{"id":9165,"date":"2015-05-29T13:00:24","date_gmt":"2015-05-29T20:00:24","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9165"},"modified":"2022-04-12T23:23:49","modified_gmt":"2022-04-13T06:23:49","slug":"ensuring-better-security-at-healthcare-payers","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/05\/ensuring-better-security-at-healthcare-payers\/","title":{"rendered":"Ensuring Better Security at Healthcare Payers"},"content":{"rendered":"<p>In a recent article for Enterprise Innovation, Joe Green, Palo Alto Networks VP, Systems Engineering, APAC, provides recommendations for preventing breaches at healthcare payers, which are some of the most attractive targets for cyber criminals.<\/p>\n<p>\"Payers \u2014 aka healthcare insurance companies \u2014 are like a treasure chest for cybercriminals,\" Joe writes. \"\u2026They handle not just your social security data, but also all of your personal information including financial credentials, credit card credentials, employment and income data\u2026Basically, any bit of valuable information that hackers are able to resell on the black market.\"<!--more--><\/p>\n<p>Read Joe's analysis <a href=\"http:\/\/enterpriseinnovation.net\/article\/cyberattacks-health-insurance-and-your-personal-data-30056754\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<h3>For more on Palo Alto Networks solutions for healthcare<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/industry\/healthcare\" target=\"_blank\" rel=\"noopener\">Visit our\u00a0Healthcare Solutions page<\/a><\/li>\n<li><a href=\"https:\/\/www.linkedin.com\/company\/healthcare-vertical?trk=rr_brands_carousel_name\" target=\"_blank\" rel=\"noopener\">Follow our\u00a0Security for Healthcare showcase page<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/resources\/videos\/wildfire-spotlight-health-services-hits-ns.html\" target=\"_blank\" rel=\"noopener\">Watch this customer video featuring\u00a0Health Information Technology Services Nova Scotia<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/industry\/unit42-healthcare\" target=\"_blank\" rel=\"noopener\">Check out this on-demand webinar:\u00a07 Ideas to Future-Proof Your Network Security in Healthcare<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In a recent article for Enterprise Innovation, Joe Green, Palo Alto Networks VP, Systems Engineering, APAC, provides recommendations for preventing breaches at healthcare payers, which are some of the most attractive targets &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[138,410],"tags":[1078,1197,1200,1199,1198],"coauthors":[709],"class_list":["post-9165","post","type-post","status-publish","format-standard","hentry","category-healthcare","category-vertical","tag-breaches","tag-enterprise-innovation","tag-healthcare-insurance","tag-healthcare-payers","tag-joe-green"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9165"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9165\/revisions"}],"predecessor-version":[{"id":9167,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9165\/revisions\/9167"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9165"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}