Endpoint Security for Healthcare Devices: Protecting Patient Data on Windows and Samsung Assets
DOI:
https://doi.org/10.47941/jts.2850Keywords:
Endpoint Security, Healthcare Cybersecurity, Patient Data Protection, Windows Security, Samsung Knox, Medical Device Security, HIPAA, GDPR, Threat Detection, Mobile Device Management (MDM)Abstract
Purpose: This work also involves conducting an assessment and improvement of endpoint defense initiatives in healthcare facilities, especially when it comes to cybersecurity issues with Windows types of workstations and Samsung medical/mobile devices. It touches on the growing danger of cyberattacks on patient records and the healthcare system caused by digitalization in the healthcare industry.
Methodology: The study presents a mixed-methods research design, where a complete vulnerability landscape, threat vectors and endpoint security products within healthcare settings will be reviewed. It invokes both simulation-based testing and empirical analysis to check the efficacy of a suggested multi-layered endpoint security architecture that is industry-specific to Windows and Samsung devices.
Findings: The suggested security model that incorporates the methods of encrypted storage, biometrics authentication, partitioned networking structure, and AI-based threat persistence identification augments ransomware, phishing, data misappropriation, and insider attacks considerably. The solution is then based on complying with the most important data protection standards, such as HIPAA and GDPR and shows a significant increase in endpoint resilience in simulations and practice tests.
A unique contribution to theory, practice, and policy: This study provides a new, flexible, next-generation endpoint defence model with healthcare systems in mind. It enhances cybersecurity practice proficiency by combining AI threat detection, asset-specific policies, and risk assessment conducted on a regular basis. The policy states that regulatory guidelines should be enhanced to require enhanced endpoint protection and achievement of a proactively focused cybersecurity culture at healthcare institutions.
Downloads
References
SANS Institute. (2020). Endpoint Security: A SANS Survey. Retrieved from https://www.sans.org
Symantec. (2021). Internet Security Threat Report. Retrieved from https://www.broadcom.com
Trend Micro. (2022). EDR Solutions: Capabilities and Best Practices. Retrieved from https://www.trendmicro.com
Ponemon Institute. (2021). The Impact of Ransomware on Healthcare. Retrieved from https://www.ponemon.org
U.S. Department of Health and Human Services (HHS). (2023). Cybersecurity Best Practices for Healthcare. Retrieved from https://www.hhs.gov
Verizon. (2023). Data Breach Investigations Report (DBIR). Retrieved from https://www.verizon.com/business/resources/reports/dbir/
Kaspersky. (2021). Threats to Healthcare IT Infrastructure. Retrieved from https://www.kaspersky.com
Microsoft. (2017). Customer Guidance for WannaCrypt attacks. Retrieved from https://blogs.microsoft.com
Europol. (2018). The Impact of the EternalBlue Exploit. Retrieved from https://www.europol.europa.eu
Samsung. (2024). Samsung Knox White Paper. Retrieved from https://www.samsungknox.com
Deloitte. (2020). Mobile Device Security in Healthcare. Retrieved from https://www2.deloitte.com
U.S. Department of Health and Human Services (HHS). (2013). HIPAA Security Rule. Retrieved from https://www.hhs.gov/hipaa
European Union. (2016). General Data Protection Regulation (GDPR). Retrieved from https://eur-lex.europa.eu
Gartner. (2021). Adaptive Security Architecture for Endpoint Protection. Retrieved from https://www.gartner.com
IBM Security. (2022). X-Force Threat Intelligence Index. Retrieved from https://www.ibm.com/security/data-breach/threat-intelligence
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Anjan Kumar Gundaboina

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.