When not implemented carefully, a telemedicine roll out can put patient data at risk. To perform a telehealth consultation, a healthcare provider uses various applications, devices, and software programs to connect with the patient. The devices the healthcare provider uses for consults may belong to another medical professional or facility. Since the device might not belong to the provider, security assurances are difficult to make. Lags in security updates, insecure connections, and a lack of visibility into public networks can lead to health system vulnerability. Once vulnerable, cyber criminals can infiltrate the core enterprise network.