Endpoint Security

Healthcare IT Network Harbors Most Prominent Vulnerabilities

August 30, 2019 - The healthcare IT network harbors the most prominent vulnerabilities in healthcare organizations, judged 232 healthcare security decision makers surveyed by Vanson Bourne on behalf of security firm Irdeto.   Half of respondents cited the IT network as the place where the most prominent vulnerabilities reside, followed by mobile devices and...


More Articles

Many Executives Lack Confidence in Healthcare IoT Security, Privacy

by Fred Donovan

Only 37 percent of healthcare executives are “very confident” that they are building sufficient security and privacy controls into their healthcare IoT deployments, according to a survey by...

Securing Mobile Medical Apps on Devices Adds Flexibility

by Elizabeth O'Dowd

More mobile devices are being introduced into health IT infrastructure environments. Organizations must find the right way to manage and monitor different mobile medical apps to ensure reliable and...

Healthcare IoT Infrastructure Relies on Device-to-Cloud Security

by Elizabeth O'Dowd

Samsung announced its ARTIK secure “s” systems-on-modules and services for the ARTIK IoT Platform to strengthen device-to-cloud security for organizations building their healthcare IoT...

Mobile Security Vendors Must Provide Usability, Flexibility

by Elizabeth O'Dowd

Gartner recently released its Critical Capabilities for High-Security Mobility Management report, outlining the subset of enterprise mobility management (EMM) and highlighting the qualities healthcare...

Connected Medical Devices Need Current HIT Infrastructure Security

by Elizabeth O'Dowd

Organizations are adding more connected medical devices to their HIT infrastructure, which raises concerns about device security. A recent Research and Markets report predicted that the medical device...

How Evolving Endpoint Protection Platforms Secure Devices

by Elizabeth O'Dowd

As healthcare organizations deploy more mobile devices into their health IT infrastructures, networks can become more vulnerable because malware has more opportunities to affect the networks. This is...

Healthcare Orgs Over Spending on Unified Endpoint Management

by Elizabeth O'Dowd

Osterman Research and Unify Square released the results of a joint survey highlighting the demand to improve enterprise endpoint management and control. The survey found that three quarters of...

Health Data Security Needs to Generate IAM Market Growth

by Elizabeth O'Dowd

The increasing number of cloud applications and mobile devices in healthcare organizations calls for tighter health data security as users access data both within an organization and...

CIOs Cite Evolving Digital Environments as Top IT Challenge

by Elizabeth O'Dowd

The constant and rapid evolution of the technology powering IT infrastructure presents challenges to CIOs lacking control over IT decision-making and end-user restrictions.  In a recent study...