How to align security strategy and avoid 'faxploitation'

July 3, 2019 Mayuri Kumar

Let’s face it, fax machines may have been granted immortality. Since Xerox first invented the technology in 1964, fax machines were used extensively by businesses as a primary means to securely move information in the days before email. The reasons were because of vendor-independent standards, perceived security, and workflow simplicity: call – answer – handshake – scan – transmit – print. Information in the form of light and dark patterns was transmitted along any telephone connection to another device which would print the image on paper. The process was relatively secure, providing the communications path remained protected.

Clyde Hewitt's comments are featured in this article.

Previous Article
Open Source Genomic Analysis Software Flaw Patched
Open Source Genomic Analysis Software Flaw Patched

Next Article
Can Patient Data Be Truly 'De-Identified' for Research?
Can Patient Data Be Truly 'De-Identified' for Research?