Employees now expect to work remotely from various devices, requiring investment in broader security programs beyond network protection. Identity authentication is key as traditional concepts of coming into an office to access an organization’s resources swiftly disappear. For remote employees, access to resources may depend on the device used and the data being accessed. New security strategies need to address identity, device health, data access and applications used.
![](https://healsecurity.com/wp-content/uploads/2024/06/change-healthcare-begins-sending-breach-notifications-2048x1075.jpg)
Change Healthcare begins sending breach notifications
Hacker’s obtained personal data from UnitedHealth Group’s Change Healthcare, including names, addresses, and social security numbers. No evidence suggests medical records were stolen, despite cybercriminals