Deception technology applied to pharma cybersecurity

June 28, 2018 Mayuri Kumar

Deception technology uses decoys, or traps, that mimic a network's actual IT assets. In its early days, deception technology required considerable manual labor and expertise to deploy, monitor and maintain. But, partly due to virtualization and automated deployment, the technology may be seeing renewed interest among healthcare organizations.

"We all know that there are a number of attacks that occur even in environments where they have multiple security controls deployed," said Mac McMillan, CEO, and president of CynergisTek, a cybersecurity, and information consulting firm.

TechTarget featured Mac McMillan's commentary in the article above.

Previous Article
Take commonsense approach to cybersecurity for healthcare plan
Take commonsense approach to cybersecurity for healthcare plan

Next Content
Improving Readiness: Meeting Cyber Threats | 2018 Report
Improving Readiness: Meeting Cyber Threats | 2018 Report

Our report aggregated data from assessments performed in 2017 at hundreds of healthcare organizations acros...