Article How Lack of Access Management Endangers Healthcare Data Security

When it comes to protecting personal health information, legacy processes are just as vulnerable as legacy operating systems, hardware and software.

By Shay Moser / 6 Mar 2016 , Updated on 26 Jul 2017  / Topics: Security