{"id":6695,"date":"2017-02-20T09:40:20","date_gmt":"2017-02-20T17:40:20","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/20\/news-514\/"},"modified":"2017-02-21T15:02:16","modified_gmt":"2017-02-21T23:02:16","slug":"news-514","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/02\/20\/news-514\/","title":{"rendered":"Infographic: Protecting Patient Data in Today\u2019s Digital World"},"content":{"rendered":"<p><strong>Credit to Author: Susan Biddle| Date: Mon, 20 Feb 2017 09:08:45 -0800<\/strong><\/p>\n<div class=\"entry\" width=\"100%\" height=\"420\">\n<p>The healthcare industry continues to ride the digital wave to improve patient care and organizational efficiency while reducing costs. To do this, hospitals and health systems are relying on electronic health records (EHRs), the cloud, and the <a href=\"https:\/\/www.fortinet.com\/solutions\/iot-security.html?utm_source=web&amp;utm_medium=home-banner1&amp;utm_campaign=internet-of-things\">Internet of Things (IoT)<\/a> more than ever. While these technologies are convenient, efficient, and enable a higher degree of patient-centric care, they can be jeopardized by cybercriminals.<\/p>\n<p>Stolen patient data can easily be sold on the dark web to criminals looking to extort money, commit identify fraud, spearphish, and much more. An integrated, collaborative security fabric works as a seamless defense, enabling healthcare organizations to deliver <a href=\"https:\/\/www.fortinet.com\/solutions\/service-provider\/cloud.html\">security without compromising<\/a> the&nbsp;quality of patient care.<\/p>\n<p>Check out our infographic below to find out how to protect your patients&rsquo; data in a <a href=\"https:\/\/www.fortinet.com\/solutions\/industries\/healthcare.html\">digital healthcare landscape<\/a>:<\/p>\n<p>&nbsp;<\/p>\n<p align=\"center\"><iframe loading=\"lazy\"  src=\"\/\/www.slideshare.net\/slideshow\/embed_code\/key\/dbyuJFRcbB6Q35\" width=\"100%\" height=\"420\" frameborder=\"0\" ><\/iframe> <\/p>\n<div style=\"margin-bottom:5px\"><strong><a href=\"\/\/www.slideshare.net\/Fortinet\/infographic-protecting-patient-data-72290844\" target=\"_blank\" title=\"Infographic Protecting Patient Data \">Infographic Protecting Patient Data <\/a> <\/strong> from <strong><a href=\"\/\/www.slideshare.net\/Fortinet\" target=\"_blank\">Fortinet<\/a><\/strong><\/div>\n<\/p><\/div>\n<p><a href=\"http:\/\/blog.fortinet.com\/2017\/02\/20\/protecting-patient-data-in-today-s-digital-world\" target=\"bwo\" >https:\/\/blog.fortinet.com\/feed<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Susan Biddle| Date: Mon, 20 Feb 2017 09:08:45 -0800<\/strong><\/p>\n<p>The healthcare industry continues to ride the digital wave to improve patient care and organizational efficiency in addition to reducing costs. Hospitals and health systems are relying on electronic health records (EHRs), the cloud, and the Internet of Things (IoT) more than ever. While these technologies are convenient, efficient, and enable a higher degree of patient-centric care, they can be jeopardized by cybercriminals.    Stolen patient data can easily be sold on the dark web to criminals looking to extort money, commit identify fraud, spearphish,&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10424,10378],"tags":[],"class_list":["post-6695","post","type-post","status-publish","format-standard","hentry","category-fortinet","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6695","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6695"}],"version-history":[{"count":1,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6695\/revisions"}],"predecessor-version":[{"id":6726,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6695\/revisions\/6726"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6695"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6695"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6695"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}