With data no longer confined to a single repository or network that can be locked down, guarding the perimeter simply doesn’t cut it anymore, said our panelists, who discussed the need for a layered approach to data security.
If digital identities are to be kept safe, healthcare IT and security leaders must adapt a zero trust policy, according to our panelists, who discussed the key challenges and shared their expertise during a recent webinar.
“We just re-synced the account, so you should be all set now.” “You what?” “The techs said they re-synced the account and, when they did, they saw a few issues were resolved. I don’t think you’re going to have a problem anymore.” “Really?” I asked, “Because I’ve called about this problem many, many times and […]
“OneNote … I wonder what that’s all about,” I said to myself. I’d finally upgraded my Microsoft Office suite, leapfrogging from 2007 to 2013 in one fell swoop. I figured a lot of features must have been added during those technologically fruitful years, and I was looking forward to taking advantage of it all. “You […]
Despite its ability to share, aggregate, and analyze data, Microsoft Amalga has lagged in sales and experienced a significant drop in KLAS scores over the past two years, according to a new report — Microsoft Amalga 2012: The Price of Flexibility. Although a number of providers are pleased with the results that they have achieved […]