The aim is to plug holes in the security system that can allow attackers to gain access. The existing HIS is almost two decades old, with none aware of how vulnerable it is to external threats. As the initial proposal and requirements for HIS 2.0 were formulated before the incident at AIIMS, it was more geared towards upgrading existing capabilities. This scenario has now drastically changed., The aim is to plug holes in the security system that can allow attackers to gain access. The existing HIS is almost two decades old, with none aware of how vulnerable it is to external threats. As the initial proposal and requirements for HIS 2.0 were formulated before the incident at AIIMS, it was more geared towards upgrading existing capabilities. This scenario has now drastically changed., , Read More
AAS Yoga
Go for Euphoria – Illness to Wellness the Natural Way