Mammoth Hospital's Prescription For Preventing Insider Data Leaks
Click here to download now
Overview: To prevent patient healthcare records from walking away on flash drives and other personal devices, this hospital has implemented a phased deployment of device/port access control. In the first phase, IT audits/shadows all download and upload activity at endpoint ports and drives. Observations about how employees are using their devices are key to setting effective device-related security policies. Next steps include allowing only sanctioned encrypted devices to access endpoint ports and drives. This case study will explore the capabilities of device/port access control and the reasoning behind each phase, as the hospital strives to balance business productivity with security compliance measures.