Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
The research demonstrates the type of data targeted and where the data is stored and processed determines the tactics of hackers.
http://www.healthitoutcomes.com/doc/verizon-phi-data-highlights-challenges-security-0001?utm_content=buffer9763d&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer