{"id":40507,"date":"2025-04-14T09:51:37","date_gmt":"2025-04-13T23:51:37","guid":{"rendered":"https:\/\/www.bitemagazine.com.au\/?p=40507"},"modified":"2025-04-16T13:39:57","modified_gmt":"2025-04-16T03:39:57","slug":"protecting-personal-devices-used-in-healthcare-from-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/","title":{"rendered":"Protecting personal devices used in healthcare from cyber attacks"},"content":{"rendered":"\n<p class=\"wp-block-yoast-seo-estimated-reading-time yoast-reading-time__wrapper\"><span class=\"yoast-reading-time__icon\"><svg aria-hidden=\"true\" focusable=\"false\" data-icon=\"clock\" width=\"20\" height=\"20\" fill=\"none\" stroke=\"currentColor\" style=\"display:inline-block;vertical-align:-0.1em\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 24 24\"><path stroke-linecap=\"round\" stroke-linejoin=\"round\" stroke-width=\"2\" d=\"M12 8v4l3 3m6-3a9 9 0 11-18 0 9 9 0 0118 0z\"><\/path><\/svg><\/span><span class=\"yoast-reading-time__spacer\" style=\"display:inline-block;width:1em\"><\/span><span class=\"yoast-reading-time__descriptive-text\">Estimated reading time: <\/span><span class=\"yoast-reading-time__reading-time\">5<\/span><span class=\"yoast-reading-time__time-unit\"> minutes<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"677\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity.jpg\" alt=\"protecting personal devices used in healthcare from cyber attacks\" class=\"wp-image-40508 lazyload\" data-srcset=\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity.jpg 1024w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity-300x198.jpg 300w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity-768x508.jpg 768w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity-635x420.jpg 635w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity-150x99.jpg 150w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity-600x397.jpg 600w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity-696x460.jpg 696w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><noscript><img decoding=\"async\" width=\"1024\" height=\"677\" src=\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity.jpg\" alt=\"protecting personal devices used in healthcare from cyber attacks\" class=\"wp-image-40508 lazyload\" srcset=\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity.jpg 1024w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity-300x198.jpg 300w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity-768x508.jpg 768w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity-635x420.jpg 635w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity-150x99.jpg 150w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity-600x397.jpg 600w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity-696x460.jpg 696w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/noscript><figcaption class=\"wp-element-caption\">Photography: ibrester\/123RF<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-with-more-personal-devices-being-used-at-work-cyber-experts-are-urging-safeguards-be-put-in-place-to-prevent-the-unlawful-access-of-sensitive-patient-information-by-amber-daines\">With more personal devices being used at work, cyber experts are urging safeguards be put in place to prevent the unlawful access of sensitive patient information. By Amber Daines<\/h2>\n\n\n\n<p>The digitisation of the healthcare sector and its wide range of records has been, in many ways, a revolution. In 2025, most dentists would have among their tools of the trade such tech items as a mobile phone, a laptop and maybe a tablet.<\/p>\n\n\n\n<p>However, along with the greater accessibility and workplace flexibility of such cloud-based patient databases across multiple devices, comes a rise in more cyber risks.&nbsp;<\/p><div class=\"bitem-article-desktop-720x300-in-text\" id=\"bitem-3376958319\"><!-- Bite 720x300 [async] -->\r\n<script type=\"text\/javascript\">if (!window.AdButler){(function(){var s = document.createElement(\"script\"); s.async = true; s.type = \"text\/javascript\";s.src = 'https:\/\/servedby.engagemedia.com.au\/app.js';var n = document.getElementsByTagName(\"script\")[0]; n.parentNode.insertBefore(s, n);}());}<\/script>\r\n<script type=\"text\/javascript\">\r\nvar AdButler = AdButler || {}; AdButler.ads = AdButler.ads || [];\r\nvar abkw = window.abkw || '';\r\nvar plc705185 = window.plc705185 || 0;\r\ndocument.write('<'+'div id=\"placement_705185_'+plc705185+'\"><\\\/'+'div>');\r\nAdButler.ads.push({handler: function(opt){ AdButler.register(165450, 705185, [720,300], 'placement_705185_'+opt.place, opt); }, opt: { place: plc705185++, keywords: abkw, domain: 'servedby.engagemedia.com.au', click:'CLICK_MACRO_PLACEHOLDER' }});\r\n<\/script><\/div>\n\n\n\n<p>Recent research led by <a href=\"https:\/\/scholars.latrobe.edu.au\/twani\" target=\"_blank\" rel=\"noreferrer noopener\">Dr Tafheem Wani at La Trobe University<\/a> showed that clinicians\u2019 phones, among other digital devices like laptops or smartwatches, contain highly sensitive patient information that is often not protected by antivirus or malware software and passcodes.<\/p>\n\n\n\n<p>The study reveals numerous vulnerabilities associated with the use of personal devices (BYOD) in healthcare, particularly in safeguarding sensitive patient data.