{"id":183566,"date":"2025-05-29T06:19:40","date_gmt":"2025-05-29T10:19:40","guid":{"rendered":"https:\/\/innowise.com\/?p=183566"},"modified":"2026-03-19T08:49:36","modified_gmt":"2026-03-19T12:49:36","slug":"how-to-prevent-data-breaches-in-healthcare","status":"publish","type":"post","link":"https:\/\/innowise.com\/fr\/blog\/how-to-prevent-data-breaches-in-healthcare\/","title":{"rendered":"Comment pr\u00e9venir les violations de donn\u00e9es dans le secteur des soins de sant\u00e9 : meilleures pratiques en mati\u00e8re de s\u00e9curit\u00e9"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"183566\" class=\"elementor elementor-183566\">\n\t\t\t\t<div class=\"elementor-element elementor-element-819836f e-flex e-con-boxed e-con e-parent\" data-id=\"819836f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-475732b elementor-widget__width-initial elementor-widget elementor-widget-html\" data-id=\"475732b\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div style=\"display: none;\">The power of data mapping in healthcare: benefits, use cases & future trends. As the healthcare industry and its supporting technologies rapidly expand, an immense amount of data and information is generated. Statistics show that about 30% of the world's data volume is attributed to the healthcare industry, with a projected growth rate of nearly 36% by 2025. This indicates that the growth rate is far beyond that of other industries such as manufacturing, financial services, and media and entertainment.<\/div>\n\n<div class=\"breadcrumbs flex\">\n    <div class=\"info\"> \n    <a href=\"https:\/\/innowise.com\/\">\n  Main\n  <\/a>\n    <\/div>\n    <div class=\"info\">\n         <a href=\"https:\/\/innowise.com\/about-us\/\">\n  About us\n  <\/a>\n    <\/div>\n     <div class=\"info\">\n          <a href=\"https:\/\/innowise.com\/blog\/\">\n  Blog\n  <\/a>\n    <\/div>\n<\/div>\n<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\/\", \n  \"@type\": \"BreadcrumbList\", \n  \"itemListElement\": [{\n    \"@type\": \"ListItem\", \n    \"position\": 1, \n    \"name\": \"Innowise is on Top: We Are No. 554 on Inc. 5000 Annual List\",\n    \"item\": \"https:\/\/innowise.com\/blog\/inc-5000-puts-innowise-group-among-the-fastest-growing-technology-companies-in-the-usa-2022\/\"  \n  },{\n    \"@type\": \"ListItem\", \n    \"position\": 2, \n    \"name\": \"Blog\",\n    \"item\": \"https:\/\/innowise.com\/blog\/\"  \n  },{\n    \"@type\": \"ListItem\", \n    \"position\": 3, \n    \"name\": \"Main\",\n    \"item\": \"https:\/\/innowise.com\/\"  \n  }]\n}\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93f634e elementor-widget-tablet__width-inherit elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"93f634e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">How to prevent data breaches in healthcare: best practices for security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0ba38f elementor-widget__width-initial elementor-widget elementor-widget-html\" data-id=\"a0ba38f\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"heroBottom\">\n<div>    \n <a target=\"_blank\" href=\"https:\/\/innowise.com\/authors\/aleh-yafimau\/\">Aleh Yafimau<\/a>   \n<\/div> \n\n<div class=\"second\">    \n<span>May 29, 2025<\/span>\n<span>10 min read<\/span>  \n<\/div>  \n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b399fb9 elementor-hidden-desktop elementor-hidden-tablet e-flex e-con-boxed e-con e-parent\" data-id=\"b399fb9\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-523b86d elementor-widget elementor-widget-image\" data-id=\"523b86d\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"600\" src=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Small-cover_BP_How-to-prevent-data-breaches-in-healthcare.jpg\" class=\"attachment-large size-large wp-image-183567\" alt=\"\" srcset=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Small-cover_BP_How-to-prevent-data-breaches-in-healthcare.jpg 880w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Small-cover_BP_How-to-prevent-data-breaches-in-healthcare-300x225.jpg 300w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Small-cover_BP_How-to-prevent-data-breaches-in-healthcare-768x576.jpg 768w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Small-cover_BP_How-to-prevent-data-breaches-in-healthcare-16x12.jpg 16w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-970be0b article-description e-flex e-con-boxed e-con e-parent\" data-id=\"970be0b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f2465c0 author-article e-con-full e-flex e-con e-child\" data-id=\"f2465c0\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-0569738 e-con-full e-flex e-con e-child\" data-id=\"0569738\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5be36f0 elementor-widget elementor-widget-text-editor\" data-id=\"5be36f0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Now more than ever, healthcare businesses are adopting tech, and so the number of apps under attack has spiked proportionally. According to the HIPAA (Health Insurance Portability and Accountability Act) Journal, over the past 14 years, the <a href=\"https:\/\/www.hipaajournal.com\/healthcare-data-breach-statistics\/\" target=\"_blank\" rel=\"noopener nofollow\">number of reported healthcare breaches has been rising<\/a> and remains sky-high today. Just last year, we saw more than 276 million breached records, including the largest ever healthcare data breach.<\/p><p>Here\u2019s the thing though, after poring over the <a href=\"https:\/\/ocrportal.hhs.gov\/ocr\/breach\/breach_report.jsf\" target=\"_blank\" rel=\"noopener nofollow\">Office for Civil Rights<\/a> list of reported breaches, I noticed that the majority of the cases are linked to hacking\/IT incidents, theft, or unauthorized access\/disclosure. After working on healthcare IT projects for years, I\u2019ll wager you this: many of the breaches could\u2019ve been avoided if more attention had been paid to details, like timely system updates or strengthening authentication.<\/p><p>In this article, I\u2019ll walk you through the core breach risks to be aware of and the proven strategies my team and I use to keep healthcare providers\u2019 data out of the wrong hands.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7041b3d e-con-full takeways e-flex e-con e-child\" data-id=\"7041b3d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-19f3722 elementor-widget elementor-widget-heading\" data-id=\"19f3722\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key takeaways<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b63b88 elementor-widget elementor-widget-text-editor\" data-id=\"9b63b88\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"blackUl\"><li>When they happen, healthcare breaches lead to huge regulatory fines, lost patient trust, and irreparable brand damage. <\/li><li>What often leads to a health data security breach is non-encrypted systems, human error, insufficient access controls, ransomware attacks, and unpatched app vulnerabilities.<\/li><li>To prevent a data breach, hospital and medical software should be protected with comprehensive measures, including multi-layered security solutions, role-based access control, authentication, audits, and others.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e64314b e-con-full e-flex e-con e-child\" data-id=\"e64314b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a99b2ed elementor-widget elementor-widget-heading\" data-id=\"a99b2ed\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why the healthcare industry must prevent breaches<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28b868c elementor-widget elementor-widget-text-editor\" data-id=\"28b868c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">I know it, you know it: data breaches in healthcare are expensive, destructive, and, often, preventable. Financially, they can sink even well-established providers and vendors.<\/p><p>Let\u2019s run the numbers. In 2025, the penalties for HIPAA Security Rule violations range <a href=\"https:\/\/www.hipaajournal.com\/what-are-the-penalties-for-hipaa-violations-7096\/\" target=\"_blank\" rel=\"noopener nofollow\">from $141 to $2,134,831 per violation<\/a>, depending on the medical data breach severity level. While the minimum sounds okay, the maximum penalty is about 10 times the average physician&#8217;s salary in the US.