{"id":3554,"date":"2023-04-12T11:27:00","date_gmt":"2023-04-12T11:27:00","guid":{"rendered":"https:\/\/recomp.5oclock.io\/?p=3554"},"modified":"2024-04-05T13:31:53","modified_gmt":"2024-04-05T13:31:53","slug":"healthcare-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.compucom.com\/healthcare-cybersecurity\/","title":{"rendered":"Healthcare Cybersecurity"},"content":{"rendered":"\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"border:1px solid rgba(193, 46, 107, 0.3); color:#000018;  font-family:'Poppins'; font-size:14px; line-height: 18px; padding: 10px 2em 10px 10px; display: inline-block; border-bottom-right-radius: 15px;\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/05\/compucom-editorial-team.png\" style=\"margin-top: -40px; float: left; max-width: 60px; border-radius: 50px; box-shadow: 1px 1px 5px 1px #999;\" alt=\"Compucom Editorial Team\"><p style=\"padding-left:6em; margin:0;\">{{dc:author:display_name}}<\/p><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">Managed Service Providers Help Protect You and Your Patients<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"blog-link\">With the high rate of cyberattacks in the healthcare industry expected to continue, it\u2019s more a question <em>of when<\/em> a provider will be attacked <em>than if<\/em>. During January 2023 alone, <strong><a href=\"https:\/\/ocrportal.hhs.gov\/ocr\/breach\/breach_report.jsf\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"text-decoration: underline;\">30 breach cases<\/span><\/a><\/strong> for healthcare providers were investigated by the U.S. Department of Health and Human Services Office for Civil Rights.<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#c12e6b;color:#c12e6b\"\/>\n\n\n\n<p><strong>Learn more about:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"blog-link\"><a href=\"#hackers\"><span style=\"text-decoration: underline;\">Healthcare Providers are a Favorite Target for Hackers<\/span><\/a><\/li>\n\n\n\n<li class=\"blog-link\"><a href=\"#msp\"><span style=\"text-decoration: underline;\">MSPs Provide Partnership and Planning<\/span><\/a><\/li>\n\n\n\n<li class=\"blog-link\"><a href=\"#study\"><u>Case Study: Compucom Oversees Dramatic Cybersecurity Improvements for a Large Healthcare Service Provider<\/u><\/a><\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#c12e6b;color:#c12e6b\"\/>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"hackers\" style=\"font-size:30px;font-style:normal;font-weight:600\">Healthcare Providers are a Favorite Target for Hackers<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Healthcare organizations are an ideal target of cybercriminals due to the high monetary and intelligence value of the data they possess, including intellectual property such as research and patients\u2019 personally identifying information (PII), health records, and financial information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"msp\" style=\"font-size:30px;font-style:normal;font-weight:600\">MSPs Provide Partnership and Planning<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Since human error is usually the biggest vulnerability in any cybersecurity system, a serious cyber-resilience strategy should include organization-wide buy-in, training, and compliance in the prevention and recovery of data breaches. Purchasing the right set of tools is just the beginning. Careful planning is needed to prevent attacks and ensure a quick recovery.<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<blockquote class=\"wp-block-quote blog-link is-layout-flow wp-block-quote-is-layout-flow\" style=\"font-size:16px;font-style:normal;font-weight:600\">\n<p class=\"blog-blockquote has-text-color has-link-color wp-elements-8504cec7f6b619aee33eca0058bf05b8\" style=\"color:#000018;font-size:18px\"><strong>&#8220;<\/strong>Aligning cybersecurity and patient safety initiatives not only will help your organization protect patient safety and privacy, but will also ensure continuity of effective delivery of high-quality care by mitigating disruptions that can have a negative impact on clinical outcomes.<strong>&#8220;<\/strong><\/p>\n<cite>John Riggi, <a href=\"http:\/\/John Riggi, Senior Advisor for Cybersecurity and Risk, American Hospital Association\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"text-decoration: underline;\">Senior Advisor for Cybersecurity and Risk<\/span><\/a>, American Hospital Association<\/cite><\/blockquote>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"blog-link\">Staying on top of constant threats can be too much for a healthcare provider&#8217;s internal IT team. Outsourcing the management of cybersecurity improvements to a reliable MSP that partners with trusted names in the industry, such as <strong><a href=\"\/partners\/cisco\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"text-decoration: underline;\">Cisco\u00ae<\/span><\/a><\/strong> and <strong><a href=\"https:\/\/stratejm.com\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"text-decoration: underline;\">Stratejm<\/span><\/a><\/strong>, helps healthcare providers stay ahead of the threats.