Article How Lack of Access Management Endangers Healthcare Data Security

When it comes to protecting personal health information, legacy processes are just as vulnerable as legacy operating systems, hardware and software.

Doctor's hands typing on a keyboard

By Shay Moser / 6 Mar 2016 , Updated on 26 Jul 2017  / Topics: Security