{"id":599827,"date":"2023-01-21T12:49:42","date_gmt":"2023-01-21T18:49:42","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/01\/21\/deep-dive-endpoint-security-in-healthcare\/"},"modified":"2023-01-21T12:49:42","modified_gmt":"2023-01-21T18:49:42","slug":"deep-dive-endpoint-security-in-healthcare","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/01\/21\/deep-dive-endpoint-security-in-healthcare\/","title":{"rendered":"Deep dive: Endpoint security in healthcare"},"content":{"rendered":"<div property=\"content:encoded\">\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Remote healthcare certainly has gained traction via the pandemic. As a result, some healthcare information security experts contend a u<\/span>nified endpoint management system has become a top priority for provider organizations conducting telehealth.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Remote healthcare facilities can be a breeding ground for security breaches.\u00a0These can pose a tremendous threat \u2013 especially if sensitive patient information is exposed. Additionally, with healthcare taking a digital shift, tablets and smartphones have become accessories to enable better and faster patient care.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">This means an increased dependence on technology and a resulting IT overload, said <\/span>Apu Pavithran, CEO and founder of Hexnode, a vendor of a unified endpoint management (UEM) platform housed by Mitsogo.<\/p>\n<p dir=\"ltr\"><em><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Healthcare IT News<\/span><\/em> sat down with Pavithran to discuss the digital shift in healthcare and what that means for security, why CISOs and CIOs should prioritize endpoint management, what a UEM strategy looks like, and why CISOs and CIOs should consider one.<\/p>\n<p dir=\"ltr\"><strong><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Q. How is the digital shift in healthcare opening doors for security risks?<\/span><\/strong><\/p>\n<p dir=\"ltr\"><strong><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">A.<\/span><\/strong> The history of digital health dates back to 1897, when a child&#8217;s viral infection was diagnosed via telephone consultation. Despite the early appearance of telemedicine, long-distance diagnosis was reserved for Antarctica expeditions and space missions for almost nine decades.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">However, the pandemic deserves praise for how it turned technology around and spurred innovations. The digital transformation wave that was expected to <\/span>hit a decade later got accelerated and was accomplished in three years.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Routine interactions like finding a doctor, scheduling an appointment, paying bills and processing insurance <\/span>revolutionized the healthcare experience, which was otherwise dull and slow.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">On the flipside, this sudden wave also took a toll on the healthcare system, especially when the IT was undernourished. While <\/span>the whole concept of digitizing healthcare was to provide exceptional patient care with timely access to services and resources, it ended up converting IT assets into silos of private data, making them susceptible to phishing, ransomware, DDoS and data breaches.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">The attacks on these systems varied in methodology and severity. Malicious actors stole Social Security numbers and other personal information in some instances, while other attacks directly posed danger to patient safety by compromising or shutting down crucial medical systems and equipment.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">I believe that lack of training, absence of creating awareness regarding internet threats, businesses&#8217; focus on providing the finest service\u00a0and the employee&#8217;s reluctance to move away from legacy systems have made healthcare systems easier access points.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Healthcare regulations like <\/span>HIPAA and HITECH demand that healthcare information ought to be open and shareable while also ensuring privacy. Unfortunately, these hazy distinctions between security and privacy make it hard for hospitals to stay on top of cybersecurity.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">For smaller organizations, winning the race of digital transformation becomes more difficult. A lower, restricted budget forces them to introduce outdated technology into the mobile network, raising the bar of security concern.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">In addition, following IT, logistics and retail, the BYOD trend also found its place in healthcare. While these personal devices house patient health information, there is a greater likelihood that these documents would leave the corporate perimeter.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Healthcare cybersecurity attacks do not only cost loss of revenue or payouts; the consequence can go up to affecting patient lives as well. For instance, in\u00a0<\/span><a href=\"https:\/\/www.healthcareitnews.com\/news\/hospital-ransomware-attack-led-infants-death-lawsuit-alleges#:~:text=The%20ransomware%20attack%20that%20targeted,visibility%20of%20fetal%20heartbeat%20monitors\" target=\"_blank\" rel=\"noopener\">Alabama&#8217;s Springhill Medical Center<\/a> in July 2019, a ransomware attack led to IT outages for about three weeks, resulting in the death of an infant as the mother wasn&#8217;t informed that the hospital was amid fending off a cyberattack.