&nbsp;<\/p>\n\n\n\n<p>For example, in a much publicised case in 2022, the personal laptop of a doctor was stolen and the incident resulted in the breach of thousands of electronic health records. This occurred because without adequate protections in place, the device was able to be used to access sensitive healthcare systems.&nbsp;<\/p>\n\n\n\n<p>Likewise, Dr Wani says similar stories across Australia\u2019s healthcare sector suggest it a ripe target for cybercriminals looking for ways to access sensitive patient information they can then use for ransom demands or other nefarious activities like identity theft.&nbsp;<\/p>\n\n\n\n<p>Dr Wani explains, \u201cThere are various ways patient data can become unsecured, especially when shared through platforms such as SMS or WhatsApp. Unfortunately, such practices remain prevalent in some healthcare settings.<\/p>\n\n\n\n<p>\u201cIt\u2019s common to see patient information being forwarded between clinicians, whether to a senior doctor or within a clinical team. This process inherently carries risks because patient data, including personally identifiable information, may be transmitted using unsecured methods. Moreover, personal devices used in such exchanges may be lost or stolen, further exposing this data.\u201d<\/p>\n\n\n\n<p>The challenges of enforcing BYOD (bring your own device) policies come down to individual user behaviour. Unlike hospital-provided devices, which are often equipped with robust security controls, personal devices depend on the actions of their users. The use of personal cloud storage services such as Google Drive or Dropbox for storing patient data does pose significant everyday risks.<\/p>\n\n\n\n<p>\u201cWhen clinicians use their cloud accounts for work, it creates an additional layer of risk. These platforms are often vulnerable to cyber attacks, especially if they are not properly secured,\u201d he explains.<\/p>\n\n\n\n<p>Dr Wani stresses the importance of proactive cybersecurity measures. \u201cKey strategies include implementing two-factor authentication, role-based access control, and educating all stakeholders\u2014clinicians, private practices, and patients\u2014about cybersecurity risks.\u201d<\/p>\n\n\n\n<p>Private practices may have limited awareness of cyber risks, partly because of their smaller scale and fewer patients. Yet they still need to be top of them.<\/p>\n\n\n\n<p>While hiring a cybersecurity consultant can be expensive, it can be a worthwhile investment.<\/p>\n\n\n\n<p>Dr Matthew Vaughan, owner of Newcastle\u2019s <a href=\"https:\/\/livelifesmiling.com.au\" target=\"_blank\" rel=\"noreferrer noopener\">Live Life Smiling<\/a>, recently returned from specialist orthodontic training in the UK. While there he became familiar with the NHS, where the scale and impact of cyber hacks and data security breaches related to patient data have been frequent and widely publicised. This knowledge has amplified a greater cyber awareness for his business back in Australia.<\/p>\n\n\n\n<p>There are three main areas Dr Vaughan identifies as his cybersecurity focus\u2014cybersecurity policies, engaging the right tech expertise and BYOD management of all team members.<\/p>\n\n\n\n<p>Dr Vaughan explains the policy his practice has implemented prevents staff from logging into social media or personal emails on work computers to mitigate risks such as phishing or being infected with malware. \u201cWe have a strict rule that work computers can\u2019t be used for any social media or web-based mail,\u201d he says.&nbsp;<\/p>\n\n\n\n<p>\u201cIf a team member must use their personal device for work-related tasks, access to surgery files or webmail requires multifactor authentication on their device. This just helps us ensure that if a team member\u2019s personal device is lost or stolen, the public cannot access work-related data.\u201d<\/p>\n\n\n\n<p>When considering where to even start with the process, Dr Vaughan recommends&nbsp;addressing the \u201cweakest link in your cybersecurity\u201d as part of overall business efficiency, such as enforcing BYOD use policies.<\/p>\n\n\n\n<p>Dr Wani says dentists can adopt cost-effective measures without requiring a multimillion-dollar infrastructure.&nbsp;<\/p>\n\n\n\n<p>A few daily habits can make a significant difference, such as implementing two-factor authentication, using authorised and updated operating systems such as iOS or Android, and ensuring devices are regularly updated. Additionally, using screen locks, limiting the storage of patient data on personal devices, and securely separating or password-protecting sensitive data folders can significantly reduce the risk of breaches.<\/p>\n\n\n\n<p>Dr Vaughan believes in striking a balance between being cautious and avoiding unnecessary expenses in cybersecurity. In his newly acquired private practice, Dr Vaughan estimates he will spend around $8000 this year on the implementation of updated cybersecurity measures and IT support, claiming this is a \u201cnecessary and manageable\u201d investment.<\/p>\n\n\n\n<p>An IT consultant can be utilised for cloud-based patient data management and helps manage cyber risk basics like ensuring access mandates multi-factor authentication and firewalls.