dcsimg

Security Tips to Combat Mobile Device Threats to Health Care

  • Security Tips to Combat Mobile Device Threats to Health Care-

    Health care organizations should work to get ahead of the "BYOD upgrade" curve by ensuring that the devices coming offline are adequately secured and checked before disposal or donation.
    – Richard Santalesa, senior counsel, Information Law Group

    Given human nature, even firm and clear information security policies will be sidestepped. One area of concern with BYOD is that, by definition, the user owns and is primarily in control of the device — not IT. Once a user upgrades to a new smartphone or mobile device, the devices coming offline are almost always overlooked. Such smartphone and other devices are typically given to children to play with, donated to various charity organization or handed down to other family members — in many cases without confirmation that they've been sufficiently wiped and potentially leaving sensitive, confidential and other data intact. The result is a constant stream of devices going offline and posing significant data breach risks.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15

Security Tips to Combat Mobile Device Threats to Health Care

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15
  • Security Tips to Combat Mobile Device Threats to Health Care-11

    Health care organizations should work to get ahead of the "BYOD upgrade" curve by ensuring that the devices coming offline are adequately secured and checked before disposal or donation.
    – Richard Santalesa, senior counsel, Information Law Group

    Given human nature, even firm and clear information security policies will be sidestepped. One area of concern with BYOD is that, by definition, the user owns and is primarily in control of the device — not IT. Once a user upgrades to a new smartphone or mobile device, the devices coming offline are almost always overlooked. Such smartphone and other devices are typically given to children to play with, donated to various charity organization or handed down to other family members — in many cases without confirmation that they've been sufficiently wiped and potentially leaving sensitive, confidential and other data intact. The result is a constant stream of devices going offline and posing significant data breach risks.