Healthcare Information Security

BYOD

How BYOD, Mobile Security is Prioritized at OhioHealth

March 23, 2016 - BYOD policies are critical aspects to mobile security platforms that have been implemented at any covered entity. Whether an organization is looking to implement smartphones, laptops, or tablets, mobile security should be top priority, especially as patient engagement increases and doctors need to potentially communicate with them as well as their colleagues. OhioHealth is no different, and...


More Articles

How to Successfully Integrate Secure Texting, Messaging

by Elizabeth Snell

Healthcare secure texting and secure messaging options are quickly increasing in popularity for covered entities. Providers are not only looking for secure, convenient ways to communicate internally, but externally as well. More patients have...

BYOD Privacy Concerns Push Security Admins Away, Says Report

by Elizabeth Snell

While there may be a slight push for mobile devices and Bring Your Own Device (BYOD) policies, a recent survey shows that BYOD privacy concerns are pushing away end users and even IT security administrators. The majority of individuals are hesitant...

BYOD Use on the Decline Due to Health Data Security Risks

by Sara Heath

BYOD policies are seeing a slight decline in popularity, according to a recent Spok survey, and it may be due to health data security and the challenges it poses on personal mobile device use. According to the study, BYOD usage has dropped 15...

How Important is Mobile Security for Healthcare Facilities?

by Elizabeth Snell

With a recent survey showing an increase in mobile device usage, healthcare facilities must remain vigilant in mobile security. There is no question that more healthcare organizations are finding ways to properly implement regulations to account...

Does Healthcare BYOD Create Greater Security Issues?

by Elizabeth Snell

Recent surveys indicate that healthcare providers and patients could be hesitant over BYOD policies because of potential security risks. With healthcare BYOD policies, providers have the ability to access patient data at their fingertips. Moreover,...

Where is the Greatest Health Data Breach Risk for Providers?

by Elizabeth Snell

Health data breach risks can appear in numerous ways, including through relationships with contractors and from lackluster BYOD policies. Healthcare providers need to remain diligent as technology continues to evolve, ensuring that they are taking...

Healthcare BYOD Adoption: Five Security Considerations

by Elizabeth Snell

As we approach the end of 2014, technology continues to evolve and more healthcare organizations are implementing and fine-tuning their BYOD policies. The benefit with BYOD is that healthcare staff members can conveniently use their own devices...

NIST Mobile App Security Guidelines: Healthcare Key Points

by Elizabeth Snell

With more smartphones and tablets being used in the workplace, it’s increasingly important for employees to understand the risks associated with third-party mobile applications. The healthcare industry must be especially careful, as using...

Identifying and mitigating healthcare IT security risks

by Patrick Ouellette

Being proactive in healthcare IT security means picking out risks before incidents occur, not after the fact. But the challenge is that potential risks are spread across a variety of areas within a healthcare organization. Blair Smith, Ph.D....

Tailoring healthcare BYOD policy to bolster mobile security

by Patrick Ouellette

With potential HIPAA audits looming in the distance, healthcare organizations are both ensuring they have the right technologies in place and are revising and updating their internal policies. For Ed Henry, Director of Technology at Princeton...

Seattle Children’s Hospital CISO discusses internal collaboration

by Patrick Ouellette

The idea of having a strong security plan in place for a healthcare organization’s eventual data breach is one that has been discussed at length lately within the industry. But one of the key elements of a strong security plan is the internal...

Managing healthcare network security and BYOD needs

by Patrick Ouellette

Though there’s never a true winner in the “ease of use” v. security debate, coming to a happy medium between the two can present challenges for healthcare organizations. This is especially the case when dealing with the impact...

Mobile health IT security: Bolstering technology with policy

by Patrick Ouellette

One way or another, mobile devices are finding their way into healthcare organizations’ four walls and onto their networks. Each organization’s mobile needs vary based on size and available resources and many have come a long way...

Healthcare CIO perspective on BYOD, security vendor selection

by Patrick Ouellette

In bringing new security technologies into a healthcare organization, from a CIO’s standpoint, there has to be the right mix of compatibility and alignment with internal policy. And in deciding which technologies and vendors would work...

Involving nurses in mHealth strategy may boost security

by Patrick Ouellette

When considering how clinical and innovation requirements fit into their mobile strategy, some organizations don’t consider nurses’ needs as well. Spyglass Consulting Group recently released “Point of Care Communications for...

mHealth adoption creates data security challenges

by Nicole Freeman

The use of mobile devices within healthcare (mHealth) is rising as physicians, nurses, and other healthcare providers enjoy the portability and flexibility that mobile devices allow. Smart phones, tablets, and laptops provide easy access to health...

Survey: Data breach risk biggest concern for mHealth use

by Nicole Freeman

According to a recent Axway survey conducted during HIMSS14, data breaches are the biggest concern in mobile health (mHealth) technology for healthcare IT professionals. Axway is a provider of data flow management software, and its poll surveyed...

Using encryption at rest to enhance healthcare BYOD security

by Patrick Ouellette

The confluence of mobile devices being widely distributed within healthcare organizations and data breaches involving unencrypted devices means there’s been plenty of discussion about mobile device encryption. Since most of these breaches...

Network security factors into healthcare wireless upgrades

by Patrick Ouellette

Last week, Torrance Memorial Medical Center, a 401-bed, non-profit medical center in Los Angeles County, announced it was deploying an Aruba wireless local area network (LAN). Among the reasons for the update was to improve wireless infrastructure...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy

no, thanks