&nbsp;<\/p>\n\n\n\n<p>\u201cIt was about limiting our liability to exposure or hacking or litigation in future years,\u201d he explains.<\/p>\n\n\n\n<p>Prevention is, of course, always better than cure. Dr Vaughan says his practice manager in collaboration with an external IT consultant is tasked with identifying and addressing weak points in cybersecurity.<\/p>\n\n\n\n<p>Dr Wani advocates for stronger government policies and the use of AI-driven solutions to enhance cybersecurity protection, particularly in private and public dental facilities. He believes it all starts by raising awareness of the risks among healthcare providers.&nbsp;<\/p>\n\n\n\n<p>\u201cAt the end of the day, a well-informed workforce is the first line of defence against cyberthreats. By combining basic security practices with ongoing education, healthcare providers can significantly reduce risks and protect their patients\u2019 sensitive information.\u201d &nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With more personal devices being used at work, cyber experts are urging safeguards be put in place to prevent the unlawful access of sensitive patient information. By Amber Daines The digitisation of the healthcare sector and its wide range of records has been, in many ways, a revolution. In 2025, most dentists would have among [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":40508,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[7170,691],"tags":[24786,22687,25532,684,2987],"class_list":{"0":"post-40507","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-featured","8":"category-your-business","9":"tag-cyber-attacks","10":"tag-cybersecurity","11":"tag-data-breach","12":"tag-featured","13":"tag-patients-records"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting personal devices used in healthcare from cyber attacks - Bite Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting personal devices used in healthcare from cyber attacks\" \/>\n<meta property=\"og:description\" content=\"With more personal devices being used at work, cyber experts are urging safeguards be put in place to prevent the unlawful access of sensitive patient information. By Amber Daines The digitisation of the healthcare sector and its wide range of records has been, in many ways, a revolution. In 2025, most dentists would have among [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Bite Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Bite.Mag\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-13T23:51:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-16T03:39:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"677\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editor\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/\"},\"author\":{\"name\":\"Editor\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/#\/schema\/person\/d9a0da9738e8b22c86465898e79cff17\"},\"headline\":\"Protecting personal devices used in healthcare from cyber attacks\",\"datePublished\":\"2025-04-13T23:51:37+00:00\",\"dateModified\":\"2025-04-16T03:39:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/\"},\"wordCount\":1009,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity.jpg\",\"keywords\":[\"cyber attacks\",\"cybersecurity\",\"data breach\",\"featured\",\"patients' records\"],\"articleSection\":[\"Featured\",\"Your Business\"],\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/\",\"url\":\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/\",\"name\":\"Protecting personal devices used in healthcare from cyber attacks - Bite Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity.jpg\",\"datePublished\":\"2025-04-13T23:51:37+00:00\",\"dateModified\":\"2025-04-16T03:39:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#primaryimage\",\"url\":\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity.jpg\",\"contentUrl\":\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity.jpg\",\"width\":1024,\"height\":677},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.bitemagazine.com.au\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting personal devices used in healthcare from cyber attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/#website\",\"url\":\"https:\/\/www.bitemagazine.com.au\/\",\"name\":\"Bite Magazine\",\"description\":\"Independent dental news, views and reviews\",\"publisher\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bitemagazine.com.au\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/#organization\",\"name\":\"Bite Magazine\",\"url\":\"https:\/\/www.bitemagazine.com.au\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2018\/08\/BiteLogo2018_signature.jpg\",\"contentUrl\":\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2018\/08\/BiteLogo2018_signature.jpg\",\"width\":200,\"height\":148,\"caption\":\"Bite Magazine\"},\"image\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Bite.Mag\",\"https:\/\/x.com\/bitemag\",\"http:\/\/www.linkedin.com\/company\/bite-magazine\",\"http:\/\/www.pinterest.com\/bitemag\",\"http:\/\/youtube.com\/c\/BitemagazineAu\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/#\/schema\/person\/d9a0da9738e8b22c86465898e79cff17\",\"name\":\"Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4d16bc0fd5d2eb384749441bf06e869dab819e66b977a72dc3fb5b798b3f0c4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4d16bc0fd5d2eb384749441bf06e869dab819e66b977a72dc3fb5b798b3f0c4?s=96&d=mm&r=g\",\"caption\":\"Editor\"},\"url\":\"https:\/\/www.bitemagazine.com.au\/author\/editor\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting