{"id":5089,"date":"2024-03-01T08:47:00","date_gmt":"2024-03-01T08:47:00","guid":{"rendered":"https:\/\/www.compucom.com\/?p=5089"},"modified":"2024-04-05T13:36:42","modified_gmt":"2024-04-05T13:36:42","slug":"protect-healthcare-data-without-sacrificing-device-usability","status":"publish","type":"post","link":"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/","title":{"rendered":"Protect Healthcare Data Without Sacrificing Device Usability"},"content":{"rendered":"\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"border:1px solid rgba(193, 46, 107, 0.3); color:#000018;  font-family:'Poppins'; font-size:14px; line-height: 18px; padding: 10px 2em 10px 10px; display: inline-block;\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/05\/cropped-compucom-ico.png\" style=\"margin-top: -40px; float: left; max-width: 60px; border-radius: 50px; box-shadow: 1px 1px 5px 1px #999;\" alt=\"Fred Ibrahimsha, Cybersecurity Solutions Practice Lead\"><p style=\"padding-left:6em; margin:0;\"><strong>Fred Ibrahimsha<\/strong> \u2022\u202fCybersecurity Solutions Practice Lead<!--<br><span style=\"font-size:11px; color:rgba(0, 0, 0, 0.66);\">{{dc:post:publish_date}}<\/span>--><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>The increased pace of digital transformation in healthcare over the past few years, with improvements such as patient record access from mobile devices, has improved patient care and streamlined workflows. However, it has also introduced new data security and privacy risks for <strong>electronic health records (EHR)<\/strong>. This is especially alarming with the current rate and sophistication of cyberattacks. &nbsp;<\/p>\n\n\n\n<p>While steps must be taken to protect patients and ensure <strong>HIPAA (Health Insurance Portability and Accountability Act of 1996)<\/strong> compliance, it\u2019s vitally important that security measures don&#8217;t burden healthcare staff or delay patient care by reducing the usability of their devices. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">Don\u2019t Mess with HIPAA&nbsp;<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"blog-link\"><a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/security\/index.html\" rel=\"noreferrer noopener\" target=\"_blank\">HIPAA compliance<\/a> is not only a legal obligation under federal law but also a business imperative. Failing to comply can result in civil and criminal penalties of over a million dollars per year for each identical violation. Even greater costs can come for healthcare organizations from the resulting reputational damage and loss of business, not to mention harm to the affected individuals whose electronic protected health information (ePHI) may be exposed, stolen, or misused.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">Best Practices to Help Meet HIPAA\u2019s Stringent Requirements&nbsp;<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"blog-link\">Users and devices are often the weakest link in the security chain and the most common target of attacks in an industry that is a favorite target for criminals. In 2023, there were <a href=\"https:\/\/www.statista.com\/statistics\/798417\/health-and-medical-data-compromises-united-states\/\" rel=\"noreferrer noopener\" target=\"_blank\">809 incidents involving data compromise in the US healthcare<\/a> sector \u2014 an all-time high. &nbsp;<\/p>\n\n\n\n<p>Device security is a critical component of HIPAA compliance. With your hardworking healthcare staff already under pressure, it&#8217;s unwise to force them to choose between compliance or providing timely patient care, which can happen when staff must jump through hoops for security on their devices.<\/p>\n\n\n\n<p>There are several ways <strong>managed services providers (MSP)<\/strong> can help you meet HIPAA&#8217;s regulations while ensuring technology is usable and efficient for healthcare staff.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-color has-medium-font-size\" style=\"color:#000018;font-style:normal;font-weight:500\"><strong>Modern Device Management<\/strong><\/h3>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>With Modern Device Management (MDM), a healthcare organization can oversee and control all devices within their network so they can ensure the devices are secure, compliant, and optimized. Key aspects of MDM include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Configuration management<\/li>\n\n\n\n<li>Patch management<\/li>\n\n\n\n<li>Device inventory management<\/li>\n\n\n\n<li>Remote monitoring and troubleshooting<\/li>\n<\/ul>\n\n\n\n<p>Effective device management improves security by preventing unauthorized access, enforcing security policies, and minimizing risks. Ensuring devices are well maintained also helps healthcare staff remain productive.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-color has-medium-font-size\" style=\"color:#000018;font-style:normal;font-weight:500\"><strong>Device Lifecycle Services<\/strong><\/h3>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>While it\u2019s convenient for clinicians and hospital staff to use smartphones and tablets, loss, misplacement, or theft becomes more common with mobile devices. To protect sensitive data, there must be accountability for these devices throughout their lifecycle.<\/p>\n\n\n\n<p>Device Lifecycle services cover the entire lifespan of a device, from acquisition to disposal. Key stages include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Procurement:<\/strong> Selecting devices with security considerations in mind.<\/li>\n\n\n\n<li><strong>Provisioning:<\/strong> Setting up essential security settings and installing necessary software.