How to assess IoT risks that fly under the radar

August 14, 2018 Mayuri Kumar

In the last few years, it has become common practice to “improve” almost everything by adding an embedded computer and connecting it to a network.

Just one decade ago, the average enterprise network primarily consisted of PCs, servers and network devices. The only endpoint devices that were treated differently were the printers and multi-function devices, which have been the cause of much pain over the years.

John Nye's full article was published here.

Previous Article
HHS OIG Finds Security Flaws in Maryland's Medicaid System
HHS OIG Finds Security Flaws in Maryland's Medicaid System

Next Article
Should Staff Ever Use Personal Devices to Access Patient Data?
Should Staff Ever Use Personal Devices to Access Patient Data?