dcsimg

Security Tips to Combat Mobile Device Threats to Health Care

  • Security Tips to Combat Mobile Device Threats to Health Care-

    Brick the mobile device when it is lost or stolen.
    – Jon A. Neiditz, partner, Nelson Mullins Riley & Scarborough LLP

    In the last year, ID Experts has seen greater acceptability among employees of "remote wipe" processes that "brick" the entire device when it is lost or stolen, rather than just wiping the encrypted silo of corporate information, for example. The reason that bricking the entire device is more acceptable, in their view, is that personal data is now more frequently backed up in cloud storage, so the bricking of the entire device does not result in data loss, and protects the employee as well as the company. This is the first tip in the context of BYOD programs.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15

Security Tips to Combat Mobile Device Threats to Health Care

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15
  • Security Tips to Combat Mobile Device Threats to Health Care-4

    Brick the mobile device when it is lost or stolen.
    – Jon A. Neiditz, partner, Nelson Mullins Riley & Scarborough LLP

    In the last year, ID Experts has seen greater acceptability among employees of "remote wipe" processes that "brick" the entire device when it is lost or stolen, rather than just wiping the encrypted silo of corporate information, for example. The reason that bricking the entire device is more acceptable, in their view, is that personal data is now more frequently backed up in cloud storage, so the bricking of the entire device does not result in data loss, and protects the employee as well as the company. This is the first tip in the context of BYOD programs.