{"id":2084,"date":"2025-08-18T01:03:20","date_gmt":"2025-08-17T16:03:20","guid":{"rendered":"https:\/\/www.protectmedicaldata.org\/how-to-protect-medical-data\/"},"modified":"2025-12-09T14:09:58","modified_gmt":"2025-12-09T05:09:58","slug":"how-to-protect-medical-data","status":"publish","type":"page","link":"https:\/\/www.protectmedicaldata.org\/en\/how-to-protect-medical-data\/","title":{"rendered":"How to protect medical data"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2084\" class=\"elementor elementor-2084 elementor-47\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3342280 e-flex e-con-boxed e-con e-parent\" data-id=\"3342280\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29e453f elementor-widget elementor-widget-heading\" data-id=\"29e453f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protect medical data with Storage Protection!<br><\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e6511a elementor-widget elementor-widget-text-editor\" data-id=\"4e6511a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Medical data stored on hospital PCs and servers is highly vulnerable to modern ransomware and data exfiltration attacks. Attackers lure users into executing ransomware and even escalate privileges to gain administrator access, directly targeting medical data.  Existing network protection or endpoint protection alone cannot fundamentally block ransomware or administrator privilege attacks. We need a way to protect medical data even if ransomware is executed on a PC or server or administrator privileges are compromised.<\/p>\n<p>Storage Protection is file server software equipped with data protection features. While general storage can hold data, it lacks protection functions, meaning once an attack occurs, the data is encrypted or leaked. A Storage Protection file server, however, is built on top of general storage with added protection, offering a secure network drive to PCs and servers. Data saved to this protected drive remains safe even if ransomware is executed or administrator privileges are stolen through attacks such as RCE. Storage Protection is recommended by the International Telecommunication Union (ITU) and has been certified by accredited testing agencies for its performance.    <\/p>\n<p>ProtectMedicalData.org provides Storage Protection file server software free of charge to small and medium-sized hospitals and non-hospital medical institutions that safeguard lives. The software is developed based on international standards ITU-T X.1220 and X.nspam, and has been certified for both security and usability with international Common Criteria (CC) and Good Software certifications.<br>To accommodate different IT environments, we provide two types of Storage Protection software.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fe1547d e-flex e-con-boxed e-con e-parent\" data-id=\"fe1547d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-af8f927 elementor-widget elementor-widget-heading\" data-id=\"af8f927\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Storage Protection Product Selection\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a7cd11 elementor-widget elementor-widget-html\" data-id=\"1a7cd11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<table id=\"storage_table\" class=\"storage_table\">\n    <tbody>\n        <tr>\n            <th width=\"10%\">Category<\/th>\n<th width=\"45%\" align=\"left\">Folder-Level Storage Protection\nFilingBox GIGA<\/th><br><th width=\"45%\" align=\"left\">Application-Level Storage Protection<br>FilingBox MEGA<\/th>\n        <\/tr>\n        <tr>\n            <td align=\"center\">Structure<\/td>\n<td><strong>Agentless Network Storage<\/strong><\/td>\n<td><strong>Agent-Based Network Storage<\/strong><\/td>\n        <\/tr>\n         <tr>\n            <td align=\"center\">Protection<\/td>\n<td><strong>Folder Operation Mode Settings\n(Folder-Level Storage Protection)<\/strong><br>Folder Operation Modes: Read\/Write, Read-Only, WORM, Append-Only, List-Only<\/td><br><td><strong>Registered Applications<br>(Application-Level Storage Protection)<\/strong><br>Register PC or server applications that are allowed to access data<\/td>\n        <\/tr>\n         <tr>\n            <td align=\"center\">Overview<\/td>\n            <td>FilingBox GIGA is equipped with folder-level data protection features on a standard network file server. Without requiring any additional agent software on hospital PCs or medical devices, users can connect to a standard Samba network file server to store data. Once connected, the folder-level data protection modes added to the Samba file server operate to securely safeguard the data. FilingBox GIGA offers four folder-level protection modes: Read\/Write, Read-Only, Append-Only, and List-Only. In Read\/Write mode, folders behave like ordinary storage, allowing both reading and writing. In Read-Only mode, the folder can only be viewed, and file creation, modification, or deletion is not permitted. WORM (Write Once Read Many) mode allows new files to be created, but once stored, they cannot be modified or deleted, only viewed. Append-Only mode permits the creation of new files but blocks reading, modification, and deletion. List-Only mode restricts all operations except for viewing the file list itself.   <\/td>\n            <td>FilingBox MEGA provides application-level data protection on a custom network file server. After installing agent software on hospital PCs or servers and connecting them to the network storage, administrators can register applications that are permitted to perform read or write operations. Data within the storage can only be created, viewed, modified, or deleted through the registered applications. When an unregistered application attempts to access data, the system presents a read-only fake file, preventing unauthorized access to the actual data. Depending on configuration, registered applications can be designated either as read\/write applications or as read-only applications.   <\/td>\n        <\/tr>\n         <tr>\n            <td align=\"center\">Security<\/td>\n            <td>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n            <\/td>\n            <td>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n            <\/td>\n        <\/tr>\n        <tr>\n            <td align=\"center\">Convenience<\/td>\n            <td>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n            <\/td>\n            <td>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n                <div class=\"elementor-icon\" style=\"font-size: 15px;\"><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-star\" viewbox=\"0 0 576 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M259.3 17.8L194 150.2 47.9 171.5c-26.2 3.8-36.7 36.1-17.7 54.6l105.7 103-25 145.5c-4.5 26.3 23.2 46 46.4 33.7L288 439.6l130.7 68.7c23.2 12.2 50.9-7.4 46.4-33.7l-25-145.5 105.7-103c19-18.5 8.5-50.8-17.7-54.6L382 150.2 316.7 17.8c-11.7-23.6-45.6-23.9-57.4 0z\"><\/path><\/svg><\/div>\n            <\/td>\n        <\/tr>\n         <tr>\n            <td align=\"center\">Technical Features<\/td>\n<td>Based on international standard X.nspam\nGood Software Certification<\/td><br><td>International standard ITU-T X.1220<br>International Common Criteria Certification<\/td>\n        <\/tr>\n         <tr>\n            <td align=\"center\">Target Environment<\/td>\n<td>Protects data on hospital PCs and all medical devices that support standard network file servers (e.g., PACS systems, EMR, etc.)<\/td>\n<td>Protects data on hospital Windows PCs and Linux servers<\/td>\n        <\/tr>\n        <tr>\n            <td align=\"center\">Download<\/td>\n<td align=\"center\"><a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.filingbox.com\/en\/download\/#giga\" target=\"_blank\"><span class=\"elementor-button-content-wrapper\">\n<span class=\"elementor-button-text\">Download<\/span>\n<\/span>\n<\/a><\/td>\n<td align=\"center\"><a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.filingbox.com\/en\/download\/#mega\" target=\"_blank\"><span class=\"elementor-button-content-wrapper\">\n<span class=\"elementor-button-text\">Download<\/span>\n<\/span>\n<\/a><\/td>\n        <\/tr>\n    <\/tbody>\n<\/table>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9062220 e-flex e-con-boxed e-con e-parent\" data-id=\"9062220\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8029b4 elementor-widget elementor-widget-heading\" data-id=\"a8029b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Storage Protection System Layout<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab2a28f elementor-widget elementor-widget-image\" data-id=\"ab2a28f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1730\" height=\"636\" src=\"https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/system-layout.png\" class=\"attachment-full size-full wp-image-2176\" alt=\"\" srcset=\"https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/system-layout.png 1730w, https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/system-layout-300x110.png 300w, https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/system-layout-1024x376.png 1024w, https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/system-layout-768x282.png 768w, https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/system-layout-1536x565.png 1536w\" sizes=\"(max-width: 1730px) 100vw, 1730px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be89c64 elementor-widget elementor-widget-text-editor\" data-id=\"be89c64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Storage Protection is file server software equipped with data protection features. By connecting general storage, which lacks any protection functions, to a Storage Protection file server, it provides a network drive with data protection to PCs or servers, offering secure storage for hospital data. In other words, the Storage Protection file server acts as a file system\u2013level firewall between PCs\/servers and storage.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-db43edf e-flex e-con-boxed e-con e-parent\" data-id=\"db43edf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7baee52 elementor-widget elementor-widget-heading\" data-id=\"7baee52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Storage Protection Software License Issuance Process<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d2d8d4 elementor-widget elementor-widget-image\" data-id=\"2d2d8d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1729\" height=\"369\" src=\"https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/diamgram_license_en.png\" class=\"attachment-full size-full wp-image-1966\" alt=\"\" srcset=\"https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/diamgram_license_en.png 1729w, https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/diamgram_license_en-300x64.png 300w, https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/diamgram_license_en-1024x219.png 1024w, https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/diamgram_license_en-768x164.png 768w, https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/diamgram_license_en-1536x328.png 1536w\" sizes=\"(max-width: 1729px) 100vw, 1729px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0202b9b elementor-widget elementor-widget-text-editor\" data-id=\"0202b9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>To use Storage Protection software free of charge, small and medium-sized hospitals and non-hospital medical institutions must submit a license application. ProtectMedicalData.org verifies that the application is submitted by a legitimate medical institution before issuing the license key.&nbsp;<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be54f8f elementor-widget elementor-widget-button\" data-id=\"be54f8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/www.protectmedicaldata.org\/en\/join\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Apply for a Free Medical Institution License<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Protect medical data with Storage Protection! Medical data stored on hospital PCs and servers is highly vulnerable to modern ransomware and data exfiltration attacks. Attackers lure users into executing ransomware and even escalate privileges to gain administrator access, directly targeting medical data. Existing network protection or endpoint protection alone cannot fundamentally block ransomware or administrator [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":20,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2084","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to protect medical data - Protect Medical Data<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.protectmedicaldata.org\/en\/how-to-protect-medical-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect medical data - Protect Medical Data\" \/>\n<meta property=\"og:description\" content=\"Protect medical data with Storage Protection! Medical data stored on hospital PCs and servers is highly vulnerable to modern ransomware and data exfiltration attacks. Attackers lure users into executing ransomware and even escalate privileges to gain administrator access, directly targeting medical data. Existing network protection or endpoint protection alone cannot fundamentally block ransomware or administrator [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.protectmedicaldata.org\/en\/how-to-protect-medical-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Protect Medical Data\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-09T05:09:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/system-layout.