Data Breaches in Healthcare: The New Plague, Part 2 Posted on 13 June 2016 by Jennifer Dean in Enterprise Security Healthcare records are vulnerable to hackers. Learn why they are targeted and how other countries protect healthcare records better from data breaches. A Prescription for Healthcare Data Protection Posted on 01 June 2015 by Stephen Kingston in Enterprise Security When we think about industries and the significant challenges with handling PII and PCI, the ecosystem surrounding healthcare bears specific attention. In today’s world this… From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 11/01/19 @ 04:01 Eva Looks cool to avoid unexpected payment by thieves with a stolen card. More secure09/01/19 @ 10:01 Kareem Excellent series of blog on the topic. Many thanks.09/01/19 @ 10:01 Kareem Thanks for the explanation. It would be helpful if you cover the idea of a primary and secondary device, where LPA sits exactly in this case and what S/W sits on the primary device.