<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Healthcare Cyber Defense in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Healthcare-Cyber-Defense/m-p/40387#M8498</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Applying Zero Trust&amp;nbsp; to Secure Healthcare Data&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Thinking of security as a process for using security technology effectively can mitigate risks to you as a healthcare provider and more importantly to safeguard your patient’s data. First identify your highly personal and sensitive data, map your operational flows,&amp;nbsp;implement least privilege access at on-network and on-host boundaries as needed and monitor with solutions that integrate well&amp;nbsp;together – then iterate to ensure your plan is working as it should. (Special thanks to&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/41593"&gt;elier cruz&lt;/A&gt;‌ and Evgeny Kogan for contributing to this paper.)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 11 Sep 2018 23:06:32 GMT</pubDate>
    <dc:creator>DeletedUser</dc:creator>
    <dc:date>2018-09-11T23:06:32Z</dc:date>
    <item>
      <title>Healthcare Cyber Defense</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Healthcare-Cyber-Defense/m-p/40387#M8498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;Applying Zero Trust&amp;nbsp; to Secure Healthcare Data&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Thinking of security as a process for using security technology effectively can mitigate risks to you as a healthcare provider and more importantly to safeguard your patient’s data. First identify your highly personal and sensitive data, map your operational flows,&amp;nbsp;implement least privilege access at on-network and on-host boundaries as needed and monitor with solutions that integrate well&amp;nbsp;together – then iterate to ensure your plan is working as it should. (Special thanks to&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/41593"&gt;elier cruz&lt;/A&gt;‌ and Evgeny Kogan for contributing to this paper.)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2018 23:06:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Healthcare-Cyber-Defense/m-p/40387#M8498</guid>
      <dc:creator>DeletedUser</dc:creator>
      <dc:date>2018-09-11T23:06:32Z</dc:date>
    </item>
  </channel>
</rss>

