Skip to content
Health Cyberlab

Health Cyberlab

Pragmatic cybersecurity for digital health leaders

  • Home
  • 5 Threats
    • A. Email phishing attack
    • B. Ransomware attack
    • C. Loss of equipment
    • D. Accidental / intentional data loss
    • E. Attack against medical device and patient safety
  • 10 Practices
    • 1. Email Protection
    • 2. Endpoint protection
    • 3. Access management
    • 4. Data protection
    • 5. Asset management
    • 6. Network management
    • 7. Vulnerability management
    • 8. Incident response
    • 9. Medical device security
    • 10. Cybersecurity policies
  • Strategies
  • About

4. Data protection

10 Practices, 4. Data protection

Data protection: how leaders can minimize information leak

Data protection is about keeping PHI, research data, or other sensitive information confidential. It is like having invisible fences for your confidential data.  Threat actors … Read more

Photo of author

Written by: Aldo Febro

Published on: February 7, 2022

MOTTO

start where you are,
use what you have,
do what you can,
done is better than perfect.

Recent Posts

  • Cybersecurity Policy: how leaders set the expectation for cyber hygiene
  • Medical Device Security: how leaders can secure medical devices to enhance patient safety
  • Incident Response: how leaders can prepare for cyberattacks
  • Vulnerability Management: how leaders can be proactive and ahead of attackers
  • Network Management: how leaders can secure the network and minimize impact on attacks

Looking for something

Health Cyberlab | 2023
  • Home
  • 5 Threats
    • A. Email phishing attack
    • B. Ransomware attack
    • C. Loss of equipment
    • D. Accidental / intentional data loss
    • E. Attack against medical device and patient safety
  • 10 Practices
    • 1. Email Protection
    • 2. Endpoint protection
    • 3. Access management
    • 4. Data protection
    • 5. Asset management
    • 6. Network management
    • 7. Vulnerability management
    • 8. Incident response
    • 9. Medical device security
    • 10. Cybersecurity policies
  • Strategies
  • About