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1730\" \/>\n\t<meta property=\"og:image:height\" content=\"636\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/how-to-protect-medical-data\\\/\",\"url\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/how-to-protect-medical-data\\\/\",\"name\":\"How to protect medical data - Protect Medical Data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/how-to-protect-medical-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/how-to-protect-medical-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/system-layout.png\",\"datePublished\":\"2025-08-17T16:03:20+00:00\",\"dateModified\":\"2025-12-09T05:09:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/how-to-protect-medical-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/how-to-protect-medical-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/how-to-protect-medical-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/system-layout.png\",\"contentUrl\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/system-layout.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/how-to-protect-medical-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\ud648\",\"item\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect medical data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/\",\"name\":\"protectmedicaldata\",\"description\":\"Protect medical data with Storage Protection\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/#organization\",\"name\":\"protectmedicaldata\",\"url\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/pmd_web_logo.png\",\"contentUrl\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/pmd_web_logo.png\",\"width\":456,\"height\":277,\"caption\":\"protectmedicaldata\"},\"image\":{\"@id\":\"https:\\\/\\\/www.protectmedicaldata.org\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect medical data - Protect Medical Data","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.protectmedicaldata.org\/en\/how-to-protect-medical-data\/","og_locale":"en_US","og_type":"article","og_title":"How to protect medical data - Protect Medical Data","og_description":"Protect medical data with Storage Protection! Medical data stored on hospital PCs and servers is highly vulnerable to modern ransomware and data exfiltration attacks. Attackers lure users into executing ransomware and even escalate privileges to gain administrator access, directly targeting medical data. Existing network protection or endpoint protection alone cannot fundamentally block ransomware or administrator [&hellip;]","og_url":"https:\/\/www.protectmedicaldata.org\/en\/how-to-protect-medical-data\/","og_site_name":"Protect Medical Data","article_modified_time":"2025-12-09T05:09:58+00:00","og_image":[{"width":1730,"height":636,"url":"https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/system-layout.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.protectmedicaldata.org\/en\/how-to-protect-medical-data\/","url":"https:\/\/www.protectmedicaldata.org\/en\/how-to-protect-medical-data\/","name":"How to protect medical data - Protect Medical Data","isPartOf":{"@id":"https:\/\/www.protectmedicaldata.org\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.protectmedicaldata.org\/en\/how-to-protect-medical-data\/#primaryimage"},"image":{"@id":"https:\/\/www.protectmedicaldata.org\/en\/how-to-protect-medical-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/system-layout.png","datePublished":"2025-08-17T16:03:20+00:00","dateModified":"2025-12-09T05:09:58+00:00","breadcrumb":{"@id":"https:\/\/www.protectmedicaldata.org\/en\/how-to-protect-medical-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.protectmedicaldata.org\/en\/how-to-protect-medical-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.protectmedicaldata.org\/en\/how-to-protect-medical-data\/#primaryimage","url":"https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/system-layout.png","contentUrl":"https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/09\/system-layout.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.protectmedicaldata.org\/en\/how-to-protect-medical-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\ud648","item":"https:\/\/www.protectmedicaldata.org\/en\/"},{"@type":"ListItem","position":2,"name":"How to protect medical data"}]},{"@type":"WebSite","@id":"https:\/\/www.protectmedicaldata.org\/en\/#website","url":"https:\/\/www.protectmedicaldata.org\/en\/","name":"protectmedicaldata","description":"Protect medical data with Storage Protection","publisher":{"@id":"https:\/\/www.protectmedicaldata.org\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.protectmedicaldata.org\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.protectmedicaldata.org\/en\/#organization","name":"protectmedicaldata","url":"https:\/\/www.protectmedicaldata.org\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.protectmedicaldata.org\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/08\/pmd_web_logo.png","contentUrl":"https:\/\/www.protectmedicaldata.org\/wp-content\/uploads\/2025\/08\/pmd_web_logo.png","width":456,"height":277,"caption":"protectmedicaldata"},"image":{"@id":"https:\/\/www.protectmedicaldata.org\/en\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.protectmedicaldata.org\/en\/wp-json\/wp\/v2\/pages\/2084","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.protectmedicaldata.org\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.protectmedicaldata.org\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.protectmedicaldata.org\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.protectmedicaldata.org\/en\/wp-json\/wp\/v2\/comments?post=2084"}],"version-history":[{"count":22,"href":"https:\/\/www.protectmedicaldata.org\/en\/wp-json\/wp\/v2\/pages\/2084\/revisions"}],"predecessor-version":[{"id":2188,"href":"https:\/\/www.protectmedicaldata.org\/en\/wp-json\/wp\/v2\/pages\/2084\/revisions\/2188"}],"wp:attachment":[{"href":"https:\/\/www.protectmedicaldata.org\/en\/wp-json\/wp\/v2\/media?parent=2084"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}