The hospital said in a statement there is no evidence of any personal information being misused from the data breach. (read more)
Education Is Important
Follow us on Social Media or email us:
The hospital said in a statement there is no evidence of any personal information being misused from the data breach. (read more)
Follow us on Social Media or email us:
It’s a much bigger problem too, according to Zeus Kerravala, principal analyst at ZK Research, "because the scope has broadened. Things you never would have connected before are now connecting." As an example, he cites the Target breach from a few years ago. "The AC system was compromised, and it was on the same network as the point-of-sale system." When the hackers went through the AC system to the POS server, red flags theoretically should have gone up and the AC system should have been immediately quarantined.
Interested in knowing more about Shadow IoT and how to prevent it?
Follow us on Social Media or email us:
Follow us on Social Media or email us: