Endpoint Security for Healthcare Devices: Protecting Patient Data on Windows and Samsung Assets

Authors

  • Anjan Kumar Gundaboina

DOI:

https://doi.org/10.47941/jts.2850

Keywords:

Endpoint Security, Healthcare Cybersecurity, Patient Data Protection, Windows Security, Samsung Knox, Medical Device Security, HIPAA, GDPR, Threat Detection, Mobile Device Management (MDM)

Abstract

Purpose: This work also involves conducting an assessment and improvement of endpoint defense initiatives in healthcare facilities, especially when it comes to cybersecurity issues with Windows types of workstations and Samsung medical/mobile devices. It touches on the growing danger of cyberattacks on patient records and the healthcare system caused by digitalization in the healthcare industry.

Methodology: The study presents a mixed-methods research design, where a complete vulnerability landscape, threat vectors and endpoint security products within healthcare settings will be reviewed. It invokes both simulation-based testing and empirical analysis to check the efficacy of a suggested multi-layered endpoint security architecture that is industry-specific to Windows and Samsung devices.

Findings: The suggested security model that incorporates the methods of encrypted storage, biometrics authentication, partitioned networking structure, and AI-based threat persistence identification augments ransomware, phishing, data misappropriation, and insider attacks considerably. The solution is then based on complying with the most important data protection standards, such as HIPAA and GDPR and shows a significant increase in endpoint resilience in simulations and practice tests.

A unique contribution to theory, practice, and policy: This study provides a new, flexible, next-generation endpoint defence model with healthcare systems in mind. It enhances cybersecurity practice proficiency by combining AI threat detection, asset-specific policies, and risk assessment conducted on a regular basis. The policy states that regulatory guidelines should be enhanced to require enhanced endpoint protection and achievement of a proactively focused cybersecurity culture at healthcare institutions.

Downloads

Download data is not yet available.

Author Biography

Anjan Kumar Gundaboina

Senior DevsecOps and Cloud Architect

References

SANS Institute. (2020). Endpoint Security: A SANS Survey. Retrieved from https://www.sans.org

Symantec. (2021). Internet Security Threat Report. Retrieved from https://www.broadcom.com

Trend Micro. (2022). EDR Solutions: Capabilities and Best Practices. Retrieved from https://www.trendmicro.com

Ponemon Institute. (2021). The Impact of Ransomware on Healthcare. Retrieved from https://www.ponemon.org

U.S. Department of Health and Human Services (HHS). (2023). Cybersecurity Best Practices for Healthcare. Retrieved from https://www.hhs.gov

Verizon. (2023). Data Breach Investigations Report (DBIR). Retrieved from https://www.verizon.com/business/resources/reports/dbir/

Kaspersky. (2021). Threats to Healthcare IT Infrastructure. Retrieved from https://www.kaspersky.com

Microsoft. (2017). Customer Guidance for WannaCrypt attacks. Retrieved from https://blogs.microsoft.com

Europol. (2018). The Impact of the EternalBlue Exploit. Retrieved from https://www.europol.europa.eu

Samsung. (2024). Samsung Knox White Paper. Retrieved from https://www.samsungknox.com

Deloitte. (2020). Mobile Device Security in Healthcare. Retrieved from https://www2.deloitte.com

U.S. Department of Health and Human Services (HHS). (2013). HIPAA Security Rule. Retrieved from https://www.hhs.gov/hipaa

European Union. (2016). General Data Protection Regulation (GDPR). Retrieved from https://eur-lex.europa.eu

Gartner. (2021). Adaptive Security Architecture for Endpoint Protection. Retrieved from https://www.gartner.com

IBM Security. (2022). X-Force Threat Intelligence Index. Retrieved from https://www.ibm.com/security/data-breach/threat-intelligence

Downloads

Published

2025-06-29

How to Cite

Gundaboina, A. K. (2025). Endpoint Security for Healthcare Devices: Protecting Patient Data on Windows and Samsung Assets. Journal of Technology and Systems, 7(4), 36–49. https://doi.org/10.47941/jts.2850

Issue

Section

Articles