<\/li>\n\n\n\n<li><strong>Maintenance:<\/strong> Regularly updating, patching, and monitoring devices.<\/li>\n\n\n\n<li><strong>Disposition:<\/strong> Ensuring a secure retirement process, including wiping sensitive data and proper disposal of devices.<\/li>\n<\/ul>\n\n\n\n<p>Compucom can provide a single chain of custody for your assets with services performed in-house at our secure Advanced Configuration Centers, giving you the accountability and peace of mind you need for compliance with requirements like HIPAA. \u202f<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-color has-medium-font-size\" style=\"color:#000018;font-style:normal;font-weight:500\"><strong>Zero Trust<\/strong><\/h3>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Zero Trust is a security framework that assumes no implicit trust for any user or device, even from within the network. Unlike perimeter-based security, it operates under the assumption that breaches will happen and takes a more cautious approach. Some main principles of Zero Trust include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Least privilege access:<\/strong> Providing users and devices with only essential access rights.<\/li>\n\n\n\n<li><strong>Micro-segmentation:<\/strong> Isolating network segments to limit lateral movement and minimize the damage of any potential breach.<\/li>\n\n\n\n<li><strong>Continuous authentication and authorization:<\/strong> Verifying user and device identity for every interaction.<\/li>\n<\/ul>\n\n\n\n<p><strong>Multi-Factor Authentication (MFA)<\/strong> fits into the Zero Trust model. It requires users to provide multiple authentication factors, such as a password, a one-time PIN, or biometrics, to access resources. By combining something the user knows (a password) with something they have (a smartphone), MFA enhances security.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">Modern Device Management<\/h2>\n\n\n\n<p class=\"blog-link\">In our five-part AIOps series, we\u2019ve explained <a href=\"\/the-big-deal-about-aiops\" target=\"_blank\" rel=\"noreferrer noopener\">what it is<\/a>, how it works (<a href=\"\/how-aiops-works-tame-big-data-and-get-to-the-crux-of-the-matter\" target=\"_blank\" rel=\"noreferrer noopener\">part 1<\/a> and <a href=\"\/how-aiops-continually-smarter-more-effective-it-operations\" target=\"_blank\" rel=\"noreferrer noopener\">part 2<\/a>), and <a href=\"\/aiops-going-beyond-the-buzzword\" target=\"_blank\" rel=\"noreferrer noopener\">offered advice<\/a> on how to go beyond the hype to get its full advantages (hint: it\u2019s all about the proper integration of toolsets with your IT systems). Finally, we\u2019ve concluded with some real-world examples of its benefits.<\/p>\n\n\n\n<p>To optimize IT operations, your IT team needs to understand the big picture by correlating metrics, events, and logs and then connecting the dots to figure out solutions. AIOps gives them automation and advanced tools to help them achieve that.<\/p>\n\n\n\n<p>Partner with a provider with real-world experience, like Compucom, and go beyond the buzzword to truly effective AIOps.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">Compucom Helps Customers with Compliance and Usability<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>We&#8217;re focused on our healthcare customers meeting their business goals. This usually means helping them meet strict compliance requirements while simultaneously ensuring their staff have a digital experience that will keep them productive. &nbsp;<\/p>\n\n\n\n<p class=\"blog-link\">For example, we often recommend and help customers implement <a href=\"https:\/\/duo.com\/\" rel=\"noreferrer noopener\" target=\"_blank\">Cisco Duo<\/a> to enhance the usability of Multi-Factor Authentication while maintaining robust security and compliance with HIPAA and <strong>EPCS (Electronic Prescription of Controlled Substances)<\/strong>. Cisco Duo can help achieve this balance through:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Non-disruptive and risk-based authentication:<\/strong> A fast and seamless login experience, with increased security for more risky login attempts.<\/li>\n\n\n\n<li><strong>Quick integration:<\/strong> Easily added to any application on any device from anywhere. This ensures users frictionless access to resources such as Epic.<\/li>\n\n\n\n<li><strong>Flexibility:<\/strong> Authentication can happen through several methods, such as the Duo Push mobile app, biometrics, or tokens.<\/li>\n\n\n\n<li><strong>Prescriptions from anywhere:<\/strong> Duo\u2019s MFA allows user to self-enroll and approve e-prescriptions from their smartphones.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p class=\"blog-link\">Staying on top of constant threats can be a lot for a healthcare provider&#8217;s internal team. Through our <a href=\"\/healthcare-cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\">partnerships with industry leaders such as Cisco<\/a>, we can help you stay ahead of the threats.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-size:30px;font-style:normal;font-weight:600\">A Trusted Partner for Healthcare&nbsp;<\/h2>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>We\u2019ve designed our comprehensive portfolio of IT services to provide the sourcing, integration, and support you need for your technology. Let us be your one-stop shop for all things IT, freeing up time for your internal teams to focus on other critical initiatives that can further improve patient care.