Oct. 27, 2022, 11 a.m. | Jessica Davis

SC Magazine feed for Strategy www.scmagazine.com

Email is typically used as a mere pivot point for threat actors. As healthcare regulations require evidence no patient data was accessed, providers must consider their PHI and data retention policies for these vulnerable platforms.

compliance email email security forensics healthcare privacy problem security security awareness social engineering

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Solution Architect

@ Civica | London, England, United Kingdom

Information Security Officer (80-100%)

@ SIX Group | Zurich, CH

Cloud Information Systems Security Engineer

@ Analytic Solutions Group | Chantilly, Virginia, United States

SRE Engineer & Security Software Administrator

@ Talan | Mexico City, Spain