You work for a hospital that stores electronic protected health information (ePHI) in an online portal. Authorized employees can use their mobile devices to access patient ePHI.
You need to ensure that employees’ mobile devices comply with HIPAA regulations.
Which safeguard should you develop and implement?
What is the primary purpose of running a vulnerability scan on your network?
Which security assessment of IT systems verifies that PII data is available, accurate, confidential, and accessible only by authorized users?
A restaurant installs a second wireless router that only employees can use.
Which statement describes how to securely configure the new router?
You need to transfer configuration files to a router across an unsecured network.
Which protocol should you use to encrypt the files in transit?