<\/p><p>Plus, you should remember that the authorities multiply the fines, depending on the number of violations. And these penalties don\u2019t just affect healthcare providers: health plans, clearinghouses, and business associates of HIPAA-covered entities may face the consequences. No organization has such money to spend without flinching because of some IT failure.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1977028 elementor-widget elementor-widget-image\" data-id=\"1977028\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1000\" height=\"517\" src=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Why-the-healthcare-industry-must-prevent-breaches.svg\" class=\"attachment-full size-full wp-image-183625\" alt=\"HIPAA violation penalties\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-540735a elementor-widget elementor-widget-text-editor\" data-id=\"540735a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">On top of that, the <a href=\"https:\/\/www.ama-assn.org\/practice-management\/hipaa\/hipaa-breach-notification-rule\" target=\"_blank\" rel=\"noopener nofollow\">HIPAA Breach Notification Rule<\/a> requires every patient data breach that affects protected health information (PHI) to be reported, no matter the size. That means you\u2019re not just facing consequences internally, you\u2019re legally required to go public. And yes, such public exposure can <strong>snowball into lawsuits, investigations<\/strong>, and, in some cases, years of brand damage.<\/p><p>Plus, you\u2019re not only breaking the bank, you\u2019re breaking the trust \u2014 and, dare I say, in healthcare, it\u2019s essential. A single breach may <strong>trigger an outflow of patients<\/strong> and <strong>damage decades-long relationships<\/strong> you worked on.<\/p><p>So, here\u2019s the hard truth: by the end of the day, it\u2019s far easier and cheaper to avoid HIPAA violations and severe data breaches rather than to recover from them. That\u2019s why I always recommend <a href=\"https:\/\/innowise.com\/services\/data-protection\/\">proactive data protection<\/a> for <a href=\"https:\/\/innowise.com\/industries\/healthcare\/custom-software-development\/\">healthcare software development projects<\/a>: you get to spot the slightest issues before the attackers do. This is one of the many ways for healthcare providers to withstand the lingering security threats.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d95902 e-con-full e-flex e-con e-child\" data-id=\"3d95902\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a94b91 elementor-widget elementor-widget-heading\" data-id=\"3a94b91\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Current state of data breaches in healthcare<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8798570 elementor-widget elementor-widget-text-editor\" data-id=\"8798570\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">Healthcare cyber security breaches hit record highs in the US, making the problem more and more alarming each year. In total, <a href=\"https:\/\/www.hipaajournal.com\/biggest-healthcare-data-breaches-2024\/\" target=\"_blank\" rel=\"noopener nofollow\">734 large health data breaches were reported in 2024<\/a>, and 14 of them each affected more than a million patient records. The largest incident in recent history occurred just last year, <a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/special-topics\/change-healthcare-cybersecurity-incident-frequently-asked-questions\/index.html\" target=\"_blank\" rel=\"noopener nofollow\">exposing the health data of over 190 million individuals<\/a> in a single hacking attack. To put it into perspective: that\u2019s more than half of the US population.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a86d342 elementor-widget elementor-widget-image\" data-id=\"a86d342\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1001\" height=\"506\" src=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Current-state-of-data-breaches-in-healthcare.png\" class=\"attachment-full size-full wp-image-183580\" alt=\"Healthcare data breaches statistics in the US 2009\u20132025\" srcset=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Current-state-of-data-breaches-in-healthcare.png 1001w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Current-state-of-data-breaches-in-healthcare-300x152.png 300w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Current-state-of-data-breaches-in-healthcare-768x388.png 768w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Current-state-of-data-breaches-in-healthcare-18x9.png 18w\" sizes=\"(max-width: 1001px) 100vw, 1001px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed3c158 elementor-widget elementor-widget-text-editor\" data-id=\"ed3c158\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">And the 2025 HIPAA breach reports\u2019 data doesn\u2019t promise any glimpse of hope whatsoever. As of May 2025, there have already been <a href=\"https:\/\/www.hipaajournal.com\/healthcare-data-breach-statistics\/\" target=\"_blank\" rel=\"noopener nofollow\">174 cases<\/a> reported, the majority of which involved medical providers. The way I see it, every health care breach chips away at public trust and inevitably disrupts care. So, healthcare providers should be asking themselves whether they are doing enough to prevent that from happening.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-abe9e6f e-con-full e-flex e-con e-child\" data-id=\"abe9e6f\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-0653a85 e-con-full e-flex e-con e-child\" data-id=\"0653a85\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cd141cc elementor-widget-tablet__width-inherit elementor-widget__width-initial max100 elementor-widget elementor-widget-heading\" data-id=\"cd141cc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Keep hackers from breaching your data and software<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d9ff7c e-con-full e-flex e-con e-child\" data-id=\"2d9ff7c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-48b0d75 elementor-absolute elementor-widget-mobile__width-inherit transform elementor-widget elementor-widget-html\" data-id=\"48b0d75\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"wave-container\"><\/div>\r\n\r\n<style>\r\n  .wave-container {\r\n    width: 400px;\r\n    height: 400px;\r\n  }\r\n\r\n  @media(max-width: 767px) {\r\n    .wave-container {\r\n      width: 100%;\r\n      height: 100%;\r\n    }\r\n  }\r\n\r\n\r\n  .wave {\r\n    position: absolute;\r\n    border: 1px solid rgba(210, 184, 214, 1);\r\n    border-radius: 50%;\r\n    animation: drop 16s infinite;\r\n    top: 50%;\r\n    left: 50%;\r\n    transform: translate(-50%, -50%);\r\n    box-sizing: border-box;\r\n  }\r\n\r\n  @keyframes drop {\r\n    0% {\r\n      width: 0px;\r\n      height: 0px;\r\n      border: 1px solid rgba(210, 184, 214, 1);\r\n    }\r\n\r\n    100% {\r\n      width: 400px;\r\n      height: 400px;\r\n      border: 1px solid rgba(210, 184, 214, 0);\r\n    }\r\n  }\r\n<\/style>\r\n\r\n<script>\r\n\r\n  document.addEventListener('DOMContentLoaded', () => {\r\n    function createWaves(numberOfWaves) {\r\n      const waveContainers = document.querySelectorAll('.wave-container');\r\n\r\n      waveContainers.forEach((waveContainer) => {\r\n        for (let i = 0; i < numberOfWaves; i++) {\r\n          const wave = document.createElement('div');\r\n          wave.classList.add('wave');\r\n\r\n          wave.style.animationDelay = `${i * 0.8}s`;\r\n\r\n          waveContainer.appendChild(wave);\r\n        }\r\n      });\r\n    }\r\n\r\n    createWaves(10)\r\n  });\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d7ba43 elementor-align-left elementor-widget__width-initial elementor-widget-mobile__width-inherit cta-btn elementor-widget elementor-widget-button\" data-id=\"7d7ba43\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#contact-form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Secure my business<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3bfb520 e-con-full e-flex e-con e-child\" data-id=\"3bfb520\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d399b29 elementor-widget elementor-widget-heading\" data-id=\"d399b29\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are the major data security issues in healthcare<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c721fc5 elementor-widget elementor-widget-text-editor\" data-id=\"c721fc5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">Just as I said at the beginning of this article, the root causes of most healthcare security breaches tend to fall into the same few categories. And in my experience, when auditing existing apps of the new clients, these issues are surprisingly persistent. Let\u2019s break down the main culprits of health data breaches I see time and time again.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a9efc97 e-grid e-con-full e-con e-child\" data-id=\"a9efc97\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-6a64840 e-con-full e-flex e-con e-child\" data-id=\"6a64840\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-95a9dca elementor-widget elementor-widget-heading\" data-id=\"95a9dca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Lack of encryption and secure data storage<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b03b32 elementor-widget elementor-widget-text-editor\" data-id=\"6b03b32\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Despite dealing with incredibly sensitive information, many healthcare organizations still operate with <strong>data that isn\u2019t fully (or properly) encrypted<\/strong>. What makes this even more concerning is that patient <strong>records often are spread across multiple systems<\/strong>, like EHRs, patient apps, and cloud platforms \u2014 the list goes on. Oftentimes, the security level is uneven between these systems: they were implemented at a different time, in a different environment, by different teams.<\/p><p>It means that not only does such an organization miss out on the benefits of <a href=\"https:\/\/innowise.com\/blog\/healthcare-data-integration\/\">healthcare data integration<\/a>, but it is also compelled to maintain consistent security safeguards across all these systems (e.g., audit security of the existing systems, new connections, and subsystems). But remember, one weak point is all it takes for a data storage breach to occur. It\u2019s harder to monitor such a fragmented landscape, and that makes exposure more likely.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5f46000 e-con-full e-flex e-con e-child\" data-id=\"5f46000\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ade8041 elementor-widget elementor-widget-heading\" data-id=\"ade8041\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Insider threats and human error<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa78821 elementor-widget elementor-widget-text-editor\" data-id=\"fa78821\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Not all data breaches come from sophisticated attacks, many start with someone inside the organization. An admin sending files to the wrong recipient, a nurse forgetting to lock the PC screen before taking lunch, or a doctor clicking a phishing link without realizing it \u2014 and the data is already in danger. <\/p><p>Whether accidental or deliberate, <strong>internal mishandling of data remains a common cause<\/strong> of health data breaches. Healthcare providers tend to overlook these risks, taking more time to prepare for cyberattacks. And human factor risks remain invisible until it\u2019s too late.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a9cb4d e-con-full e-flex e-con e-child\" data-id=\"5a9cb4d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c78b75 elementor-widget elementor-widget-heading\" data-id=\"3c78b75\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Inadequate access control<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3f6ff4 elementor-widget elementor-widget-text-editor\" data-id=\"c3f6ff4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>While reviewing <a href=\"https:\/\/innowise.com\/industries\/healthcare\/\">healthcare IT solutions\u2019<\/a> security audits, it\u2019s shocking how <strong>inconsistent access control measures<\/strong> are and how <strong>broad access privileges<\/strong> are. Even now, not all healthcare businesses use multi-level authentication and strong password rules. Too often, users are given more access than they need to perform their daily tasks, and sometimes this access is granted <em>indefinitely<\/em>.<\/p><p>When user <strong>authentication mechanisms are weak or outdated<\/strong>, it becomes far easier for hackers to exploit those gaps and get access to everything they need. The absence of fine-grained control over who can see what makes unauthorized access one of the easiest ways for healthcare cybersecurity breaches to happen.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a95a9fb e-con-full e-flex e-con e-child\" data-id=\"a95a9fb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d583039 elementor-widget elementor-widget-heading\" data-id=\"d583039\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ransomware and malware attacks<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e533453 elementor-widget elementor-widget-text-editor\" data-id=\"e533453\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Healthcare providers are a prime target for ransomware attacks for one simple reason: they can\u2019t afford to be offline for long. Doctors need access to the medical histories of dozens of patients a day to make complex, sometimes life-or-death decisions. Cybercriminals know this, and they exploit it without mercy.<\/p><p>The healthcare industry knows it quite well: <strong>entire hospital networks can be brought down by a single malicious attachment<\/strong> or an infected file. What turns these attacks into a twofold disaster is not just being locked out because of EHR security breaches, it\u2019s the threat of stolen data being leaked.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f5a5c9d e-con-full e-flex e-con e-child\" data-id=\"f5a5c9d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-740026a elementor-widget elementor-widget-heading\" data-id=\"740026a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Unpatched software and vulnerabilities<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3ca824 elementor-widget elementor-widget-text-editor\" data-id=\"a3ca824\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Outdated apps are everywhere in healthcare, often because <a href=\"https:\/\/innowise.com\/blog\/healthcare-software-modernization\/\">modernizing medical software<\/a> feels risky or complex. Even though the bug-ridden apps seriously slow down both patient care and daily hospital workflows.<\/p><p>But that <strong>update delay creates a perfect window for attackers<\/strong>. Less diligent developers may leave vulnerabilities unpatched for months or years since they\u2019ve come across them. Yet, something as small as a forgotten module or an unmonitored third-party tool can <strong>become the entry point for a major breach<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-af29f83 e-con-full e-flex e-con e-child\" data-id=\"af29f83\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9044ff2 elementor-widget elementor-widget-text-editor\" data-id=\"9044ff2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u201cMost of the time, the real problem isn\u2019t that healthcare organizations don\u2019t care about patient data security; it\u2019s that they don\u2019t have a clear picture of where the weak spots are. That\u2019s why we always start healthcare software data protection projects with a proper audit and <a href=\"https:\/\/innowise.com\/services\/security-testing\/\">security testing<\/a>. Once we know where the gaps are, we put together a realistic, step-by-step plan to fix them and keep patient data safe.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c6b088 e-grid e-con-full e-con e-child\" data-id=\"7c6b088\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cdedaa4 elementor-widget elementor-widget-image\" data-id=\"cdedaa4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"180\" height=\"180\" src=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Anastasia-Ilkevich.png\" class=\"attachment-full size-full wp-image-183100\" alt=\"\" srcset=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Anastasia-Ilkevich.png 180w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Anastasia-Ilkevich-150x150.png 150w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Anastasia-Ilkevich-12x12.png 12w\" sizes=\"(max-width: 180px) 100vw, 180px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-48c639f e-con-full max100 e-flex e-con e-child\" data-id=\"48c639f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4bee739 elementor-widget elementor-widget-heading\" data-id=\"4bee739\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/innowise.com\/authors\/anastasia-dziemieszkiewicz\/\">Anastasiya Dziemieszkiewicz<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42a3de8 elementor-widget elementor-widget-text-editor\" data-id=\"42a3de8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Portfolio Manager in Healthcare and Medical Technologies<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-343cdb1 e-con-full e-flex e-con e-child\" data-id=\"343cdb1\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0d606b6 elementor-widget elementor-widget-heading\" data-id=\"0d606b6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Strategies to prevent data breaches in healthcare<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d19a28 elementor-widget elementor-widget-text-editor\" data-id=\"7d19a28\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">Now that we\u2019ve looked at the most common issues, let\u2019s talk about what actually works to prevent security breaches in healthcare. These aren\u2019t just theoretical best practices, they\u2019re things I\u2019ve seen working successfully for multi-hospital systems and fast-growing HealthTech vendors. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-36bd128 e-grid e-con-full e-con e-child\" data-id=\"36bd128\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5e8a2c2 e-con-full e-flex e-con e-child\" data-id=\"5e8a2c2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df5c7f6 elementor-widget elementor-widget-heading\" data-id=\"df5c7f6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Multi-layered security solutions<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab77f65 elementor-widget elementor-widget-text-editor\" data-id=\"ab77f65\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Don\u2019t make one of the biggest mistakes I see: don\u2019t treat data security in healthcare like a single switch you flip. It\u2019s not that easy. You need multiple defenses layered across systems, devices, users, and the physical environment. Think firewalls, endpoint detection and response (EDR), intrusion prevention systems, and encrypted communication protocols \u2014 they all should work in sync.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c672758 e-con-full e-flex e-con e-child\" data-id=\"c672758\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1a7df10 elementor-widget elementor-widget-heading\" data-id=\"1a7df10\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Role-based access control and authentication<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e5b3ca elementor-widget elementor-widget-text-editor\" data-id=\"8e5b3ca\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Every role should have access to what they need, and nothing more. We often map out access profiles early in development and validate them with stakeholders to narrow down the attack surface. Another thing here is to keep user authentication methods secure as well. Traditional passwords get stolen or reused constantly, so leaning into passwordless authentication, like biometric logins, may be a good way to reduce credential-related vulnerabilities.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c5571ea e-con-full e-flex e-con e-child\" data-id=\"c5571ea\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-31972bd elementor-widget elementor-widget-heading\" data-id=\"31972bd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Regular data audits and vulnerability scanning\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8dbdc5 elementor-widget elementor-widget-text-editor\" data-id=\"d8dbdc5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Audits aren\u2019t the most glamorous part of cybersecurity, but they\u2019re the part that tells the truth. We run regular vulnerability scans not to tick a compliance box, but because they catch things no one may have noticed otherwise, like an outdated library or a misconfigured port. It\u2019s always better to find these things yourself than to learn about them from a hospital security breach report.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-66ff77f e-con-full e-flex e-con e-child\" data-id=\"66ff77f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-477fbec elementor-widget elementor-widget-heading\" data-id=\"477fbec\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Employee training and awareness\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2280a80 elementor-widget elementor-widget-text-editor\" data-id=\"2280a80\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>No matter how strong the tech is, one distracted click can bring everything down. Security training isn\u2019t about turning doctors and admin staff into tech gurus, it\u2019s about helping them spot red flags before it\u2019s too late. What\u2019s worked well for our clients is short, focused sessions tied to scenarios that doctors and nurses experience every day.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-306b87b e-con-full e-flex e-con e-child\" data-id=\"306b87b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fa59f00 elementor-widget elementor-widget-heading\" data-id=\"fa59f00\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Incident response plan development and maintenance\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e35fd85 elementor-widget elementor-widget-text-editor\" data-id=\"e35fd85\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Being overconfident is not the best policy when it comes to security, so you need to have an incident response plan in case anything goes wrong. At a minimum, it should define incident detection and reporting protocols, escalation chains, containment steps, communication flows (internal and external), and recovery plans. And, as cyber threats evolve constantly, we at Innowise include routine response plan reviews and refine the procedures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f149b0b e-con-full e-flex e-con e-child\" data-id=\"f149b0b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a05d58 elementor-widget elementor-widget-heading\" data-id=\"7a05d58\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Third-party security management enhancement\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac78fc4 elementor-widget elementor-widget-text-editor\" data-id=\"ac78fc4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Third-party vendors can be your weakest link, and it\u2019s easy to overlook that. That\u2019s why I always recommend checking vendors\u2019 certifications (e.g., ISO 27001) to make sure the company can follow the required protocols. Plus, your vendor risk management protocol should include due diligence before onboarding, clearly defined data handling agreements, and security monitoring.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c6a856b e-con-full e-flex e-con e-child\" data-id=\"c6a856b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7522cb0 elementor-widget elementor-widget-heading\" data-id=\"7522cb0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Advanced security solutions with AI, ML, and blockchain\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68ef05b elementor-widget elementor-widget-text-editor\" data-id=\"68ef05b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Advanced techs like <a href=\"https:\/\/innowise.com\/blog\/artificial-intelligence-healthcare\/\">AI<\/a> and ML have become incredibly helpful, especially for spotting things humans wouldn\u2019t catch, like subtle patterns in access logs or other suspicious activity. We use them to flag anomalies early and give teams a head start on issue elimination. As for <a href=\"https:\/\/innowise.com\/blog\/blockchain-in-healthcare\/\">blockchain<\/a>, it\u2019s a good tool to prove authenticity, origin, and changes in sensitive medical records.