\u202f&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The increased pace of digital transformation in healthcare over the past few years, with improvements such as patient record access from mobile devices, has improved patient care and streamlined workflows. However, it has also introduced new data security and privacy risks for electronic health records (EHR). This is especially alarming with the current rate and sophistication of cyberattacks. <\/p>\n","protected":false},"author":8,"featured_media":5311,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[44,48],"tags":[66,67,38],"class_list":["post-5089","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-device-lifecycle-services","category-endpoint-management","tag-cybersecurity","tag-dex","tag-healthcare"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect Healthcare Data Without Sacrificing Device Usability - Compucom<\/title>\n<meta name=\"description\" content=\"Device security is a critical component of HIPAA compliance. There are several ways managed services providers (MSP) can help you meet HIPAA&#039;s regulations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Healthcare Data Without Sacrificing Device Usability - Compucom\" \/>\n<meta property=\"og:description\" content=\"Device security is a critical component of HIPAA compliance. There are several ways managed services providers (MSP) can help you meet HIPAA&#039;s regulations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/\" \/>\n<meta property=\"og:site_name\" content=\"Compucom\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-01T08:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-05T13:36:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2024\/03\/Compucom-Blog-Protect-Healthcare-Data-Without-Sacrificing-Device-Usability.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marketing Compucom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marketing Compucom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-healthcare-data-without-sacrificing-device-usability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-healthcare-data-without-sacrificing-device-usability\\\/\"},\"author\":{\"name\":\"Marketing Compucom\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/person\\\/be387b21474553c122312d1fa0f86f0a\"},\"headline\":\"Protect Healthcare Data Without Sacrificing Device Usability\",\"datePublished\":\"2024-03-01T08:47:00+00:00\",\"dateModified\":\"2024-04-05T13:36:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-healthcare-data-without-sacrificing-device-usability\\\/\"},\"wordCount\":1036,\"publisher\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-healthcare-data-without-sacrificing-device-usability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Compucom-Blog-Protect-Healthcare-Data-Without-Sacrificing-Device-Usability.jpg\",\"keywords\":[\"Cybersecurity\",\"DEX\",\"Healthcare\"],\"articleSection\":[\"Device Lifecycle Services\",\"Endpoint Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-healthcare-data-without-sacrificing-device-usability\\\/\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/protect-healthcare-data-without-sacrificing-device-usability\\\/\",\"name\":\"Protect Healthcare Data Without Sacrificing Device Usability - Compucom\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-healthcare-data-without-sacrificing-device-usability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-healthcare-data-without-sacrificing-device-usability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Compucom-Blog-Protect-Healthcare-Data-Without-Sacrificing-Device-Usability.jpg\",\"datePublished\":\"2024-03-01T08:47:00+00:00\",\"dateModified\":\"2024-04-05T13:36:42+00:00\",\"description\":\"Device security is a critical component of HIPAA compliance. There are several ways managed services providers (MSP) can help you meet HIPAA's regulations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-healthcare-data-without-sacrificing-device-usability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.compucom.com\\\/protect-healthcare-data-without-sacrificing-device-usability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-healthcare-data-without-sacrificing-device-usability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Compucom-Blog-Protect-Healthcare-Data-Without-Sacrificing-Device-Usability.jpg\",\"contentUrl\":\"https:\\\/\\\/www.compucom.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Compucom-Blog-Protect-Healthcare-Data-Without-Sacrificing-Device-Usability.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Healthcare professional working on a laptop related to cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/protect-healthcare-data-without-sacrificing-device-usability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.compucom.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect Healthcare Data Without Sacrificing Device Usability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#website\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/\",\"name\":\"Compucom\",\"description\":\"Technology Driven. People Powered.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.compucom.