As the Healthcare Sector takes steps to prevent the further spread of COVID-19 by providing remote options, the demand for cloud solutions has increased at a rapid rate. Special interest in the Healthcare Sector has heightened within threat actor groups due to the current state of affairs. Compromising certain on-premise tools, devices, or accounts could consequently give unauthorized access to cloud services. This data sheet digs deeper into the vulnerabilities associated with cloud computing and how to reduce those risks.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | Department of Health and Human Services (HHS) |
Published: | February 4, 2021 |
License: | Public Domain |