Health files make for a juicy target for thieves

IBM Security Posted 08.09.16