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"study\" style=\"font-size:30px;font-style:normal;font-weight:600\">Case Study<\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-text-color has-medium-font-size\" style=\"color:#000018;font-style:normal;font-weight:500\"><strong>Compucom Oversees Dramatic Cybersecurity Improvements for a Large Healthcare Service Provider<\/strong><\/h3>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In 2022, Compucom oversaw a project to improve cybersecurity for a hospital system after it suffered a malware attack. Working closely with the hospital system&#8217;s IT team, we moved quickly to review their security posture and develop an incident response plan. This included tabletop exercises with a facilitator to discuss roles and responses in an emergency and for a business continuity plan.<\/p>\n\n\n\n<p>We then partnered with Cisco\u00ae and Stratejm to deliver a complete cybersecurity solution. The following steps were taken:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To quickly protect the hospital system\u2019s users, we rolled out the cloud-delivered Cisco Umbrella suite. This provided the protection and visibility needed to assess the current threat landscape.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>We secured their email system, deploying Cisco Secure Email to handle phishing attacks, business email compromises, and malicious content.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>By implementing Cisco Duo, we introduced zero-trust capability with two-factor authentication (2FA) to users. This was part of our plan to protect remote access, ensure device trust, and consolidate access with single sign-on.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A user awareness program was created, which included a phishing email simulation.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>To complement the updated security infrastructure, we introduced security-operations-center (SOC) services through Stratejm\u2019s Managed Security Services. SOC services use people, processes, and technology to constantly monitor an organization\u2019s network \u2014 preventing, detecting, analyzing, and rapidly responding to cybersecurity threats while continuously improving the organization\u2019s security posture.<\/li>\n<\/ul>\n\n\n\n<p>With the solution provided by Compucom and Cisco, and the Stratejm service to help guide our customer in the future, the hospital system will now be proactive, aware, and able to get ahead of vulnerabilities.<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#c12e6b;color:#c12e6b\"\/>\n<\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">Compucom: A One-Stop Shop for All Your IT Needs<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>During these challenging times for healthcare, a Managed Service Provider (MSP) can be your greatest ally for improving cybersecurity posture, optimizing patient experience, and reaching new levels of IT efficiency.\u202f<\/p>\n\n\n\n<p class=\"blog-link\">A recognized MSP such as Compucom, with strong <strong><a href=\"\/partners\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"text-decoration: underline;\">OEM relationships<\/span><\/a><\/strong> and a broad range of services, including <strong><a href=\"\/it-staffing-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"text-decoration: underline;\">professional services and IT staffing<\/span><\/a><\/strong>, streamlines and reduces costs for your organization. By getting multiple services from one provider, you simplify IT and gain a strategic partner who deeply understands your operations and can add value to all aspects of your business. Lean on us for all things IT and free your organization to focus on what\u2019s most important \u2014 saving and improving patient lives.\u202f\u202f<\/p>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100 is-style-fill\"><a class=\"wp-block-button__link has-white-color has-text-color has-background wp-element-button\" href=\"\/contact\" style=\"border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-left-radius:0px;border-bottom-right-radius:15px;background-color:#c12e6b\" target=\"_blank\" rel=\"noreferrer noopener\">LET&#8217;S TALK!<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>With the high rate of cyberattacks in the healthcare industry expected to continue, it\u2019s more a question of when a provider will be attacked than if. During January 2023 alone, 30 breach cases for healthcare providers were investigated by the U.S. Department of Health and Human Services Office for Civil Rights.