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">The cyber assault on Chicago-based CommonSpirit, the second largest nonprofit hospital network in the United States, is only a sign that these are darker times for healthcare. Many fail to realize that a patient&#8217;s privacy is as important as their health in healthcare.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Today, crossing the value pegged for stolen credit card and Social Security numbers, medical records are valued at <\/span>$250 in the black market.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">As the estimated cost of a healthcare data breach rises to $7.1M, regulatory bodies have tightened the reins, and the maximum fines on HIPAA violations have increased to a maximum level of <\/span>$25,000 per violation category.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">The threat landscape in healthcare is quite dynamic, and this has compelled various governments to focus more on the industry. For example, the Biden administration has <\/span>indicated that healthcare will be one of the major focus areas for the White House regarding security infrastructure.<\/p>\n<p dir=\"ltr\"><strong><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Q. Why should CISOs and CIOs at healthcare provider organizations prioritize endpoint management?<\/span><\/strong><\/p>\n<p dir=\"ltr\"><strong><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">A.<\/span><\/strong> The healthcare endpoint network is already a complex one. Apart from devices that house electronic health records, devices such as blood pressure monitors, MRI machines, IV pumps and implanted defibrillators are just other samples of endpoints.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">A simple glance at the\u00a0<\/span><a href=\"https:\/\/ocrportal.hhs.gov\/ocr\/breach\/breach_report.jsf;jsessionid=1736E73C98EAA4AD21BE71FC1336B05D\" target=\"_blank\" rel=\"noopener\">U.S. Department of Health and Human Services (HHS) Breach Portal<\/a> points out that about half of the attacks originate from devices and hardware.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Digitalization has taken over the healthcare industry through AI-powered devices, blockchain, telemedicine, EHR and remote patient monitoring. As a result of the internet of medical things, which connects every device with a sensor, software or other technology via the internet, we now live in an era where a single exposed endpoint can be the cause of a major network breach.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">In addition, the BYOD culture has introduced more unique endpoint security challenges. CISA has <\/span>identified this rapidly growing threat landscape as one of the\u00a0<a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/202012220800_Graphic_Challenges_to_Healthcare.pdf\" target=\"_blank\" rel=\"noopener\">biggest threats<\/a> to the healthcare sector.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Furthermore, point-of-care devices and kiosks collect patient health information in the form of EHR. These publicly placed kiosks are susceptible to vandalism, shoulder surfing and man-in-the-middle attacks. POC devices also collect documents that are expected to be legally confidential.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">While all these security concerns point toward why it is essential to prioritize endpoint management, the Technical Safeguard protocol under the HIPAA Security Rule has established standards that mandate healthcare personnel to comply with practices that ensure the confidentiality, integrity and security of ePHI.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">In addition, the\u00a0<\/span><a href=\"https:\/\/www.phe.gov\/Preparedness\/planning\/405d\/Documents\/tech-vol2-508.pdf\" target=\"_blank\" rel=\"noopener\">guide<\/a> published by the HHS&#8217;s Office of the Assistant Secretary for Preparedness and Response also vouches for endpoint security solutions as means to protect patient data.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Static devices that exist within health institutes and remain connected to the corporate network are an old story. With healthcare taking a digital front and blurring organizational perimeters, stakeholders must initially evaluate the status of their endpoints.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Closing the security gap must begin with identifying your assets&#8217; crown jewels and securing them. With revenue losses from the industry soaring, medical institutes must define and document possible attack surfaces and focus on patching the same.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Hackers do not look for weak network schematics alone. With humans being the weakest link in cybersecurity, malicious actors look out for people prone to fall for phishing or social engineering attacks. In the wake of such events, organizations must dictate the access one has to healthcare resources. Additionally, it is necessary to create awareness among employees on how to treat their endpoints.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">As attacks have been adopting a more sophisticated front, endpoint security has also been evolving from endpoint protection platform to endpoint detection and remediation to extended detection and response. As you construct your digital map, the key is to identify your right fit.<\/span><\/p>\n<p dir=\"ltr\"><strong><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Q. What is a unified endpoint management strategy and why do you believe healthcare CISOs and CIOs should consider one?<\/span><\/strong><\/p>\n<p dir=\"ltr\"><strong><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">A.<\/span><\/strong> Software that helps you manage, monitor and secure your corporate assets from a single console is a unified endpoint management solution. The following are some of the features to look for when subscribing to a UEM solution for the healthcare sector.