Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
eWEEK.com
Search
eWEEK.com
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Small Business

    Health IT Pros Worried About Mobile Security Threats

    By
    NATHAN EDDY
    -
    August 25, 2016
    Share
    Facebook
    Twitter
    Linkedin
      health it and mobile

      A Spyglass Consulting Group study found the majority of hospitals surveyed have concerns about their ability to support and protect mobile devices, patient data and the hospital’s technology infrastructure.

      Eighty-two percent of hospitals surveyed were concerned about personally owned mobile devices used by physicians and advanced practice nurses, as well as hospital-owned and managed mobile devices used by nurses, ancillary healthcare professionals and other mobile hospital workers.

      The report found just 38 percent of hospitals surveyed had invested in a smartphone-based communications platform to support clinical communications. The average deployment size was 624 devices.

      Just over half (52 percent) of them have expanded their deployments beyond clinical messaging to support other mobile hospital workers.

      “In the past, hospital IT was primarily concerned about physicians, nurses and ancillary workers who were using their own personal devices to support clinical communications and collaboration,” Gregg Malkary, managing director of Spyglass Consulting Group, told eWEEK. “Many them had non-password-protected devices and are communicating using unsecured SMS that includes personal health information, which poses placing the healthcare organization and provider at risk of a potential HIPAA violation.”

      Malkary said some of the stumbling blocks hospitals face when trying to develop an IT security strategy include a limited budget to invest in more advanced security products and services and a lack of leadership and dedicated personnel who have knowledge, expertise and skills in advanced cyber-security and regulatory compliance.

      “I was under the impression if hospital IT workers made the appropriate investments in mobile device management solutions to enforce security protocols and secure messaging to protect patient health information, that this would have been adequate,” Malkary said. “Cyber-criminals have become more sophisticated and knowledgeable about the capabilities and vulnerabilities of existing security products, as well as the strategies and tools used by hospital IT to detect a potential intrusion.”

      He said hospital IT pros need to build multi-disciplinary teams to better understand both the cyber-security threats posed by mobile technologies and the implications on protecting patient data and hospital infrastructure.

      “They need to develop strict policies and procedures on the use of mobile technologies to support patient care and clearly identify the implications of an infraction, and need to educate end users who are using hospital-owned and personally owned devices on the dangers of cyber-security threats and how they can best safeguard information,” he said.

      He also noted hospital IT staff need to transition investments toward attacker detection and away from attacker prevention.

      “This will require increased investments in cyber-security analytics that can enables devices and entities acting suspiciously to be quickly identified and investigated,” he said.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      CHRIS PREIMESBERGER - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      CHRIS PREIMESBERGER - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      EWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      ZEUS KERRAVALA - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      WAYNE RASH - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Info

      © 2020 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×