How to Maximize Your Personal Health Data Defense

Protecting Personal and Healthcare Data Through Good Habits

Ellen McCullough 01937
Categories: Security

 

Gates.  Alarm systems.  Security guards.  What do they all have in common?  They are the first line of defense protecting what is most important to you.  If an attacker were to get past that guard, would you still be protected?

In the Information Security community, we use what is called a defense-in-depth, or layered, approach.  This means that if one aspect of our defense fails, there are many others to fall back on.  We call this eliminating a single point of failure. 

1234567
Share
Print
Please login or register to post comments.