1. Strategy
2. Technology
3. Business Operations
4. Risk and Compliance
Strategy refers to having an established plan on how businesses should handle any cyber incident they may come in contact with. There should be an established plan on how to communicate with customers when an incident occurs as well as how an internal situation should be handled. Technology refers to how the organization’s information systems and malware operate. It’s especially important to …show more content…
The bottom line comes to how important it is for health care companies to control any and all access points of medical information to only authorized users. Jason Hart, the CTO of Gemalto mentioned earlier, claims that there are three steps companies should take in order to control the access and authentication of users: controlling the access and authentication of users, encrypting all sensitive data, and securely storing and managing all encryption keys. “By implementing each of these three steps into your IT infrastructure, companies can effectively prepare for a breach and avoid falling victim to one” (Snell,