<\/p>\n","protected":false},"author":8,"featured_media":3701,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[49],"tags":[66,38],"class_list":["post-3554","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-projects-and-professional-services","tag-cybersecurity","tag-healthcare"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Healthcare Cybersecurity - Compucom<\/title>\n<meta name=\"description\" content=\"Healthcare organizations are an ideal target of cybercriminals due to the high monetary and intelligence value of the data they possess.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.compucom.com\/healthcare-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Healthcare Cybersecurity - Compucom\" \/>\n<meta property=\"og:description\" content=\"Healthcare organizations are an ideal target of cybercriminals due to the high monetary and intelligence value of the data they possess.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.compucom.com\/healthcare-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Compucom\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-12T11:27:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-05T13:31:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2023\/04\/Compucom-Blog-Healthcare-Cybersecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marketing Compucom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marketing Compucom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/healthcare-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/healthcare-cybersecurity\\\/\"},\"author\":{\"name\":\"Marketing Compucom\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/person\\\/be387b21474553c122312d1fa0f86f0a\"},\"headline\":\"Healthcare Cybersecurity\",\"datePublished\":\"2023-04-12T11:27:00+00:00\",\"dateModified\":\"2024-04-05T13:31:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/healthcare-cybersecurity\\\/\"},\"wordCount\":692,\"publisher\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/healthcare-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Compucom-Blog-Healthcare-Cybersecurity.png\",\"keywords\":[\"Cybersecurity\",\"Healthcare\"],\"articleSection\":[\"Projects and Professional Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/healthcare-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/healthcare-cybersecurity\\\/\",\"name\":\"Healthcare Cybersecurity - Compucom\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/healthcare-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/healthcare-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Compucom-Blog-Healthcare-Cybersecurity.png\",\"datePublished\":\"2023-04-12T11:27:00+00:00\",\"dateModified\":\"2024-04-05T13:31:53+00:00\",\"description\":\"Healthcare organizations are an ideal target of cybercriminals due to the high monetary and intelligence value of the data they possess.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/healthcare-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.compucom.com\\\/healthcare-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/healthcare-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Compucom-Blog-Healthcare-Cybersecurity.png\",\"contentUrl\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Compucom-Blog-Healthcare-Cybersecurity.png\",\"width\":1200,\"height\":628,\"caption\":\"Compucom Blog - Healthcare Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/healthcare-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.compucom.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Healthcare Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#website\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/\",\"name\":\"Compucom\",\"description\":\"Technology Driven. People Powered.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.compucom.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#organization\",\"name\":\"CompuCom Systems Inc\",\"alternateName\":\"Compucom\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/\\\/app\\\/data\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cropped-compucom-faivcon-e1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.compucom.com\\\/\\\/app\\\/data\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cropped-compucom-faivcon-e1.jpg\",\"width\":512,\"height\":512,\"caption\":\"CompuCom Systems Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/compucom\\\/posts\\\/?feedView=all\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/person\\\/be387b21474553c122312d1fa0f86f0a\",\"name\":\"Marketing Compucom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g\",\"caption\":\"Marketing Compucom\"},\"url\":\"https:\\\/\\\/www.compucom.com\\\/author\\\/marketing_chicomp101\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Healthcare Cybersecurity - Compucom","description":"Healthcare organizations are an ideal target of cybercriminals due to the high monetary and intelligence value of the data they possess.