JUN 14, 2012 7:09am ET

Related Links

Why You Need A Chief Information Security Officer
April 16, 2014
Early Retail Adopters Moving to Full-Scale Indoor Location Technology Deployments
April 16, 2014
The Well-Rounded Data Scientist
April 15, 2014

Web Seminars

April 29: Create a data protection strategy with open, software-defined storage
April 29, 2014
New Best Practices To Manage Customer Information
May 7, 2014
May 13: Cost-effective, scale-out backup in 1 solution
May 13, 2014
news

13 Tips for Managing Mobile Threats

Print
Reprints
Email

June 14, 2012 – ID Experts, a data breach prevention and remediation firm, talked with 13 experts and got 13 tips for managing mobile device threats in health care:

  1. Install USB locks on computers and devices to prevent unauthorized uploads and downloads;
  2. Consider software that can track and locate a device or wipe (erase) its data;
  3. Consider “brick” software that disables a missing device;
  4. Encrypt;
  5. Train employees to shut down laptops rather than putting them in sleep mode, since sleep doesn’t activate encryption protection;
  6. Document in risk assessments the recognition that employees may use personal devices to handle PHI even if prohibited by policy, and reduce the risk, such as offering a secure alternative to texting;
  7. Don’t permit PHI access via mobile devices without strong technology safeguards;
  8. Educate employees on safeguarding their devices;
  9. Purchase cyber-liability insurance;
  10. Secure and check devices before disposal or donation;
  11. Have a proactive data management strategy such as token technology;
  12. Have clear and explicit user opt-in policy for collecting, storing or sharing data; and
  13. Conduct a thorough technical review and risk audit of new mobile technologies before implementation.

Get access to this article and thousands more...

All Information Management articles are archived after 7 days. REGISTER NOW for unlimited access to all recently archived articles, as well as thousands of searchable stories. Registered Members also gain access to:

  • Full access to information-management.com including all searchable archived content
  • Exclusive E-Newsletters delivering the latest headlines to your inbox
  • Access to White Papers, Web Seminars, and Blog Discussions
  • Discounts to upcoming conferences & events
  • Uninterrupted access to all sponsored content, and MORE!

Already Registered?

Advertisement

Are you actively evaluating master data management technologies and their ability to scale and support emerging trends around big data, social and mobile?

Yes 61%
No 23%
Don't Know 9%
Not Applicable 6%

 

Twitter
Facebook
LinkedIn
Login  |  My Account  |  White Papers  |  Web Seminars  |  Events |  Newsletters |  eBooks
FOLLOW US
Please note you must now log in with your email address and password.