September 8, 2021: We all log in to our machines to get started with our day. While this used to be just a terminal at your desk or workstation, the devices are with us all the time. Admission criteria for backup, compute, network, and storage relies on a consistent authentication model. Role-based access criteria is even more important as directory authentication is scaled and shared. Development of a consistent approach towards the development of controls will provide for an authoritative source of resources to access and control systems. As the access model for healthcare evolves, are we seeing steps taken that are going to change how we interact with technology? There have been a lot of breaches reported in the media - not just healthcare, but surrounding every organization in the world - is this the starting-point for our global remediation?
Join our webinar “Coming Through a Ransomware Event - Best Practices and Lessons Learned” on Thursday, October 7th at 11:00 AM eastern time. We are going to take a unique look at the Sky Lakes Medical Center ransomware event with guests: