identify risks with mobile devices: portable data storage wireless connections 3 rd party...
TRANSCRIPT
![Page 1: Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2](https://reader034.vdocuments.site/reader034/viewer/2022051819/5519d67e5503468b0c8b49c1/html5/thumbnails/1.jpg)
![Page 2: Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2](https://reader034.vdocuments.site/reader034/viewer/2022051819/5519d67e5503468b0c8b49c1/html5/thumbnails/2.jpg)
Identify risks with mobile devices:Portable data storageWireless connections3rd party applicationsData integrity Data availability
2
![Page 3: Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2](https://reader034.vdocuments.site/reader034/viewer/2022051819/5519d67e5503468b0c8b49c1/html5/thumbnails/3.jpg)
3
![Page 4: Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2](https://reader034.vdocuments.site/reader034/viewer/2022051819/5519d67e5503468b0c8b49c1/html5/thumbnails/4.jpg)
Mobile device: Electronic computing or storage device
›Smart phone
›USB drive
›Tablet
›CD, DVD
PHI: Protected Health Information
4
![Page 5: Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2](https://reader034.vdocuments.site/reader034/viewer/2022051819/5519d67e5503468b0c8b49c1/html5/thumbnails/5.jpg)
Mobile devices are necessary in health care
PHI will migrate to mobile devices Mobile technology will evolve Devices will be stolen or lost
5
![Page 6: Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2](https://reader034.vdocuments.site/reader034/viewer/2022051819/5519d67e5503468b0c8b49c1/html5/thumbnails/6.jpg)
Types of connections:CellularWIFIBluetoothRadio (RFID)With more to come…
› TransferJet
6
![Page 7: Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2](https://reader034.vdocuments.site/reader034/viewer/2022051819/5519d67e5503468b0c8b49c1/html5/thumbnails/7.jpg)
The risks:› Device is hacked› User sends data to wrong destination
The solutions:› Trusted connections only› Secure connections
♦ SSL for web traffic♦ WPA2 for WIFI
› Data encryption7
![Page 8: Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2](https://reader034.vdocuments.site/reader034/viewer/2022051819/5519d67e5503468b0c8b49c1/html5/thumbnails/8.jpg)
The risks:› Device is lost or stolen
› Device is hacked
8
The solutions:› Encryption, encryption, encryption!› Minimum necessary› Remote wipe capability› Password policy
![Page 9: Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2](https://reader034.vdocuments.site/reader034/viewer/2022051819/5519d67e5503468b0c8b49c1/html5/thumbnails/9.jpg)
9
The risks:› Device is hacked› Device is rendered inoperable/unreliable
The solutions:› Trusted applications only› Minimum necessary› Security application (scans for malware)
![Page 10: Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2](https://reader034.vdocuments.site/reader034/viewer/2022051819/5519d67e5503468b0c8b49c1/html5/thumbnails/10.jpg)
10
The risks:› Device is unavailable› App compromises data
The solutions:› Secure connections, anti-malware, trusted
applications› Update the OS and apps
![Page 11: Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2](https://reader034.vdocuments.site/reader034/viewer/2022051819/5519d67e5503468b0c8b49c1/html5/thumbnails/11.jpg)
The risks:› Device is hacked› App compromises data
The solutions:› Secure connections, anti-malware, trusted
applications, update the OS and apps› Reset the OS (locally or remotely)
11
![Page 12: Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2](https://reader034.vdocuments.site/reader034/viewer/2022051819/5519d67e5503468b0c8b49c1/html5/thumbnails/12.jpg)
Minimum Necessary Data Secure Connection Password Policy Malware Protection Data Encryption Trusted Applications OS Management Remote Wipe
12
Can be managed with software
![Page 13: Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2](https://reader034.vdocuments.site/reader034/viewer/2022051819/5519d67e5503468b0c8b49c1/html5/thumbnails/13.jpg)
Identify the benefits of mobility Quantify the risks Weigh the risks and benefits Find a solution that mitigates the risks Write your operator’s manual
› Policies and procedures Keep track of things Keep your staff educated
13
![Page 14: Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2](https://reader034.vdocuments.site/reader034/viewer/2022051819/5519d67e5503468b0c8b49c1/html5/thumbnails/14.jpg)
HIPAA compliance is possible if you have a plan
Achieve the right balance of technology and security
14