Upload
curemd
View
130
Download
2
Embed Size (px)
DESCRIPTION
How to avoid BYOD breaches?
Citation preview
How to avoid BYOD breaches?
© CureMD Healthcare
Bring Your Own Device (BYOD)
• Without a shadow of doubt, the concept of Bring Your Own Device (BYOD) offers plenty of benefits to both healthcare employees and employers
• To name a few, users are familiar and more comfortable with their own devices which can increase output
• There is also no time spent on training because the devices are owned by the employees, and as a result the hospitals are saved from incurring additional expenditure
Bring Your Own Device (BYOD)• Despite the foregoing benefits, security issues
continue to haunt the BYOD concept, something which keeps hospitals from implementing it
• Personally owned devices can raise a number of concerns with regards to HIPAA related security protocols
• No matter who owns the device, in case of a data breach, the hospital is going to be held responsible
• Such devices are least likely to have enterprise-level security controls such as encryption and are also vulnerable to viruses from personal apps, social media forums, email, web browser, etc
Benefits of BYOD• Use Mobile Device Management (MDM) solution– An MDM solution enables the IT department of your
hospital to:• Better control the devices attached to hospital
networks from a centralized location, irrespective of the type of the device’s operating system or ownership status• Better monitor and control applications that are
installed on the devices, access the content that is stored on the devices and control what information is shared in and out of them• Better monitor devices, including asset tracking,
reporting and geo-location
Benefits of BYOD
• Use high-level security– MDM is the only aspect towards a multi-layered approach
for ensuring a secure and better managed BYOD strategy. Some of the other elements include:• Geo-fencing and contextual MDM provide an
innovative way to secure and lock down devices based on location• It is crucial for hospitals to upgrade their IT networks
with solutions which not only prevent threats but also data loss• Virtualization technologies support data-focused
security strategies by preventing sensitive data from being stored on devices
Benefits of BYOD
• Periodically assess infrastructure capabilities and costs– A robust network is the one which incorporates both
wireless and cellular components, and can optimize performance and control costs. Hospitals should look to:• Use telecom expense management (TEM) solutions to
track carrier costs and data usage • Control data usage costs by opting for unlimited plans
with wireless carriers whenever possible, as well as encouraging Wi-Fi use when available• Carefully evaluate and select wireless carriers to ensure
reliability and security for mobile devices
Read more on blog.curemd.com
• To read more on this topic, visit:• http://
blog.curemd.com/how-to-avoid-byod-breaches/
CureMD Healthcare55 Broad Street, New York, NY
10004 Ph: 212.509.6200www.curemd.com
Thank you!