Security Tips to Combat Mobile Device Threats to Health Care - Slide 6

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15
Next Security Tips to Combat Mobile Device Threats to Health Care-6 Next

Laptops put in "sleep" mode, as opposed to shutting them down completely, can render encryption products ineffective.
– Winston Krone, managing director, Kivu Consulting

Health care organizations are now routinely installing full-disk encryption on their employee laptops. However, most of the leading encryption products are configured so that once the password is entered, the laptop is unencrypted (and unprotected) until the laptop is booted down. Simply putting the laptop into "sleep" mode does not cause the encryption protection to kick back in. A laptop that is lost or stolen while in "sleep" mode is therefore completely unprotected. Employees should be clearly advised to completely shut down their laptops before removing them from the workplace (e.g. when taking them home for the evening) and to only use the full shut down function, rather than "sleep" mode, when traveling or leaving their laptop unattended in an unsecure environment. This policy should be strictly enforced and audited.


Related Topics : In Their Own Words: The Four Dark Horses for the Third Major Mobile OS Speak, HTC, Mobile Search, 3G, Location-Based Services

More Slideshows

Global33-290x195 2017 and Beyond: How Digital Innovation Will Impact the World

Digital innovation is by far the biggest influencer, changing the way we do just about everything, from shopping to communication to running a business. ...  More >>

IT_Man85-290x195 Business in the Front, Balance All Around: Working with Gen Z

In order to attract Gen Z talent, employers will need to take into account that this group of the workforce may expect a different set of benefits. ...  More >>

mobile92-290x195.jpg Why and How to Build an Enterprise App Store

Enterprise app stores provide a single "shopping experience" for employees and support both a BYOD model and a self-service IT model. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.