• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer

  • Opinion
  • Health IT
    • Behavioral Health
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Patient Engagement
    • Population Health Management
    • Revenue Cycle Management
    • Social Determinants of Health
  • Digital Health
    • AI
    • Blockchain
    • Precision Medicine
    • Telehealth
    • Wearables
  • Life Sciences
  • Investments
  • M&A
  • Value-based Care
    • Accountable Care (ACOs)
    • Medicare Advantage

Time For a Mobile Security Assessment – A Comprehensive Mobile Security Checklist

by Jasmine Pennic 11/09/2016 Leave a Comment

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print

Editor’s Note: This post is sponsored by Samsung.

Unbeknownst to all, the healthcare industry is in possession of vast amounts of valuable data, while also being the most at-risk and easy to breach. Using outdated, interconnected electronic systems without a strong security plan contributes to this problem. According to Symantec’s 2016 Internet Security Threat Report, healthcare was the most targeted sector in 2015. To help ease the pain of this huge wound, Samsung and Booz Allen Hamilton partnered this year to create a mobile security assessment that can identify any gaps in company security protocols and help to improve overall security position. Illustrated in an informative infographic for easy reading, it covers the current state of a company’s security measurements, and the challenges and key areas to focus on for a more protected, mobile work platform.

Currently, the state of mobility according to C-level security leaders breaks down as follows:

·       59% of C-level security leaders describe their business as either partially or fully mobile.

·       64% report that mobility has increased productivity and efficiency.

·       28% of CIOs state that their organization doesn’t have a mobile security strategy.

·       63% say enterprise mobility has surfaced a greater number of security risks and concerns than anticipated.

Among some of the top challenges that companies face with mobility security are protecting data, application concerns and separation of work and personal data.

Organizations feel the effect of these major challenges in a few ways:

·       67% of organizations said a data breach likely resulted from employees using their mobile devices to access sensitive company information.

·       33% of employees say they have more access to confidential or classified documents while only 8% of employees have this access according to company IT departments. (Organizations should always review and communicate with employees on how to properly manage confidential data on their mobile devices.)

·       20% of BYOD (Bring Your Own Device) programs will fail because IT departments are trying to implement MDM solutions that are too restrictive.

Enterprises need a mobile security plan to strategically balance risk and employee productivity. This involves right-sizing mobile policies, leveraging tools to manage risks, and where possible, enabling more open environments for better user experience. When looking at all the components involved, organizations need to manage and enable the reality, not the perception.

A comprehensive security assessment should inform organizations of their needs before employees gain mobility use. Companies should look at security analysis and planning, mechanism selection and testing and key architecture elements. Below are seven key fundamental pieces of a security assessment according to Samsung and Booz Allen Hamiliton:

1.     Business management and governance – creating a MDM solution and team to oversee mobile uses

2.     Legal policies and regulatory requirements – ensuring users are abiding by BYOD and PHI policies

3.     Mobility infrastructure – getting practices involved on investing more money to make security a priority

4.     Mobility applications – protecting PHI by denying downloads or by blocking unauthorized access to apps

5.     Data protection – utilizing passwords, enabling encryption, wiping or remotely disabling mobile devices

6.     Mobility endpoints – preventing data leakage with device encryption and other access control technologies

7.     Risk and threat management – staying up-to-date and current on security and operating systems

Combating mobile security requires a developed mobile strategy that links business objectives to data safety.  Be sure to implement plans that include mobile and wireless security, policies and standard reviews, in addition to legal and regulatory compliance checks. Having a solid mobile security plan that has all of these points is critical in our vulnerable industry of PHI.

is-it-time-for-a-mobile-security-assessment-samsung

For more content like this, follow Samsung on Insights, Twitter, LinkedIn, YouTube and SlideShare.

Source: https://insights.samsung.com/2016/10/14/is-it-time-for-a-mobile-security-assessment/

  • LinkedIn
  • Twitter
  • Facebook
  • Email
  • Print

Tagged With: Samsung, Samsung Business

Tap Native

Get in-depth healthcare technology analysis and commentary delivered straight to your email weekly

Reader Interactions

Primary Sidebar

Subscribe to HIT Consultant

Latest insightful articles delivered straight to your inbox weekly.

Submit a Tip or Pitch

2026 Predictions & Trends

Healthcare 2026 Forecast: Executives on AI Survival, Financial Reckoning, and the End of Point Solutions

2026 Healthcare Executive Predictions: Why the AI “Pilot Era” Is Officially Over

Most-Read

HHS Launches 'OneHHS' AI Strategy to Integrate AI Across CDC, CMS, and FDA for Efficiency and Public Trust

HHS Launches ‘OneHHS’ AI Strategy to Integrate AI Across CDC, CMS, and FDA for Efficiency and Public Trust

Kristen Hartsell, VP of Clinical Services, RedSail Technologies

The Pharmacy Closures Crisis: How Independent Pharmacies Are Fixing Pharmacy Deserts

From Overwhelmed to Optimized: How AI Agents Address Staffing Challenges and Burnout in Healthcare

From Overwhelmed to Optimized: How AI Agents Address Staffing Challenges and Burnout in Healthcare

The VBC Paradox: Why Hospitals Are Doubling Down on Value-Based Care While Revenue at Risk Lags

The VBC Paradox: Why Hospitals Are Doubling Down on Value-Based Care While Revenue at Risk Lags

Tebra Secures $250M to Challenge Legacy EHRs with AI-Powered Automation

Tebra Secures $250M to Challenge Legacy EHRs with AI-Powered Automation

AstraZeneca Selects Salesforce Agentforce Life Sciences to Deploy AI-Powered Global Customer Engagement

AstraZeneca Selects Salesforce Agentforce Life Sciences to Deploy AI-Powered Global Customer Engagement

Aidoc Partners with NVIDIA MONAI to Scale Open-Source Clinical AI

Aidoc Partners with NVIDIA MONAI to Scale Open-Source Clinical AI

RapidAI Secures FDA Clearance for Five New Deep Clinical AI Modules, Expanding Enterprise Imaging Platform

RapidAI and AWS Deepen Partnership to Scale Clinical AI in Healthcare

Greece and Sword Health to Build AI-Powered Healthcare Front Door

Greece and Sword Health to Build AI-Powered Healthcare Front Door

GE HealthCare Acquires Intelerad for $2.3B to Create Cloud-First, AI-Enabled Imaging Ecosystem

GE HealthCare Acquires Intelerad for $2.3B to Create Cloud-First, AI-Enabled Imaging Ecosystem

Secondary Sidebar

Footer

Company

  • About Us
  • Advertise with Us
  • Reprints and Permissions
  • Op-Ed Submission Guidelines
  • Contact
  • Subscribe

Editorial Coverage

  • Opinion
  • Health IT
    • Care Coordination
    • EMR/EHR
    • Interoperability
    • Population Health Management
    • Revenue Cycle Management
  • Digital Health
    • Artificial Intelligence
    • Blockchain Tech
    • Precision Medicine
    • Telehealth
    • Wearables
  • Startups
  • Value-Based Care
    • Accountable Care
    • Medicare Advantage

Connect

Subscribe to HIT Consultant Media

Latest insightful articles delivered straight to your inbox weekly

Copyright © 2025. HIT Consultant Media. All Rights Reserved. Privacy Policy |