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f3f9407 e-con-full e-flex e-con e-child\" data-id=\"f3f9407\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-312fdac e-con-full e-flex e-con e-child\" data-id=\"312fdac\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-673ba74 elementor-widget-tablet__width-inherit elementor-widget__width-initial max100 elementor-widget elementor-widget-heading\" data-id=\"673ba74\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">See these data breach prevention strategies in action\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-95b14b8 e-con-full e-flex e-con e-child\" data-id=\"95b14b8\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cbfa567 elementor-absolute elementor-widget-mobile__width-inherit transform elementor-widget elementor-widget-html\" data-id=\"cbfa567\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"wave-container\"><\/div>\r\n\r\n<style>\r\n  .wave-container {\r\n    width: 400px;\r\n    height: 400px;\r\n  }\r\n\r\n  @media(max-width: 767px) {\r\n    .wave-container {\r\n      width: 100%;\r\n      height: 100%;\r\n    }\r\n  }\r\n\r\n\r\n  .wave {\r\n    position: absolute;\r\n    border: 1px solid rgba(210, 184, 214, 1);\r\n    border-radius: 50%;\r\n    animation: drop 16s infinite;\r\n    top: 50%;\r\n    left: 50%;\r\n    transform: translate(-50%, -50%);\r\n    box-sizing: border-box;\r\n  }\r\n\r\n  @keyframes drop {\r\n    0% {\r\n      width: 0px;\r\n      height: 0px;\r\n      border: 1px solid rgba(210, 184, 214, 1);\r\n    }\r\n\r\n    100% {\r\n      width: 400px;\r\n      height: 400px;\r\n      border: 1px solid rgba(210, 184, 214, 0);\r\n    }\r\n  }\r\n<\/style>\r\n\r\n<script>\r\n\r\n  document.addEventListener('DOMContentLoaded', () => {\r\n    function createWaves(numberOfWaves) {\r\n      const waveContainers = document.querySelectorAll('.wave-container');\r\n\r\n      waveContainers.forEach((waveContainer) => {\r\n        for (let i = 0; i < numberOfWaves; i++) {\r\n          const wave = document.createElement('div');\r\n          wave.classList.add('wave');\r\n\r\n          wave.style.animationDelay = `${i * 0.8}s`;\r\n\r\n          waveContainer.appendChild(wave);\r\n        }\r\n      });\r\n    }\r\n\r\n    createWaves(10)\r\n  });\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-708a9e5 elementor-align-left elementor-widget__width-initial elementor-widget-mobile__width-inherit cta-btn elementor-widget elementor-widget-button\" data-id=\"708a9e5\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#contact-form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Schedule a talk<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e6c78f7 e-con-full e-flex e-con e-child\" data-id=\"e6c78f7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79f4997 elementor-widget elementor-widget-heading\" data-id=\"79f4997\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data privacy and compliance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-747603d elementor-widget elementor-widget-text-editor\" data-id=\"747603d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 0px;\">Even the best security strategy won\u2019t hold up if it doesn\u2019t align with privacy and compliance requirements. These frameworks set clear expectations for how sensitive information should be handled to reduce the risk of data breaches. Here are some key considerations that often come up when talking about compliance and patient privacy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-17d88c3 e-grid e-con-full e-con e-child\" data-id=\"17d88c3\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a785a98 e-con-full e-flex e-con e-child\" data-id=\"a785a98\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d64a19 elementor-widget elementor-widget-heading\" data-id=\"7d64a19\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Compliance with industry standards\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08e6a5a elementor-widget elementor-widget-text-editor\" data-id=\"08e6a5a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>To avoid privacy issues in healthcare, data handling is regulated by acts like HIPAA in the US, GDPR in the EU, and other region-specific legal requirements. These regulations are setting up standards on access, storage, and sharing of sensitive data and outline technical and physical safeguards that are to be implemented. Having strong, practical policies like this baked into daily operations makes compliance a part of your culture and helps you stay ahead of the breaches.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-863589e e-con-full e-flex e-con e-child\" data-id=\"863589e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ff2af2 elementor-widget elementor-widget-heading\" data-id=\"1ff2af2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Role of encryption in ensuring compliance\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce6d44a elementor-widget elementor-widget-text-editor\" data-id=\"ce6d44a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Encryption shows up again and again in privacy laws for a reason. When your data is encrypted in transit and at rest, even if your other security controls fail at some point and cyberattackers break through, they likely won\u2019t be able to make your data readable without a proper key. That\u2019s why, during a HIPAA or a GDPR audit, strong encryption is one of the first things regulators look for when assessing whether you did your due diligence.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e8261fa e-con-full e-flex e-con e-child\" data-id=\"e8261fa\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf53cad elementor-widget elementor-widget-heading\" data-id=\"cf53cad\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Compliance with cybersecurity standards\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d1b1af elementor-widget elementor-widget-text-editor\" data-id=\"5d1b1af\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>When protecting healthcare data, cybersecurity frameworks like ISO 27001, ISO 27017, ISO 27018, SOC 2, and OWASP principles serve as a foundation. During the healthcare tech projects, my team and I do not treat these standards as a formality, we ingrain them into processes, controls, and documentation. The standards give you a clear structure to grow from, especially as systems scale and their complexity increases. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-794b55d e-con-full e-flex e-con e-child\" data-id=\"794b55d\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d2c982c elementor-widget elementor-widget-heading\" data-id=\"d2c982c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">To wrap it up\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a4dd421 elementor-widget elementor-widget-text-editor\" data-id=\"a4dd421\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>At the end of the day, preventing data breaches in healthcare comes down to doing the basics really well \u2014 and doing them consistently. It\u2019s about encrypting data, controlling access, training your people, and staying on top of compliance. Nothing flashy, but these things actually work. And when you put them together, they can save you from the kind of damage no healthcare organization wants to face.<\/p><p>If you&#8217;re looking for expert support to prevent healthcare data breaches, <a href=\"#contact-form\">let\u2019s talk<\/a>. We at Innowise help healthcare organizations build secure, compliant systems that stand up to real-world threats, so you can focus on delivering care, not putting out fires.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f24459 e-con-full e-flex e-con e-child\" data-id=\"7f24459\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ffb698 elementor-widget elementor-widget-shortcode\" data-id=\"9ffb698\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">[post_share]<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43a0c63 e-con-full tablePadding40 e-flex e-con e-child\" data-id=\"43a0c63\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-f8524ba e-grid e-con-full e-con e-child\" data-id=\"f8524ba\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-96f5913 elementor-widget elementor-widget-image\" data-id=\"96f5913\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"100\" height=\"100\" src=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Aleh-Yafimau.png\" class=\"attachment-full size-full wp-image-182365\" alt=\"\" srcset=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Aleh-Yafimau.png 100w, https:\/\/innowise.com\/wp-content\/uploads\/2025\/05\/Aleh-Yafimau-12x12.png 12w\" sizes=\"(max-width: 100px) 100vw, 100px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-326d86b e-con-full e-flex e-con e-child\" data-id=\"326d86b\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-ac422d3 e-con-full e-flex e-con e-child\" data-id=\"ac422d3\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6065798 fioBottom elementor-widget elementor-widget-heading\" data-id=\"6065798\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/innowise.com\/authors\/aleh-yafimau\/\" target=\"_blank\">Aleh Yafimau<\/a><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5eb3851 elementor-widget elementor-widget-image\" data-id=\"5eb3851\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/aleh-yafimau\/\" target=\"_blank\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"32\" height=\"33\" src=\"https:\/\/innowise.com\/wp-content\/uploads\/2025\/04\/Social-icons-1.svg\" class=\"attachment-full size-full wp-image-181902\" alt=\"Linkedin icon\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d30fe50 elementor-widget elementor-widget-text-editor\" data-id=\"d30fe50\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Senior Technical Delivery Manager in Healthcare and MedTech<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-86069e5 e-con-full e-flex e-con e-child\" data-id=\"86069e5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ae37326 text4String elementor-widget elementor-widget-text-editor\" data-id=\"ae37326\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Aleh has a strong grasp of what makes healthcare and MedTech software truly work. He leads with both technical clarity and sector knowledge, making sure every project delivers long-term value \u2014 not just code that runs, but systems that matter.