, and the cost of these breaches. He outlines seven technologies/approaches that can help: authentication and access control, encryption, data anonymization, mobile device security, monitoring and auditing, artificial intelligence, and zero trust. Murugesan concludes with a list of processes that should always be in place to secure health data.
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.
Member/Guest loginForgot your password?