JUN 14, 2012 7:09am ET

Related Links

Mobile Now Mission Critical
July 28, 2014
USAA Uses IBM's Watson to Help Members Adjust to Civilian Life
July 28, 2014
Gartner: ‘Cognizant Computing’ to Become a Force in Consumer IT
July 21, 2014

Web Seminars

How Intelligent Digital Self-Service with Customer Analytics Can Lower Costs and Raise Revenue
July 29, 2014
Improve Omni-channel Shopping Experience with Product Information Management
August 21, 2014

13 Tips for Managing Mobile Threats


June 14, 2012 – ID Experts, a data breach prevention and remediation firm, talked with 13 experts and got 13 tips for managing mobile device threats in health care:

  1. Install USB locks on computers and devices to prevent unauthorized uploads and downloads;
  2. Consider software that can track and locate a device or wipe (erase) its data;
  3. Consider “brick” software that disables a missing device;
  4. Encrypt;
  5. Train employees to shut down laptops rather than putting them in sleep mode, since sleep doesn’t activate encryption protection;
  6. Document in risk assessments the recognition that employees may use personal devices to handle PHI even if prohibited by policy, and reduce the risk, such as offering a secure alternative to texting;
  7. Don’t permit PHI access via mobile devices without strong technology safeguards;
  8. Educate employees on safeguarding their devices;
  9. Purchase cyber-liability insurance;
  10. Secure and check devices before disposal or donation;
  11. Have a proactive data management strategy such as token technology;
  12. Have clear and explicit user opt-in policy for collecting, storing or sharing data; and
  13. Conduct a thorough technical review and risk audit of new mobile technologies before implementation.

Get access to this article and thousands more...

All Information Management articles are archived after 7 days. REGISTER NOW for unlimited access to all recently archived articles, as well as thousands of searchable stories. Registered Members also gain access to:

  • Full access to information-management.com including all searchable archived content
  • Exclusive E-Newsletters delivering the latest headlines to your inbox
  • Access to White Papers, Web Seminars, and Blog Discussions
  • Discounts to upcoming conferences & events
  • Uninterrupted access to all sponsored content, and MORE!

Already Registered?


Login  |  My Account  |  White Papers  |  Web Seminars  |  Events |  Newsletters |  eBooks
Please note you must now log in with your email address and password.