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.compucom.com\/healthcare-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Healthcare Cybersecurity - Compucom","og_description":"Healthcare organizations are an ideal target of cybercriminals due to the high monetary and intelligence value of the data they possess.","og_url":"https:\/\/www.compucom.com\/healthcare-cybersecurity\/","og_site_name":"Compucom","article_published_time":"2023-04-12T11:27:00+00:00","article_modified_time":"2024-04-05T13:31:53+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2023\/04\/Compucom-Blog-Healthcare-Cybersecurity.png","type":"image\/png"}],"author":"Marketing Compucom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Marketing Compucom","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.compucom.com\/healthcare-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.compucom.com\/healthcare-cybersecurity\/"},"author":{"name":"Marketing Compucom","@id":"https:\/\/www.compucom.com\/#\/schema\/person\/be387b21474553c122312d1fa0f86f0a"},"headline":"Healthcare Cybersecurity","datePublished":"2023-04-12T11:27:00+00:00","dateModified":"2024-04-05T13:31:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.compucom.com\/healthcare-cybersecurity\/"},"wordCount":692,"publisher":{"@id":"https:\/\/www.compucom.com\/#organization"},"image":{"@id":"https:\/\/www.compucom.com\/healthcare-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.compucom.com\/wp-content\/uploads\/2023\/04\/Compucom-Blog-Healthcare-Cybersecurity.png","keywords":["Cybersecurity","Healthcare"],"articleSection":["Projects and Professional Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.compucom.com\/healthcare-cybersecurity\/","url":"https:\/\/www.compucom.com\/healthcare-cybersecurity\/","name":"Healthcare Cybersecurity - Compucom","isPartOf":{"@id":"https:\/\/www.compucom.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.compucom.com\/healthcare-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.compucom.com\/healthcare-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.compucom.com\/wp-content\/uploads\/2023\/04\/Compucom-Blog-Healthcare-Cybersecurity.png","datePublished":"2023-04-12T11:27:00+00:00","dateModified":"2024-04-05T13:31:53+00:00","description":"Healthcare organizations are an ideal target of cybercriminals due to the high monetary and intelligence value of the data they possess.","breadcrumb":{"@id":"https:\/\/www.compucom.com\/healthcare-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.compucom.com\/healthcare-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.compucom.com\/healthcare-cybersecurity\/#primaryimage","url":"https:\/\/www.compucom.com\/wp-content\/uploads\/2023\/04\/Compucom-Blog-Healthcare-Cybersecurity.png","contentUrl":"https:\/\/www.compucom.com\/wp-content\/uploads\/2023\/04\/Compucom-Blog-Healthcare-Cybersecurity.png","width":1200,"height":628,"caption":"Compucom Blog - Healthcare Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.compucom.com\/healthcare-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.compucom.com\/"},{"@type":"ListItem","position":2,"name":"Healthcare Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.compucom.com\/#website","url":"https:\/\/www.compucom.com\/","name":"Compucom","description":"Technology Driven. People Powered.","publisher":{"@id":"https:\/\/www.compucom.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.compucom.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.compucom.com\/#organization","name":"CompuCom Systems Inc","alternateName":"Compucom","url":"https:\/\/www.compucom.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.compucom.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2022\/05\/cropped-compucom-faivcon-e1.jpg","contentUrl":"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2022\/05\/cropped-compucom-faivcon-e1.jpg","width":512,"height":512,"caption":"CompuCom Systems Inc"},"image":{"@id":"https:\/\/www.compucom.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/compucom\/posts\/?feedView=all"]},{"@type":"Person","@id":"https:\/\/www.compucom.com\/#\/schema\/person\/be387b21474553c122312d1fa0f86f0a","name":"Marketing Compucom","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g","caption":"Marketing Compucom"},"url":"https:\/\/www.compucom.com\/author\/marketing_chicomp101\/"}]}},"_links":{"self":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts\/3554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/comments?post=3554"}],"version-history":[{"count":1,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts\/3554\/revisions"}],"predecessor-version":[{"id":5547,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts\/3554\/revisions\/5547"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/media\/3701"}],"wp:attachment":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/media?parent=3554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/categories?post=3554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/tags?post=3554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}