personal devices used in healthcare from cyber attacks - Bite Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Protecting personal devices used in healthcare from cyber attacks","og_description":"With more personal devices being used at work, cyber experts are urging safeguards be put in place to prevent the unlawful access of sensitive patient information. By Amber Daines The digitisation of the healthcare sector and its wide range of records has been, in many ways, a revolution. In 2025, most dentists would have among [&hellip;]","og_url":"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/","og_site_name":"Bite Magazine","article_publisher":"https:\/\/www.facebook.com\/Bite.Mag","article_published_time":"2025-04-13T23:51:37+00:00","article_modified_time":"2025-04-16T03:39:57+00:00","og_image":[{"width":1024,"height":677,"url":"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity.jpg","type":"image\/jpeg"}],"author":"Editor","twitter_misc":{"Written by":"Editor","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#article","isPartOf":{"@id":"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/"},"author":{"name":"Editor","@id":"https:\/\/www.bitemagazine.com.au\/#\/schema\/person\/d9a0da9738e8b22c86465898e79cff17"},"headline":"Protecting personal devices used in healthcare from cyber attacks","datePublished":"2025-04-13T23:51:37+00:00","dateModified":"2025-04-16T03:39:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/"},"wordCount":1009,"commentCount":0,"publisher":{"@id":"https:\/\/www.bitemagazine.com.au\/#organization"},"image":{"@id":"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity.jpg","keywords":["cyber attacks","cybersecurity","data breach","featured","patients' records"],"articleSection":["Featured","Your Business"],"inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/","url":"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/","name":"Protecting personal devices used in healthcare from cyber attacks - Bite Magazine","isPartOf":{"@id":"https:\/\/www.bitemagazine.com.au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity.jpg","datePublished":"2025-04-13T23:51:37+00:00","dateModified":"2025-04-16T03:39:57+00:00","breadcrumb":{"@id":"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#primaryimage","url":"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity.jpg","contentUrl":"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/03\/cybersecurity.jpg","width":1024,"height":677},{"@type":"BreadcrumbList","@id":"https:\/\/www.bitemagazine.com.au\/protecting-personal-devices-used-in-healthcare-from-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bitemagazine.com.au\/"},{"@type":"ListItem","position":2,"name":"Protecting personal devices used in healthcare from cyber attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.bitemagazine.com.au\/#website","url":"https:\/\/www.bitemagazine.com.au\/","name":"Bite Magazine","description":"Independent dental news, views and reviews","publisher":{"@id":"https:\/\/www.bitemagazine.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bitemagazine.com.au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.bitemagazine.com.au\/#organization","name":"Bite Magazine","url":"https:\/\/www.bitemagazine.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bitemagazine.com.au\/#\/schema\/logo\/image\/","url":"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2018\/08\/BiteLogo2018_signature.jpg","contentUrl":"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2018\/08\/BiteLogo2018_signature.jpg","width":200,"height":148,"caption":"Bite Magazine"},"image":{"@id":"https:\/\/www.bitemagazine.com.au\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Bite.Mag","https:\/\/x.com\/bitemag","http:\/\/www.linkedin.com\/company\/bite-magazine","http:\/\/www.pinterest.com\/bitemag","http:\/\/youtube.com\/c\/BitemagazineAu"]},{"@type":"Person","@id":"https:\/\/www.bitemagazine.com.au\/#\/schema\/person\/d9a0da9738e8b22c86465898e79cff17","name":"Editor","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bitemagazine.com.au\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4d16bc0fd5d2eb384749441bf06e869dab819e66b977a72dc3fb5b798b3f0c4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4d16bc0fd5d2eb384749441bf06e869dab819e66b977a72dc3fb5b798b3f0c4?s=96&d=mm&r=g","caption":"Editor"},"url":"https:\/\/www.bitemagazine.com.au\/author\/editor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/posts\/40507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/comments?post=40507"}],"version-history":[{"count":0,"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/posts\/40507\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/media\/40508"}],"wp:attachment":[{"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/media?parent=40507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/categories?post=40507"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/tags?post=40507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}