Tags: mobile security
Businesses in all forms operate under numerous business regulations. Small businesses such as finance healthcare, or one where a fine might be imposed if a data breach occurred need to recognize mobile security as a fundamental layer of yours or your company’s information security process.
Mobiles are smartphones and used for ecommerce for consumers and they are used for business tasks as Point of Sales to process credit cards or make payments.
A hospital is a perfect example: Many nurses have mobile phones and many more have tablets for work related purposes. They must be concerned about Health Insurance Portability and Accountability Act also known as *HIPAA: The rule under HIPPA requires health plans, health care providers, and others required by HIPAA to notify individuals (patients) of any breaches of their medical data.
Overall routine patient information is gathered for all hospital patients, such as the patient’s Social Security number, name, address, D.O.B, gender and other data that helps them authenticate the patient’s identity and insurance coverage data.
So if you as an employee of a hospital use your personal device at work and also use it outside of work and it gets lost or stolen, then YES, you and the hospital would be in a great deal of hot water in the event that mobile device was lost.
This is where a BYOD or Bring Your Own Device policy comes into place. Cozy up to your IT manager and find out what that mobile security policy states. Sometimes they are so restrictive you may not want to use your own device.
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- Health Care Information Breaches rise
Medical errors can also mean medical identity theft—accounting for 43 percent of all 2013 identity theft in the U.S., says the Identity Theft Resource Center. Medical identity theft kicks other forms of ID theft to the curb: banking, finance, government, military and education. Fraudsters invade health data to illegally obtain prescription drugs, services or devices and
- Laptop theft leads to identity theft
Ever lose a mobile device? Have one stolen? Know someone who has? Device loss and theft is a common issue when it comes to identity theft and results in data breaches. Some studies have shown as many as 2.5 million laptops are stolen annually, which equates to a laptop stolen every 12 seconds. It used to
- IT Security – Get a BYOD Policy Now!
Your companies IT person is tasked with managing numerous digital devices like mobile phones, tablets and any other portable device that communicates. Small businesses and IT managers must have IT security policies to manage devices attached to the network. Start looking at security vendors who provide solutions to keep track of, lock down, and secure your small
- Healthcare Firm pays Big Bucks for Breach
A data breach can slug below the belt and knock a healthcare business flat on its back, as was the case with Columbia University and the New York and Presbyterian Hospital. They paid a $4.8 million settlement (the biggest HIPAA settlement to date) after the electronic records of 6,800 patients (including vital stats, medications and even
- HHS provides Healthcare Providers Risk Assessment Tools
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires that covered entities conduct a risk assessment of their healthcare organization. A risk assessment helps your organization ensure it is compliant with HIPAA’s administrative, physical, and technical safeguards. A risk assessment also helps reveal areas where your organization’s protected health information (PHI) could be at risk. Watch the Security Risk
Leave a Comment
You must be logged in to post a comment.