<\/p>\n<p dir=\"ltr\"><strong><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Visibility into mobility network.<\/span><\/strong> You can&#8217;t protect what you can&#8217;t see. To secure your devices, it is necessary to have visibility into the devices logged into your network. From a UEM console, admins can view the device&#8217;s status and generate reports on compliance, ownership and device details.<\/p>\n<p dir=\"ltr\"><strong><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Securing the Internet of Medical Things.<\/span><\/strong> The IoMT industry is predicted to reach $176.82 billion by 2026; however, the market is overwhelmingly easy to infiltrate. When each device in the network is connected to another, a vulnerability in one of those becomes a threat to the entire network.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">With the help of UEMs, it is possible to have an overall insight into the devices, users, networks, settings, location and operational conditions from a single console. Furthermore, compromised devices can be removed and confidential data can be remotely wiped, securing the device from more significant harm.<\/span><\/p>\n<p dir=\"ltr\"><strong><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Fortifying the BYOD bandwagon.<\/span><\/strong> Personal devices have found higher demand among healthcare professionals.\u00a0However, the thin line between ensuring security and privacy has been a major challenge for hospital management.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">A UEM&#8217;s integration with corporate programs such as &#8220;<\/span><a href=\"http:\/\/bit.ly\/3GBwpsP\" target=\"_blank\" rel=\"noopener\">Android Enterprise<\/a>&#8221;\u00a0and &#8220;Apple at Work&#8221;\u00a0has helped organizations enforce the BYOD policy. While the Android Enterprise initiative clearly distinguishes between personal and work applications, the business container for iOS is concealed from plain sight. These built-in BYOD capabilities in a UEM guarantee privacy to the user and security to the enterprise.<\/p>\n<p dir=\"ltr\"><strong><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Managing your kiosk network.<\/span><\/strong> A UEM&#8217;s lockdown feature allows admins to restrict devices to pre-approved medical apps or telehealth software. In addition, device functionalities like camera, screenshots, calls, etc., can be disabled by converting devices into dedicated purpose-driven tools.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Before shipping such devices, they can be preconfigured with necessary settings through remote deployment techniques. For instance, Android&#8217;s Zero Touch Enrollment technique enables the remote enrollment of devices into the portal. Similarly, Apple offers Apple Business Manager, and Windows provides Autopilot.<\/span><\/p>\n<p dir=\"ltr\"><strong><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Ramping up defenses.<\/span><\/strong> Most devices in the healthcare perimeter can be logged in via generic log-on information, and through techniques like shoulder surfing, credentials may end up in the wrong hands. The capability of a UEM to enforce password restrictions and multifactor authentication mechanisms forces the user to create complex alphanumeric passcodes that do not have recurring histories.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Furthermore, admins can restrict data transfer via USB tethering, Bluetooth, etc., thereby safeguarding PHI documents. Businesses can also configure firewalls, FileVault and BitLocker to encrypt sensitive data.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">A UEM strategy can also help organizations dictate applications that need to be allowed or blocked in a particular device. The same stands for websites as well. Additionally, UEMs allow IT to enforce, schedule and delay OS updates, ensuring that existing security flaws are patched, and new features are updated to promote performance.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Finally, organizations can ensure that private data is accessed within the managed corporate network by implementing network restrictions. If a device is compromised, it can be locked and remotely wiped as the situation demands.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Every healthcare organization must comply with sector-specific regulations like HIPAA, HITECH, etc. A UEM solution in your cyber architecture ensures compliance and minimizes chances for a breach, thereby providing quality service to patients.<\/span><\/p>\n<p dir=\"ltr\"><strong><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Q. What are upcoming trends and features to look for in healthcare information security systems?<\/span><\/strong><\/p>\n<p dir=\"ltr\"><strong><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">A.<\/span><\/strong> Currently, 90% of businesses use the cloud, with multi-cloud infrastructure being the most common. IBM notes that an IT team&#8217;s failure to secure their cloud-based assets accounts for 19% of data breaches.<\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Most of these misconfigurations are caused by human errors.\u00a0Hence, we must evolve toward building technology on the cloud in alignment with privacy and security regulations. While encryption and blockchains will alter the infrastructure of the cloud, quantum computing may have a game-changing impact on cloud security.