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-811ac58 readMore elementor-widget elementor-widget-heading\" data-id=\"811ac58\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/innowise.com\/authors\/aleh-yafimau\/\" target=\"_blank\">Read more<\/a><\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0b7f46c table-content-container e-con-full e-flex e-con e-child\" data-id=\"0b7f46c\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-c64ce58 e-con-full stickyTable e-flex e-con e-child\" data-id=\"c64ce58\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b1b288c author-block e-con-full e-flex e-con e-child\" data-id=\"b1b288c\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b26c0dd ddcv elementor-widget elementor-widget-html\" data-id=\"b26c0dd\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\r\n\r\n.article-description > .e-con-inner{\r\n     align-items: baseline !important;\r\n}\r\n\r\n.table-content-container {\r\n    position: sticky;\r\n    top: 72px;\r\n    bottom: auto;   \r\n}  \r\n\r\n<\/style>\r\n\r\n<script>\r\ndocument.addEventListener(\"DOMContentLoaded\", ()=>{\r\n        \r\nconst headerElement = document.querySelector(\".new-menu\");\r\n\r\nconst stickyElement = document.querySelector(\".table-content-container\");\r\n\r\nconst headerElementH = headerElement.clientHeight;\r\n\r\nstickyElement.style.top =  headerElementH + 60 + \"px\"\r\n        \r\n});\r\n<\/script>\r\n\r\n\r\n<!--NOTE Change data-id in wrapper styles for hide this block on the mobile device screen-->\r\n<div class=\"toc-wrapper\">\r\n  <h3 class=\"toc-title\">Table of contents<\/h3>\r\n  <div class=\"toc toc-2\"><\/div>\r\n<\/div>\r\n\r\n<script>\r\n  \/\/NOTE Add the value from h2 as the key and the text you want to display as the key value in LINKS variable:\r\n  \/\/   const LINKS = {\r\n  \/\/       \"The demand for retail digital transformation\": \"The demand\"\r\n  \/\/   }\r\n\r\n  \r\n  \/\/NOTE Add the value from h2 as the key and the text you want to display as the key value in LINKS variable:\r\n  \/\/   const LINKS = {\r\n  \/\/       \"The demand for retail digital transformation\": \"The demand\"\r\n  \/\/   }\r\n\r\n  const LINKS = {\r\n    \"Unleashing the power of .NET 8\": \"gggggg\",\r\n    \"Revamping legacy systems: unlocking business potential through software modernization\":\r\n      \"hello\",\r\n  };\r\n\r\n  const OFFSET = 70;\r\n   const PADDING_BOTTOM_FOR_SCROLL = 100;\r\n  let headerList = [];\r\n  let allLinks = [];\r\n  \r\n  let ticking = false;\r\n     \r\n\r\n  const createList = () => {\r\n      \r\n      console.log('create');\r\n      \r\n      \r\n    const tocTarget = document.querySelector(\".toc.toc-2\");\r\n    const toc = document.createElement(\"ul\");\r\n    \r\n    \r\n    \r\n     headerList = [...document.querySelectorAll(\"h2\")];\r\n\r\n\r\n    \r\n    headerList = headerList.slice(0, -3);\r\n    \r\n    const filteredNodes = [document.querySelector(\".related_content_blog_container h2\")]\r\n    \r\n    headerList = headerList.filter((node)=> !filteredNodes.includes(node))\r\n    \r\n    \r\n   headerList.forEach((header,index) => {\r\n      const headerId = header.getAttribute(\"id\");\r\n      const headerText =\r\n        header.dataset.title && header.dataset.title !== \"\"\r\n          ? header.dataset.title\r\n          : header.textContent;\r\n          \r\n\r\n      const headerTocText = header.dataset.title;\r\n\r\n      const idFromText =\r\n        !headerId || headerId === \"\"\r\n          ? headerText\r\n              .toLowerCase()\r\n              .replace(\/[^\\w ]+\/g, \"\")\r\n              .replace(\/ +\/g, \"-\")\r\n          : headerId;\r\n          \r\n         \r\n\r\n      const newListItem = document.createElement(\"li\");\r\n      const newLink = document.createElement(\"a\");\r\n      newLink.setAttribute(\"href\", \"#\" + idFromText);\r\n      newLink.textContent = LINKS[headerText] || headerText;\r\n\r\n      newLink.addEventListener(\"click\", (e) => {\r\n          \r\n        e.preventDefault();\r\n        const y =\r\n          header.getBoundingClientRect().top +\r\n          window.pageYOffset -\r\n          PADDING_BOTTOM_FOR_SCROLL -\r\n          OFFSET;\r\n          ticking = true; \r\n        window.scrollTo({ top: y, behavior: \"smooth\" });\r\n        \r\n        setTimeout(()=>{\r\n            ticking = false;\r\n        },500);\r\n        \r\n      });\r\n      \r\n\r\n      newListItem.appendChild(newLink);\r\n    toc.appendChild(newListItem);\r\n    \r\n    \r\n    });\r\n    tocTarget.appendChild(toc);\r\n    allLinks = Array.from(document.querySelector(\".toc.toc-2\").querySelectorAll(\"ul li\"));\r\n  };\r\n\r\n  const setContainerHeight = () => {\r\n    const windowHeight = window.innerHeight;\r\n    const tocContainer = document.querySelector(\".ddcv\");\r\n\r\n    tocContainer.style.maxHeight = \"calc(100vh - 230px)\";\r\n    tocContainer.style.minHeight = \"200px\";\r\n  };\r\n\r\n\r\n  const checkScroll = () => {\r\n      const windowHeight = window.innerHeight;\r\n      const scrollTop = window.scrollY || document.documentElement.scrollTop;\r\n\r\n      let selectedHeaderIndex = -1;\r\n\r\n      headerList.forEach((header, index) => {\r\n        \r\n  const posTop = header.getBoundingClientRect().top;\r\n       \r\n\r\n const isInViewport = posTop + elem.clientHeight <= window.innerHeight ;\r\n \r\n\r\n \r\n if(isInViewport){\r\n      selectedHeaderIndex = index;\r\n }\r\n        \r\n\r\n\r\n        \r\n      });\r\n      \r\n\r\n\r\n        allLinks.forEach((link, i) => {\r\n            if(i === selectedHeaderIndex){\r\n              link.classList.remove(\"pre-active\");  \r\n              link.classList.add(\"active\");\r\n            }\r\n            if(i < selectedHeaderIndex){\r\n              link.classList.add(\"pre-active\"); \r\n               link.classList.remove(\"active\");\r\n            }\r\n             if(i > selectedHeaderIndex){\r\n            link.classList.remove(\"pre-active\");\r\n            link.classList.remove(\"active\");\r\n            }\r\n            \r\n            \r\n            \r\n        });\r\n        \r\n\r\n\r\n  };\r\n\r\n  const loadAllImages = () => {\r\n    const images = document.getElementsByTagName(\"img\");\r\n\r\n    for (let i = 0; i < images.length; i++) {\r\n      const img = images[i];\r\n      const src = img.getAttribute(\"data-src\") || img.src;\r\n      img.src = src;\r\n    }\r\n  };\r\n\r\n  loadAllImages();\r\n  \r\n  \r\n  \r\n\r\n\r\n  document.addEventListener(\"DOMContentLoaded\", () => {\r\n      \r\n      \r\n     setTimeout(()=>{\r\n           createList();\r\n    setContainerHeight();\r\n  \r\n    \r\n    document.addEventListener(\"scroll\", (event) => {\r\n  if (!ticking) {\r\n    checkScroll();\r\n  }\r\n});\r\n    \r\n    \r\n},300) \r\n\r\n    \r\n  });\r\n  \r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dee34d7 e-flex e-con-boxed e-con e-parent\" data-id=\"dee34d7\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-87a934b elementor-widget elementor-widget-shortcode\" data-id=\"87a934b\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f100240-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"100240\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/fr\/wp-json\/wp\/v2\/posts\/183566#wpcf7-f100240-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Contact