Arizona Physician Fall 2021 - FREE

Page 28

HOW TO

IT Security Should be Built in Layers “A secure network environment needs to have a security directory where all devices authenticate to.” 28 n

A R I ZO N A P H Y S I C I A N M A G A Z I N E

I

n recent years there was an increase of hacking effort in the general marketplace and in particular, healthcare. There was hacking in healthcare because of legacy systems and established vulnerabilities. Presented in the media over the last three years were several large healthcare organizations affected by ransomware attacks. The main reason for this occurrence is organizations not having the correct tools and layered security in place. A secure network environment needs to have a security directory where all devices authenticate to. There are many strong and legitimate directory structures that could be leveraged, but the most widely used is Active Directory. When there is a directory structure in production it eliminates the need of mapping direct drives for users and the impact of an infected machine with Crypto locker. This directory allows you the ability to force group policy amongst the user base and limit what the user


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.