Healthcare Information Security

Mobile Device Management

Data Security Top Reason Hospitals Prohibit Healthcare BYOD

September 20, 2017 - More hospitals are allowing healthcare BYOD policies, but data security is the top reason why an organization would prohibit such policies from being implemented, according to a recent Spok survey. Spok interviewed more than 350 healthcare leaders on their BYOD views, and found that 71 percent of hospitals in 2017 allow for BYOD policies. This is an increase from the 58 percent that allowed...

More Articles

How Mobile Healthcare Users Affect the Industry, Data Security

by Bill Kleyman

We’re seeing a true evolution around mobile devices being brought into the healthcare world. Mobile healthcare users are quickly becoming the norm. As bring your own device (BYOD) programs continue to become more commonplace, 38 percent...

Mobile Security Concerns Continue to Nag Health IT Leaders

by Elizabeth Snell

Healthcare IT decision makers may see the value in implementing mobile options, such as BYOD and mobile device management (MDM) solutions, but there are still mobile security concerns, recent research shows. More than one-quarter of IT decision...

How Improper Off-Site Policies Impact Mobile Health Security

by Jacqueline Belliveau

For many providers, quality healthcare extends beyond the hospital walls, especially with the introduction of smart phones and mHealth technologies. However, as more healthcare organizations adopt mobile strategies, providers are becoming more...

Prioritizing BYOD Security, MDM in Evolving Healthcare Sector

by Elizabeth Snell

The increase in mobile devices, including smartphones and tablets, has also created a greater need for BYOD security policies and mobile device management (MDM) policies for healthcare organizations. Moreover, that proliferation of mobile devices...

How BYOD, Mobile Security is Prioritized at OhioHealth

by Elizabeth Snell

BYOD policies are critical aspects to mobile security platforms that have been implemented at any covered entity. Whether an organization is looking to implement smartphones, laptops, or tablets, mobile security should be top priority, especially...

Using a ‘Layered’ Approach for Health Data Security

by Elizabeth Snell

As technology has continued to evolve, healthcare data security has also needed to change in order to keep pace and keep sensitive information secured. That is why Illinois-based Riverside Healthcare has adopted security in layers, ensuring that...

Understanding HIPAA Regulations and Mobile Devices

by Elizabeth Snell

The proliferation of mobile devices has caused many covered entities and business associates to take a closer look at HIPAA regulations, to ensure that they remain secure while they are using the latest technologies. It is essential to understand...

What Are Top Mobile Health Security Concerns in 2016?

by Elizabeth Snell

Mobile health security has continued to grow with numerous advances in technology, and that trend will likely last into 2016. More providers are encouraging the use of mobile devices, and more consumers are looking for ways to become more involved...

NIST, NCCoE Develop Mobile Device Security Draft Guide

by Sara Heath

To combat issues of mobile device security, the National Institute of Standards and Technology (NIST) and the National Cybersecurity Center of Excellence (NCCoE) have developed a guideline for implementing mobile security measures on both personal...

BYOD Privacy Concerns Push Security Admins Away, Says Report

by Elizabeth Snell

While there may be a slight push for mobile devices and Bring Your Own Device (BYOD) policies, a recent survey shows that BYOD privacy concerns are pushing away end users and even IT security administrators. The majority of individuals are hesitant...

NIST Releases Draft Guide on Mobile Device Security

by Elizabeth Snell

The National Institute of Standards and Technology’s (NIST) National Cybersecurity Center of Excellence (NCCoE) released a draft guide for healthcare providers on mobile device security. The draft is designed to help facilities keep patient...

NIST Releases Secure Mobile Application Guide

by Elizabeth Snell

With more healthcare organizations implementing mobile devices, it is essential that facilities are also choosing secure mobile applications. Even if employees are following the necessary security protocols, a mobile application with lackluster...

Creating Best Practices for Healthcare IT Wireless Security

by Bill Kleyman

There is an interesting trend happening within the modern healthcare world. The proliferation of wireless devices is beginning to outpace wired systems running within healthcare IT environments. Doctors, nurses and healthcare associates are using...

NIST Mobile App Security Guidelines: Healthcare Key Points

by Elizabeth Snell

With more smartphones and tablets being used in the workplace, it’s increasingly important for employees to understand the risks associated with third-party mobile applications. The healthcare industry must be especially careful, as using...

Balancing Healthcare Cloud Prospects With Security Needs

by Patrick Ouellette

A healthcare organization is constantly weighing short-term plans against long-term goals and ensuring that these different projects are properly aligned isn’t always easy. Dale Atkins, Technical Architect at Munson Medical Center of Traverse...

Recognizing, isolating a healthcare organization’s latent risks

by Patrick Ouellette

Some security risks within a healthcare organization are more apparent than others, but those underlying threats are no less significant. Fernando Martinez, Senior Vice President, CIO at Parkland Health & Hospital System, sees latent risks...

Healthcare BYOD policy considerations: Minimizing risk

by Patrick Ouellette

BOSTON – A common theme throughout the HIMSS Privacy and Security Forum this week was acceptance of risk and how much is tolerable for a healthcare organization. The benefit versus risk debate becomes even more interesting when weighing an...

Medical center looks at hybrid cloud options, security needs

by Patrick Ouellette

Transitioning data from your own data center to a cloud environment is never a completely smooth process, but recent data breaches have likely forced healthcare organizations to ensure cloud data is secure as possible. Some organizations have...

BYOD security report: Tools and budget trends

by Patrick Ouellette

It’s well-understood that security and employee satisfaction are the major concerns and drivers, respectively, of healthcare BYOD adoption. But where do cross-industry organizations stand on these critical areas of mobile device strategy?...


SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
Data Breaches

Our privacy policy

no, thanks