{"id":8308,"date":"2013-07-19T13:00:00","date_gmt":"2013-07-19T13:00:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2742485"},"modified":"2013-07-19T13:00:00","modified_gmt":"2013-07-19T13:00:00","slug":"cloud-security-in-the-healthcare-vertical","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/cloud-security-in-the-healthcare-vertical\/","title":{"rendered":"Cloud Security in the Healthcare Vertical"},"content":{"rendered":"<p>As we begin to study security, healthcare, and the cloud, we\u2019re finding that cloud-based data storage systems are perhaps more secure than traditional on-premise systems.  Most in the healthcare space have yet to accept this situation, and perhaps won\u2019t accept it until more deployments occur.<br \/>\nThe data is beginning to appear.  According to Alert Logic\u2019s Fall 2012 State of the Cloud Security Report, the variations in the threat activity are not as important as where the infrastructure is located.  The report finds that anything that can be possibly accessed from outside, whether enterprise or cloud, has equal chances of being attacked because attacks are opportunistic in nature.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2742485\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we begin to study security, healthcare, and the cloud, we&rsquo;re finding that cloud-based data storage systems are perhaps more secure than traditional on-premise systems.  Most in the healthcare space have yet to accept this situation, and perhaps won&rsquo;t accept it until more deployments occur.<br \/>\nThe data is beginning to appear.  According to Alert Logic&rsquo;s Fall 2012 State of the Cloud Security Report, the variations in the threat activity are not as important as where the infrastructure is located.  The report finds that anything that can be possibly accessed from outside, whether enterprise or cloud, has equal chances of being attacked because attacks are opportunistic in nature.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2742485\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-8308","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=8308"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/8308\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=8308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=8308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=8308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}