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Organizations will need to take giant leaps toward adopting quantum-resistant cryptography to protect themselves from quantum attacks. However, before bracing for the future, healthcare facilities must have a bird&#8217;s eye view of the behavior of their cloud systems \u2013 the services it provides, the apps it hosts and the security flaws it presents.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">It is advised to start by ensuring the security of their cloud footprint against today&#8217;s threats for a safer tomorrow.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Given all the advancements the sector has witnessed, I believe it&#8217;s time for healthcare to transition from manual to automated. Self-healing endpoints have been the talk of the town in the endpoint management industry.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">With the benefit of AI and machine learning, businesses have enhanced the resilience factor of their self-healing endpoints. Sooner, healthcare endpoints can self-diagnose their existing cyber structure, reset themselves to specific configurations, and thwart potential and actual threats.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Organizations are always busy implementing strategies after an attack occurs; however, the real deal is to take a proactive stance and build an architecture that can draw lessons from previous attacks and fight those of the future.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">By adopting an automated endpoint maintenance approach, IT teams could move from mundane security tasks to focusing more on infrastructure enhancement and inventory management.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">The healthcare sector is integrating with several third-party vendors and gathering more patient data, so relying solely on conventional network security methods like VPN may no longer be effective. As an alternative, businesses must prepare to implement a Secure Access Service Edge architecture that guarantees enhanced network connectivity and security.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">With Secure Access Service Edge, organizations can ensure that the required resources are allocated based on the employee&#8217;s identity than their location. While VPN&#8217;s methodology of offering broad access to the network once authorized might put the corporate network at risk, ZTNA, one of the core technologies of Secure Access Service Edge, tackles this issue by offering limited, granular access to specific applications and resources.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">As the future of healthcare gets a distributed touch, with administrators working from home and physicians providing consultations over video calls, this technology will ensure a better patient experience.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">Finally, leveraging the cloud&#8217;s capability to collaborate, unified endpoint management solutions have been integrating with other security solutions like Identity and Access Management, passwordless authentication and Zero Trust solutions.<\/span><\/p>\n<p dir=\"ltr\"><span id=\"docs-internal-guid-f5c684ac-7fff-d4f6-ad28-2ec83752100a\">However, before re-architecting and re-platforming, organizations must re-evaluate their current security posture and opt for solutions that can satisfy the requirements of their futuristic business model.<\/span><\/p>\n<p dir=\"ltr\"><em>Follow Bill&#8217;s HIT coverage on LinkedIn: <a href=\"https:\/\/www.linkedin.com\/in\/billsiwicki\/\" target=\"_blank\" rel=\"noopener\">Bill Siwicki<\/a><br \/>\nEmail the writer:\u00a0<a href=\"http:\/\/www.healthcareitnews.com\/mailto:bs******@***ss.org\" data-original-string=\"2BP640EN06VPcdXM6IIXeg==7f4PW\/FffGHjSf7YwH7MmvLIGDjwP\/M4wvFDnU2ylqnBP4=\" title=\"This contact has been encoded by Anti-Spam by CleanTalk. Click to decode. To finish the decoding make sure that JavaScript is enabled in your browser.\" target=\"_blank\" rel=\"noopener\"><span \n                data-original-string='6wUDv31hdaTbuVYv\/ktUUQ==7f4mq7IpS7MNnrI+uatdmIuB8Vtp4AJK1VOax1hpt+AQG8='\n                class='apbct-email-encoder'\n                title='This contact has been encoded by Anti-Spam by CleanTalk. Click to decode. To finish the decoding make sure that JavaScript is enabled in your browser.'>bs<span class=\"apbct-blur\">******<\/span>@<span class=\"apbct-blur\">***<\/span>ss.org<\/span><\/a><br \/>\nHealthcare IT News is a HIMSS Media publication.<\/em><\/p>\n<\/div>\n<p><a href=\"https:\/\/www.healthcareitnews.com\/news\/deep-dive-endpoint-security-healthcare\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Elroy Wrona<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Remote healthcare certainly has gained traction via the pandemic. As a result, some healthcare information security experts contend a unified endpoint management system has become a top priority for provider organizations conducting telehealth. Remote healthcare facilities can be a breeding ground for security breaches.\u00a0These can pose a tremendous threat \u2013 especially if sensitive patient information<\/p>\n","protected":false},"author":1,"featured_media":599828,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54676,20],"tags":[],"class_list":{"0":"post-599827","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-endpoint","8":"category-security"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/599827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=599827"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/599827\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/599828"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=599827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=599827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=599827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}