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#organization\",\"name\":\"CompuCom Systems Inc\",\"alternateName\":\"Compucom\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.compucom.com\\\/\\\/app\\\/data\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cropped-compucom-faivcon-e1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.compucom.com\\\/\\\/app\\\/data\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/cropped-compucom-faivcon-e1.jpg\",\"width\":512,\"height\":512,\"caption\":\"CompuCom Systems Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/compucom\\\/posts\\\/?feedView=all\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.compucom.com\\\/#\\\/schema\\\/person\\\/be387b21474553c122312d1fa0f86f0a\",\"name\":\"Marketing Compucom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g\",\"caption\":\"Marketing Compucom\"},\"url\":\"https:\\\/\\\/www.compucom.com\\\/author\\\/marketing_chicomp101\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect Healthcare Data Without Sacrificing Device Usability - Compucom","description":"Device security is a critical component of HIPAA compliance. There are several ways managed services providers (MSP) can help you meet HIPAA's regulations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/","og_locale":"en_US","og_type":"article","og_title":"Protect Healthcare Data Without Sacrificing Device Usability - Compucom","og_description":"Device security is a critical component of HIPAA compliance. There are several ways managed services providers (MSP) can help you meet HIPAA's regulations.","og_url":"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/","og_site_name":"Compucom","article_published_time":"2024-03-01T08:47:00+00:00","article_modified_time":"2024-04-05T13:36:42+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2024\/03\/Compucom-Blog-Protect-Healthcare-Data-Without-Sacrificing-Device-Usability.jpg","type":"image\/jpeg"}],"author":"Marketing Compucom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Marketing Compucom","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/#article","isPartOf":{"@id":"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/"},"author":{"name":"Marketing Compucom","@id":"https:\/\/www.compucom.com\/#\/schema\/person\/be387b21474553c122312d1fa0f86f0a"},"headline":"Protect Healthcare Data Without Sacrificing Device Usability","datePublished":"2024-03-01T08:47:00+00:00","dateModified":"2024-04-05T13:36:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/"},"wordCount":1036,"publisher":{"@id":"https:\/\/www.compucom.com\/#organization"},"image":{"@id":"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.compucom.com\/wp-content\/uploads\/2024\/03\/Compucom-Blog-Protect-Healthcare-Data-Without-Sacrificing-Device-Usability.jpg","keywords":["Cybersecurity","DEX","Healthcare"],"articleSection":["Device Lifecycle Services","Endpoint Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/","url":"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/","name":"Protect Healthcare Data Without Sacrificing Device Usability - Compucom","isPartOf":{"@id":"https:\/\/www.compucom.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/#primaryimage"},"image":{"@id":"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.compucom.com\/wp-content\/uploads\/2024\/03\/Compucom-Blog-Protect-Healthcare-Data-Without-Sacrificing-Device-Usability.jpg","datePublished":"2024-03-01T08:47:00+00:00","dateModified":"2024-04-05T13:36:42+00:00","description":"Device security is a critical component of HIPAA compliance. There are several ways managed services providers (MSP) can help you meet HIPAA's regulations.","breadcrumb":{"@id":"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/#primaryimage","url":"https:\/\/www.compucom.com\/wp-content\/uploads\/2024\/03\/Compucom-Blog-Protect-Healthcare-Data-Without-Sacrificing-Device-Usability.jpg","contentUrl":"https:\/\/www.compucom.com\/wp-content\/uploads\/2024\/03\/Compucom-Blog-Protect-Healthcare-Data-Without-Sacrificing-Device-Usability.jpg","width":1200,"height":628,"caption":"Healthcare professional working on a laptop related to cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.compucom.com\/protect-healthcare-data-without-sacrificing-device-usability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.compucom.com\/"},{"@type":"ListItem","position":2,"name":"Protect Healthcare Data Without Sacrificing Device Usability"}]},{"@type":"WebSite","@id":"https:\/\/www.compucom.com\/#website","url":"https:\/\/www.compucom.com\/","name":"Compucom","description":"Technology Driven. People Powered.","publisher":{"@id":"https:\/\/www.compucom.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.compucom.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.compucom.com\/#organization","name":"CompuCom Systems Inc","alternateName":"Compucom","url":"https:\/\/www.compucom.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.compucom.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2022\/05\/cropped-compucom-faivcon-e1.jpg","contentUrl":"https:\/\/www.compucom.com\/\/app\/data\/wp-content\/uploads\/2022\/05\/cropped-compucom-faivcon-e1.jpg","width":512,"height":512,"caption":"CompuCom Systems Inc"},"image":{"@id":"https:\/\/www.compucom.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/compucom\/posts\/?feedView=all"]},{"@type":"Person","@id":"https:\/\/www.compucom.com\/#\/schema\/person\/be387b21474553c122312d1fa0f86f0a","name":"Marketing Compucom","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7fb9a6c889a75111d707908169f213fe70c66d85fbfd394b4d350300cbcae130?s=96&d=mm&r=g","caption":"Marketing Compucom"},"url":"https:\/\/www.compucom.com\/author\/marketing_chicomp101\/"}]}},"_links":{"self":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts\/5089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/comments?post=5089"}],"version-history":[{"count":3,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts\/5089\/revisions"}],"predecessor-version":[{"id":5314,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/posts\/5089\/revisions\/5314"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/media\/5311"}],"wp:attachment":[{"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/media?parent=5089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/categories?post=5089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.compucom.com\/wp-json\/wp\/v2\/tags?post=5089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}