Top

Controlled access: Key to guard devices from malware

July 2, 2015

Category:

The more health IT devices hospitals implement, the more access points hackers have to infiltrate their systems. However, many hospitals need help to protect these devices from intruders.

Although devices rarely contain the kind of protected health information (PHI) hackers want, they often serve as entry points to get at more valuable data. Typically, hackers will infect devices with malware or other malicious viruses, which allows them to move laterally through systems and mine information from your network.

These kind of breaches can often go unnoticed for months since the usability of the device isn’t typically affected while the malware is running.

Read More