form\" enctype=\"multipart\/form-data\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><input type=\"hidden\" name=\"_wpcf7\" value=\"100240\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f100240-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<style>\n#form-templates .contact__info {\n  background-color: #f4f4f4;\n  padding: 70px 44px 70px 50px;\n  position: relative;\n  max-width: 540px;\n  width: 100%;\nborder: 1px solid #AEB1B7;\n}\n\n#form-templates .contact__info-background {\n  z-index: -1;\n  position: absolute;\n  top: 20px;\n  left: 20px;\n  width: 100%;\n  height: 100%;\n  border: 1px dashed #ef4557;\n}\n\n\n#form-templates .new-container{\ndisplay: flex;\njustify-content: space-between;\nflex-wrap: wrap;\n}\n\n\n#form-templates{\npadding: 100px 15px 100px 15px;        \n}\n\n#form-templates .contact__info-heading {\n  font-family: 'Sora' !important;\n  font-style: normal !important;\n  font-weight: 400 !important;\n  font-size: 36px !important;\n  line-height: 46px !important;\n  color: #2E2E2E !important;\n   margin-bottom: 60px !important;\n\n}\n\n\n#form-templates .message label{\ncolor: #585858 !important;   \n}\n\n.elementor-widget-container.form-template h2,.elementor-widget-container.form-template h1{\n font-size: 60px !important;\n  line-height: 70px !important;\n  font-family: \"Sora\", Sans-serif;\n  font-weight: 400;\n  margin: 0;  \n  margin-bottom: 20px;\n}\n\n\n\n\n.elementor-widget-container.form-template p{\n  font-family: \"Karla\", Sans-serif;\n  font-size: 22px;\n  font-weight: 400;\n  line-height: 28px;\n  color: var( --e-global-color-primary );\n  max-width: 700px;\n  margin: 0; \n  margin-bottom: 40px;\n} \n  \n\n\n.new-container #spinner{\nwidth: 50%;\nmax-width: 700px;\n}\n\n\n#form-templates .new-container #spinner div.contact-us__wrapper:nth-child(6){\ngap:30px; \n    \n}\n\n\n#form-templates .contact__info-heading {\n  margin-bottom: 67px;\n  font-size: 36px;\n  font-family: karla;\n  color:  #2E2E2E;\n\n  line-height: 49px;\n}\n\n#form-templates .contact__info-steps {\n  display: flex;\n  flex-direction: column;\n  max-width: 425x;\n  row-gap: 20px;\n  border-left: 1px solid #2e2e2e;\n}\n\n#form-templates .contact__info-block {\n  position: relative;\n  padding-left: 45px;\n}\n\n#form-templates .contact__info-block:last-child {\n  box-shadow: -1px 0 0 1px #f4f4f4;\n}\n\n#form-templates .contact__info-step {\n  position: absolute;\n  border: 1px solid #2e2e2e;\n  width: 40px;\n  height: 40px;\n  display: flex;\n  align-items: center;\n  justify-content: center;\n  border-radius: 20px;\n  left: -20px;\n  top: -8px;\n  background-color: #F4F4F4;\n  color:  #2E2E2E;\n\nfont-family: Karla;\nfont-weight: 700;\nfont-size: 18px;\nline-height: 28px;\n\n}\n\n.elementor-widget-global .contact__info-step {\n        color:  #2E2E2E;\n}\n\n#form-templates .contact__info-text {\n  margin: 0;\n  font-size: 16px;\n  line-height: 26px;\n  color: #2E2E2E;\n  font-family: karla;\n\n  width: 100%;\n}\n\n\n#form-templates .contact-us__send{\nflex-shrink: 0;\nmargin-top:0;\n}\n\n\n\n@media screen and (max-width: 1279px) {\n    .new-container #spinner{\n        width: 100%;\n        max-width:100%;\n        margin-bottom:40px;\n    }\n    \n\n    .new-container .contact__info {\n        max-width: 700px !important;\n    }\n    \n}\n\n\n@media screen and (max-width: 1279px) {\n#form-templates{\npadding: 60px 15px 70px 15px;     \n}\n}\n\n\n\n@media screen and (max-width: 767px) {\n\n#form-templates .new-container #spinner div.contact-us__wrapper:nth-child(6){\ngap:20px; \n \n}\n\n\n  #form-templates .contact__info {\n    padding: 20px 20px 40px 40px;\n    margin: 0 auto;\n  }\n\n\n#form-templates{\npadding: 40px 15px 50px 15px;  \n    \n}\n\n  \n   .new-container #spinner{\n       \n    margin-bottom:30px;   \n   }\n   \n   \n   .elementor-widget-container.form-template h2,.elementor-widget-container.form-template h1{\n   font-size: 32px !important;\n    line-height: 42px !important;    \n   }\n   \n   \n   .elementor-widget-container.form-template p{\n       \n    font-size: 16px;\n    line-height: 20px;  \n    margin-bottom: 30px;\n \n       \n   }\n   \n   #form-templates .contact__info-heading{\n   font-size: 24px !important;\n    line-height: 49px !important;    \n       \n   }\n   \n\n.mailToContact{\nmargin-top: 10px !important;        \n}\n   \n\n  #form-templates .contact__info-heading {\n    font-size: 24px;\n    margin-bottom: 37px;\n  }\n\n  #form-templates .contact__info-background {\n    top: 10px;\n    left: 10px;\n  }\n\n  #form-templates .contact__info-text {\n    font-size: 12px;\n    line-height: 20px;\n  }\n  \n  \n  #form-templates .contact__info-heading {\n   margin-bottom: 35px !important;\n\n}\n\n}\n\n@media (max-width: 767px) {\n    .mailToContact {\n        max-width: 100%;\n    }\n}\n<\/style>\n\n<script>\nwindow.addEventListener('hashchange',function(e){if(window.history.pushState){window.history.pushState('','\/',window.location.pathname)}else{window.location.hash=''}})\n<\/script>\n\n\n<div id=\"form-templates\">\n<div class=\"elementor-widget-container form-template\">\n<a name=\"contact-form\"><\/a>\n<h2>Contact us<\/h2>\n<p><a id=\"calendlylink\" style=\"color: #c63031; border-bottom: 1px solid #c63031; padding: 0;\">Book a call<\/a> or fill out the form below and we\u2019ll get back to you once we\u2019ve processed your request.<\/p>\n<\/div>\n\n<div class=\"new-container\">\n\n\n<div class=\"contact-us__main\" id=\"spinner\" data-no-defer=\"1\">\n\n<div class=\"contact-us__wrapper\">\n\n<div class=\"name\">\n<label>Name<\/label>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"field_name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required contact-us__name\" id=\"contact-name\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name*\" value=\"\" type=\"text\" name=\"field_name\" \/><\/span>\n<\/div>\n\n<div class=\"company\">\n<label>Company<\/label>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"company\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required contact-us__company\" id=\"contact-company\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Company*\" value=\"\" type=\"text\" name=\"company\" \/><\/span>\n<\/div>\n\n<\/div>\n\n<div class=\"contact-us__wrapper\">\n\n<div class=\"email\">\n<label>Email<\/label>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email contact-us__email\" id=\"contact-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Corporate email*\" value=\"\" type=\"email\" name=\"email\" \/><\/span>\n<\/div>\n\n<div class=\"phone\">\n<label>Phone<\/label>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"tel\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-tel contact-us__phone\" id=\"contact-phone\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Phone*\" value=\"\" type=\"tel\" name=\"tel\" \/><\/span>\n<\/div>\n\n<\/div>\n<div class=\"contact-us__wrapper subj\">\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-recipient\"><select class=\"wpcf7-form-control wpcf7-select\" id=\"form-field-subj_js\" aria-invalid=\"false\" name=\"your-recipient\"><option value=\"\">Subject*<\/option><option value=\"IT staff augmentation\">IT staff augmentation<\/option><option value=\"Turnkey product development\">Turnkey product development<\/option><option value=\"Support and enhancement\">Support and enhancement<\/option><option value=\"Careers\">Careers<\/option><option value=\"Other\">Other<\/option><\/select><\/span>\n\n<span class=\"wpcf7-form-control-wrap\" data-name=\"form-field-budget_js\"><select class=\"wpcf7-form-control wpcf7-select\" id=\"form-field-budget_js\" aria-invalid=\"false\" name=\"form-field-budget_js\"><option value=\"\">Project budget<\/option><option value=\"Under $15K\">Under $15K<\/option><option value=\"$15K-$30K\">$15K-$30K<\/option><option value=\"$30K-$100K\">$30K-$100K<\/option><option value=\"$100K-$250K\">$100K-$250K<\/option><option value=\"$250K-$500K\">$250K-$500K<\/option><option value=\"More than $500K\">More than $500K<\/option><\/select><\/span>\n\n<\/div>\n\n\n<div class=\"message\">\n<label>Message<\/label>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"message\"><textarea cols=\"40\" rows=\"1\" maxlength=\"2000\" class=\"wpcf7-form-control wpcf7-textarea wpcf7-validates-as-required contact-us__message\" id=\"contact-message\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Describe your needs in detail*\" name=\"message\"><\/textarea><\/span>\n<\/div>\n\n<div class=\"atvoice-wrap\">\n\n<div class=\"voice-wrap\">\n<span id=\"voice-mut\" class=\"voicetext\">Send us a voice message<\/span>\n         <div class=\"qc_voice_audio_wrapper\">\n            <div class=\"qc_voice_audio_container\">\n                <div class=\"qc_voice_audio_upload_main\" id=\"qc_audio_main\">\n                    <a class=\"qc_audio_record_button\" id=\"qc_audio_record\" href=\"#\" aria-label=\"Record an audio message\">\n                        <span class=\"dashicons dashicons-microphone\"><\/span> \u00a0<\/a> \n                <\/div>\n\n                <div class=\"qc_voice_audio_recorder\" id=\"qc_audio_recorder\" style=\"display:none\">\n\n                <\/div>\n                <div class=\"qc_voice_audio_display\" id=\"qc_audio_display\"  style=\"display:none\">\n                    <audio id=\"qc-audio\" controls src=\"\"><\/audio>\n                    <span title=\"Remove and back to main upload screen.