1
Confirm Secure Supply Chain for purchased devices The Cybersecurity Checklist Follow the 4 keys to protect your organization from cyberthreats. $408 The average cost per record of a healthcare breach — more than double any other industry 1 21% of healthcare employees write down their usernames and passwords near their computers 3 1 https://healthitsecurity.com/news/healthcare-data-breach-costs-remain-highest- among-industries 2 https://www.beckershospitalreview.com/cybersecurity/stolen-flash-drive-potentially- exposes-27-000-nevada-hospital-patients.html 3 https://www.accenture.com/us-en/blogs/blogs-losing-cybersecurity-culture-war, 2018 4 https://www.hipaajournal.com/study-healthcare-employees-phishing-attacks/ © 2019 Lenovo. All rights reserved. Use Coronet technology to warn users of suspicious behavior Isolate Internet applications and contain cyberattacks using BUFFERZONE® Predict attacks with AI and machine learning Unify cloud and endpoint security with endpoint management Secure the perimeter. Cloud storage is only as strong as the network used to access it. Online 4 Multiple authentication options on all devices — passwords, PINs, fingerprints, and facial recognition Remote management with Absolute risk management Update and repair — Sensitive data stays secure when we wipe drives and securely recycle parts Devices Manage and maintain. 2 phishing email scams 4 Healthcare employees click on OUT OF EVERY 27,000 patient records were recently exposed from 1 stolen flash drive 2 1 7 Learn more: Download the Lenovo ThinkShield guide to cybersecurity for healthcare. Shielding Healthcare from Cyberthreats 4 Keys Provide End-to-End Protection Lenovo Health Align facility and device authentication with RFID/NFC technology Set auto-logoff protections using presence detection Securely facilitate EPCS with FIPS 201-compliant fingerprint readers Log in to Windows Hello instantly and securely using facial recognition Protect clinicians without impeding patient care. 3 Identity Restrict access. Lock data away from personnel who don’t need to interact with it. Use virtual desktop infrastructure (VDI) to move all data to the cloud and manage user access Prevent visual hacking with privacy screens and presence detection technology Encrypt data on devices in case of loss or theft Keep Your Drive when recycling devices Data 1

The Cybersecurity Checklist...Healthcare employees click on OUT OF EVERY 27,000 patient records were recently exposed from 1 stolen flash drive2 1 7 Learn more: Download the Lenovo

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Cybersecurity Checklist...Healthcare employees click on OUT OF EVERY 27,000 patient records were recently exposed from 1 stolen flash drive2 1 7 Learn more: Download the Lenovo

Confirm Secure Supply Chain

for purchased devices

The Cybersecurity ChecklistFollow the 4 keys to protect your organization from cyberthreats.

$408The average cost per record of a healthcare breach — more than double any other industry1

21%of healthcare employees write down their usernames and passwords near their computers3

1 https://healthitsecurity.com/news/healthcare-data-breach-costs-remain-highest- among-industries2 https://www.beckershospitalreview.com/cybersecurity/stolen-flash-drive-potentially- exposes-27-000-nevada-hospital-patients.html3 https://www.accenture.com/us-en/blogs/blogs-losing-cybersecurity-culture-war, 20184 https://www.hipaajournal.com/study-healthcare-employees-phishing-attacks/

© 2019 Lenovo. All rights reserved.

Use Coronet technology to warn users of

suspicious behavior

Isolate Internet applications

and contain cyberattacks using BUFFERZONE®

Predict attacks with AI and

machine learning

Unify cloud and endpoint security

with endpoint management

Secure the perimeter. Cloud storage is only as strong

as the network used to access it.

Online4

Multiple authentication options

on all devices — passwords, PINs, fingerprints, and

facial recognition

Remote management with Absolute

risk management

Update and repair — Sensitive data stays secure when we wipe drives and

securely recycle parts

Devices

Manage and maintain.

2

phishing email scams4

Healthcare employees click on

OUT OF EVERY

27,000 patient records were recently exposed from 1 stolen flash drive2

1 7

Learn more: Download the Lenovo ThinkShield guide to cybersecurity for healthcare.

Shielding Healthcare from Cyberthreats4 Keys Provide End-to-End Protection

Lenovo Health

Align facility and device authentication

with RFID/NFC technology

Set auto-logo� protections using presence detection

Securely facilitate EPCS with FIPS 201-compliant

fingerprint readers

Log in to Windows Hello instantly and securely

using facial recognition

Protect clinicians without impeding

patient care.

3Identity

Restrict access. Lock data away from personnel who don’t

need to interact with it.

Use virtual desktop infrastructure

(VDI) to move all data to the cloud and manage user access

Prevent visual hacking with privacy screens

and presence detection technology

Encrypt data on devices in case

of loss or theft

Keep Your Drivewhen recycling devices

Data1