The health system only allows the use of HIPAA-compliant devices that have passed security review, Horowitz says. The team also locks down devices to make sure users do not share personal health information over an open system, Horowitz says.
Once a device has been provisioned with a set of…
Source: healthtechmagazine.net – Read more
The Chrome Extension Backdoor: How 'Productivity Tools' Became Enterprise Attack Vectors – Security Boulevard
The Chrome Extension Backdoor: How ‘Productivity Tools’ Became Enterprise Attack Vectors Security Boulevard


