Deception technology uses decoys, or traps, that mimic a network's actual IT assets. In its early days, deception technology required considerable manual labor and expertise to deploy, monitor and maintain. But, partly due to virtualization and automated deployment, the technology may be seeing renewed interest among healthcare organizations.
"We all know that there are a number of attacks that occur even in environments where they have multiple security controls deployed," said Mac McMillan, CEO, and president of CynergisTek, a cybersecurity, and information consulting firm.
TechTarget featured Mac McMillan's commentary in the article above.