Ellen McCullough
/ Categories: Security

How to Maximize Your Personal Health Data Defense

Protecting Personal and Healthcare Data Through Good Habits

 

Gates.  Alarm systems.  Security guards.  What do they all have in common?  They are the first line of defense protecting what is most important to you.  If an attacker were to get past that guard, would you still be protected?

In the Information Security community, we use what is called a defense-in-depth, or layered, approach.  This means that if one aspect of our defense fails, there are many others to fall back on.  We call this eliminating a single point of failure. 

1234567
Previous Article Cyber Vitals: Information for Patients' Medical Device Health
Next Article Pulse Oximeter Accuracy and Limitations: FDA Safety Communication
Print
1965 Rate this article:
5.0
Please login or register to post comments.