Ken provides pre- and post-sales engineering support for organizations of all sizes, including product education, planning and deployment of Duo Security products. He has over 20 years experience in security, mobile and business intelligence. He lives in Denver and is a seasoned traveler. In fact, in his travels, Ken has flown over two million miles (the equivalent of going back and forth to the moon four times) and has been to every state except North Dakota and West Virginia.
Healthcare records remain one of the "holy grail" personally identifiable information (PII) data types for cyber-criminals. With patient data being more valuable to attackers than ever, alongside stricter HIPAA and HITECH compliance requirements and an ever-growing device inventory to manage, IT teams modernization projects must account for these risks in their planning. To mitigate the risks being faced efficiently, healthcare organizations need to adopt a 'zero-trust' security approach and start viewing every threat surface, access point, identity and login attempt as the new security perimeter.
By deploying solutions that can verify users and establish device trust while protecting every application (both cloud and legacy), healthcare organizations can quickly and effectively reduce the threat surface and meet compliance requirements.