\" class=\"qc_audio_remove_button dashicons dashicons-trash\"><\/span>\n                <\/div>\n            <\/div>\n            <input type=\"hidden\" value=\"\" name=\"qcwpvoicemessage\" id=\"qc_audio_url\" \/>\n        <\/div>\n        \n<\/div>\n\n\n<div class=\"attach-wrap\">\n<span class=\"voicetext\">Attach documents<\/span>\n\n<div class='attachment'>\n\n<div class=\"downloaded\">\n<span><\/span>\n<div class=\"deleteFile\"><\/div>\n<\/div>\n\n<div class=\"attachmentButton\" onclick=\"(function cl(e){if(e.target.nodeName == 'DIV'){e.target.parentNode.children[1].children[0].click(); }})(arguments[0]);\">\n\n<div class=\"innerText\">Upload file<\/div>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"att-files\"><input size=\"40\" class=\"wpcf7-form-control wpcf7-file\" accept=\".jpg,.png,.jpeg,.pdf\" aria-invalid=\"false\" type=\"file\" name=\"att-files\" \/><\/span>\n\n<div class=\"tip\" onclick=\"event.stopPropagation()\">\n<p>You can attach 1 file up to 2MB. Valid file formats: pdf, jpg, jpeg, png.<\/p>\n<\/div>\n\n<\/div>\n\n<\/div>\n\n<\/div>\n\n\n\n<\/div>\n\n<div class=\"contact-us__wrapper\"> \n<p class=\"pp\">By clicking Send, you consent to Innowise processing your personal data per our<a href=\"\/privacy-notice\/\"> Privacy Policy <\/a>to provide you with relevant information. By submitting your phone number, you agree that we may contact you via voice calls, SMS, and messaging apps. Calling, message, and data rates may apply.<\/p>\n\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"scoring_point\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"utmCampaign\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"utmContent\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"utmMedium\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"utmSource\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"utmTerm\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"location\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"city\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"ip\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"Summ\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"gclid\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"rating\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"urlCompany\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"urlWithParams\" \/>\n<input class=\"wpcf7-form-control wpcf7-hidden\" value=\"\" type=\"hidden\" name=\"audioMessageLink\" \/>\n<input class=\"wpcf7-form-control wpcf7-submit has-spinner contact-us__send\" id=\"contact-send-button\" type=\"submit\" value=\"Send\" \/>\n<\/div>\n\n<div class='mailToContact'>You can also send us your request <\/br>to <a href=\"mailto:contact@innowise.com\">contact@innowise.com<\/a><\/div>\n\n<\/div>\n\n<div class=\"elementor-widget-container\" style=\"z-index:1;\">\n<div class=\"contact__info\">\n  <div class=\"contact__info-background\"><\/div>\n  <div class=\"contact__info-heading\">What happens next?<\/div>\n  <div class=\"contact__info-steps\">\n\n    <div class=\"contact__info-block\">\n      <div class=\"contact__info-step\">1<\/div>\n      <p class=\"contact__info-text\">Once we\u2019ve received and processed your request, we\u2019ll get back to you to detail your\n        project needs and sign an NDA to ensure confidentiality.<\/p>\n    <\/div>\n\n    <div class=\"contact__info-block\">\n      <div class=\"contact__info-step\">2<\/div>\n      <p class=\"contact__info-text\">After examining your wants, needs, and expectations, our team will devise a project\n        proposal with the scope of work, team size, time, and cost estimates.<\/p>\n    <\/div>\n\n    <div class=\"contact__info-block\">\n      <div class=\"contact__info-step\">3<\/div>\n      <p class=\"contact__info-text\">We\u2019ll arrange a meeting with you to discuss the offer and nail down the details.<\/p>\n    <\/div>\n\n    <div class=\"contact__info-block\">\n      <div class=\"contact__info-step\">4<\/div>\n      <p class=\"contact__info-text\">Finally, we\u2019ll sign a contract and start working on your project right away.<\/p>\n    <\/div>\n  <\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\n\n<\/div>\n\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"related_content_blog_container\">[related_content_list]<\/div><script>\n            jQuery( document ).ready(function($) {\n            var parentSection = $('[data-elementor-type=\"wp-page\"]');\n            if($('[data-elementor-type=\"wp-post\"]').length){\n                var parentSection = $('[data-elementor-type=\"wp-post\"]');\n            }\n            \n                parentSection.children().last().before($('.related_content_blog_container'));\n            });\n            <\/script><div class=\"other_services_container\">[need_other_services_v2]<\/div><script>\n                    jQuery( document ).ready(function($) {\n                        var parentSection = $('[data-elementor-type=\"wp-page\"]');\n                        if($('[data-elementor-type=\"wp-post\"]').length){\n                            var parentSection = $('[data-elementor-type=\"wp-post\"]');\n                        }\n                        \n                        console.log(parentSection);\n                        parentSection.children().last().before($('.other_services_container'));\n                        var sections = parentSection.find('.net-15.dt-16');\n                        for(var i = 0; i<sections.length; i++){\n                            if($(sections[i]).hasClass( 'net-15' ) && $(sections[i]).hasClass( 'dt-16' ) && $(sections[i]).hasClass( 'elementor-hidden-desktop' )==false){\n                                $(sections[i]).before($('.other_services_container'));   \n                            }\n                        }\n                        \n                    });\n                <\/script>","protected":false},"excerpt":{"rendered":"<p>The power of data mapping in healthcare: benefits, use cases &#038; future trends. As the healthcare industry and its supporting technologies rapidly expand, an immense amount of data and information is generated. Statistics show that about 30% of the world&#8217;s data volume is attributed to the healthcare industry, with a projected growth rate of nearly [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":183567,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"_acf_changed":true,"inline_featured_image":false,"footnotes":""},"categories":[1239,128],"class_list":["post-183566","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aleh_yafimau","category-blog","tag-expert-tips","tag-healthcare"],"acf":[],"_links":{"self":[{"href":"https:\/\/innowise.com\/fr\/wp-json\/wp\/v2\/posts\/183566","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/innowise.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/innowise.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/innowise.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/innowise.com\/fr\/wp-json\/wp\/v2\/comments?post=183566"}],"version-history":[{"count":0,"href":"https:\/\/innowise.com\/fr\/wp-json\/wp\/v2\/posts\/183566\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/innowise.com\/fr\/wp-json\/wp\/v2\/media\/183567"}],"wp:attachment":[{"href":"https:\/\/innowise.com\/fr\/wp-json\/wp\/v2\/media?parent=183566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/innowise.com\/fr\/wp-json\/wp\/v2\/categories?post=183566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/innowise.com\/fr\/wp-json\/wp\/v2\/tags?post=183566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}