HealthTech July 22, 2024
Novid Parsi

Continuous validation is central to the zero-trust framework, but related security controls shouldn’t burden clinicians.

Faced with rising threats, healthcare IT leaders are increasingly turning to zero trust. As a cybersecurity framework, zero trust requires all users, both inside and outside an organization’s network, to be authenticated, authorized and continuously validated before they gain access to applications and data. Zero trust is a strategy, not a product.

Given the inevitability of breaches, zero trust works on the assumption that cybercriminals likely have already compromised the environment and prevents them from attacking from within. In short: Never trust, always verify.

In 2023, 61% of organizations had a zero-trust initiative in place, up from just 24% two years earlier, according to a...

Today's Sponsors

LEK
ZeOmega

Today's Sponsor

LEK

 
Topics: Cybersecurity, Health IT, Health System / Hospital, Medical Devices, Provider, Technology
The Hidden Cost Savings of Security Risk Assessments in Healthcare
The Cybersecurity Cat-And-Mouse Game
Vice President Harris' track record provides tea leaves for her potential cyber agenda
iOS 18—New iPhone Security And Privacy Features Arriving In Days
The changing role of chief privacy officers

Share This Article