• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

  • Opinion
  • Health IT
    • Behavioral Health
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Patient Engagement
    • Population Health Management
    • Revenue Cycle Management
    • Social Determinants of Health
  • Digital Health
    • AI
    • Blockchain
    • Precision Medicine
    • Telehealth
    • Wearables
  • Startups
  • M&A
  • Value-based Care
    • Accountable Care (ACOs)
    • Medicare Advantage
  • Life Sciences
  • Research

Time For a Mobile Security Assessment – A Comprehensive Mobile Security Checklist

by Jasmine Pennic 11/09/2016 Leave a Comment

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print

Editor’s Note: This post is sponsored by Samsung.

Unbeknownst to all, the healthcare industry is in possession of vast amounts of valuable data, while also being the most at-risk and easy to breach. Using outdated, interconnected electronic systems without a strong security plan contributes to this problem. According to Symantec’s 2016 Internet Security Threat Report, healthcare was the most targeted sector in 2015. To help ease the pain of this huge wound, Samsung and Booz Allen Hamilton partnered this year to create a mobile security assessment that can identify any gaps in company security protocols and help to improve overall security position. Illustrated in an informative infographic for easy reading, it covers the current state of a company’s security measurements, and the challenges and key areas to focus on for a more protected, mobile work platform.

Currently, the state of mobility according to C-level security leaders breaks down as follows:

·       59% of C-level security leaders describe their business as either partially or fully mobile.

·       64% report that mobility has increased productivity and efficiency.

·       28% of CIOs state that their organization doesn’t have a mobile security strategy.

·       63% say enterprise mobility has surfaced a greater number of security risks and concerns than anticipated.

Among some of the top challenges that companies face with mobility security are protecting data, application concerns and separation of work and personal data.

Organizations feel the effect of these major challenges in a few ways:

·       67% of organizations said a data breach likely resulted from employees using their mobile devices to access sensitive company information.

·       33% of employees say they have more access to confidential or classified documents while only 8% of employees have this access according to company IT departments. (Organizations should always review and communicate with employees on how to properly manage confidential data on their mobile devices.)

·       20% of BYOD (Bring Your Own Device) programs will fail because IT departments are trying to implement MDM solutions that are too restrictive.

Enterprises need a mobile security plan to strategically balance risk and employee productivity. This involves right-sizing mobile policies, leveraging tools to manage risks, and where possible, enabling more open environments for better user experience. When looking at all the components involved, organizations need to manage and enable the reality, not the perception.

A comprehensive security assessment should inform organizations of their needs before employees gain mobility use. Companies should look at security analysis and planning, mechanism selection and testing and key architecture elements. Below are seven key fundamental pieces of a security assessment according to Samsung and Booz Allen Hamiliton:

1.     Business management and governance – creating a MDM solution and team to oversee mobile uses

2.     Legal policies and regulatory requirements – ensuring users are abiding by BYOD and PHI policies

3.     Mobility infrastructure – getting practices involved on investing more money to make security a priority

4.     Mobility applications – protecting PHI by denying downloads or by blocking unauthorized access to apps

5.     Data protection – utilizing passwords, enabling encryption, wiping or remotely disabling mobile devices

6.     Mobility endpoints – preventing data leakage with device encryption and other access control technologies

7.     Risk and threat management – staying up-to-date and current on security and operating systems

Combating mobile security requires a developed mobile strategy that links business objectives to data safety.  Be sure to implement plans that include mobile and wireless security, policies and standard reviews, in addition to legal and regulatory compliance checks. Having a solid mobile security plan that has all of these points is critical in our vulnerable industry of PHI.

is-it-time-for-a-mobile-security-assessment-samsung

For more content like this, follow Samsung on Insights, Twitter, LinkedIn, YouTube and SlideShare.

Source: https://insights.samsung.com/2016/10/14/is-it-time-for-a-mobile-security-assessment/

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print

Tagged With: Samsung, Samsung Business

Tap Native

Get in-depth healthcare technology analysis and commentary delivered straight to your email weekly

Reader Interactions

Primary Sidebar

Subscribe to HIT Consultant

Latest insightful articles delivered straight to your inbox weekly.

Submit a Tip or Pitch

Featured Insights

2025 EMR Software Pricing Guide

2025 EMR Software Pricing Guide

Featured Interview

Kinetik CEO Sufian Chowdhury on Fighting NEMT Fraud & Waste

Most-Read

CureIS Healthcare Sues Epic: Alleges Anti-Competitive Practices & Trade Secret Theft

The Evolving Role of Physician Advisors: Bridging the Gap Between Clinicians and Administrators

The Evolving Physician Advisor: From UM to Value-Based Care & AI

UnitedHealth Group Names Stephen Hemsley CEO as Andrew Witty Steps Down

UnitedHealth CEO Andrew Witty Steps Down, Stephen Hemsley Returns as CEO

Omada Health Files for IPO

Omada Health Files for IPO

Blue Cross Blue Shield of Massachusetts Launches "CloseKnit" Virtual-First Primary Care Option

Blue Cross Blue Shield of Massachusetts Launches “CloseKnit” Virtual-First Primary Care Option

Osteoboost Launches First FDA-Cleared Prescription Wearable Nationwide to Combat Low Bone Density

Osteoboost Launches First FDA-Cleared Prescription Wearable Nationwide to Combat Low Bone Density

2019 MedTech Breakthrough Award Category Winners Announced

MedTech Breakthrough Announces 2025 MedTech Breakthrough Award Winners

WeightWatchers Files for Bankruptcy to Eliminate $1.15B in Debt

WeightWatchers Files for Bankruptcy to Eliminate $1.15B in Debt

KLAS: Epic Dominates 2024 EHR Market Share Amid Focus on Vendor Partnership; Oracle Health Sees Losses Despite Tech Advances

KLAS: Epic Dominates 2024 EHR Market Share Amid Focus on Vendor Partnership; Oracle Health Sees Losses Despite Tech Advances

'Cranky Index' Reveals EHR Alert Frustration Peaks Midweek, Highest Among Admin Staff

‘Cranky Index’ Reveals EHR Alert Frustration Peaks Midweek, Highest Among Admin Staff

Secondary Sidebar

Footer

Company

  • About Us
  • Advertise with Us
  • Reprints and Permissions
  • Submit An Op-Ed
  • Contact
  • Subscribe

Editorial Coverage

  • Opinion
  • Health IT
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Population Health Management
    • Revenue Cycle Management
  • Digital Health
    • Artificial Intelligence
    • Blockchain Tech
    • Precision Medicine
    • Telehealth
    • Wearables
  • Startups
  • Value-Based Care
    • Accountable Care
    • Medicare Advantage

Connect

Subscribe to HIT Consultant Media

Latest insightful articles delivered straight to your inbox weekly

Copyright © 2025. HIT Consultant Media. All Rights Reserved. Privacy Policy |