8
How to avoid BYOD breaches? © CureMD Healthcare

How to avoid BYOD breaches?

  • Upload
    curemd

  • View
    130

  • Download
    2

Embed Size (px)

DESCRIPTION

How to avoid BYOD breaches?

Citation preview

Page 1: How to avoid BYOD breaches?

How to avoid BYOD breaches?

© CureMD Healthcare

Page 2: How to avoid BYOD breaches?

Bring Your Own Device (BYOD)

• Without a shadow of doubt, the concept of Bring Your Own Device (BYOD) offers plenty of benefits to both healthcare employees and employers

• To name a few, users are familiar and more comfortable with their own devices which can increase output

• There is also no time spent on training because the devices are owned by the employees, and as a result the hospitals are saved from incurring additional expenditure

Page 3: How to avoid BYOD breaches?

Bring Your Own Device (BYOD)• Despite the foregoing benefits, security issues

continue to haunt the BYOD concept, something which keeps hospitals from implementing it

• Personally owned devices can raise a number of concerns with regards to HIPAA related security protocols

• No matter who owns the device, in case of a data breach, the hospital is going to be held responsible

• Such devices are least likely to have enterprise-level security controls such as encryption and are also vulnerable to viruses from personal apps, social media forums, email, web browser, etc

Page 4: How to avoid BYOD breaches?

Benefits of BYOD• Use Mobile Device Management (MDM) solution– An MDM solution enables the IT department of your

hospital to:• Better control the devices attached to hospital

networks from a centralized location, irrespective of the type of the device’s operating system or ownership status• Better monitor and control applications that are

installed on the devices, access the content that is stored on the devices and control what information is shared in and out of them• Better monitor devices, including asset tracking,

reporting and geo-location

Page 5: How to avoid BYOD breaches?

Benefits of BYOD

• Use high-level security– MDM is the only aspect towards a multi-layered approach

for ensuring a secure and better managed BYOD strategy. Some of the other elements include:• Geo-fencing and contextual MDM provide an

innovative way to secure and lock down devices based on location• It is crucial for hospitals to upgrade their IT networks

with solutions which not only prevent threats but also data loss• Virtualization technologies support data-focused

security strategies by preventing sensitive data from being stored on devices

Page 6: How to avoid BYOD breaches?

Benefits of BYOD

• Periodically assess infrastructure capabilities and costs– A robust network is the one which incorporates both

wireless and cellular components, and can optimize performance and control costs. Hospitals should look to:• Use telecom expense management (TEM) solutions to

track carrier costs and data usage • Control data usage costs by opting for unlimited plans

with wireless carriers whenever possible, as well as encouraging Wi-Fi use when available• Carefully evaluate and select wireless carriers to ensure

reliability and security for mobile devices

Page 8: How to avoid BYOD breaches?

CureMD Healthcare55 Broad Street, New York, NY

10004 Ph: 212.509.6200www.curemd.com

Thank you!