7 Tools To Tighten Healthcare Data Security7 Tools To Tighten Healthcare Data Security
Most of the largest healthcare data security and privacy breaches have involved lost or stolen mobile computing devices. Consider these tools and tips for protecting patient data and managing breaches.
January 25, 2012
Good Technology's Good for Enterprise product allows healthcare organizations to protect patent health data and corporate information on mobile devices. The product separates patient and corporate data from employees' personal information and places the data in an encrypted, secure container on a wide range of iPhone, Android and Windows Mobile smartphones and tablets.
This feature--combined with password policy enforcement, preventing cut, copy, and paste from the secure container, and remote wiping--can work together to help reduce the risk of data loss to unsecured consumer applications. Recommended Reading Patient Data Losses Jump 32% How Secure Are Your Clinicians' Mobile Devices? 80% Of Doctors Use Mobile Devices At Work Healthcare CIOs Juggle More Mobile Challenges Docs Warm Up to EHRs, Patients Want Paper Stanford Hospital Breach Exposes 20,000 ER Records App Allows Radiology Diagnosis Via Tablet, Smartphone Why Can't Patients See Their EHR Data? Docs Have iPad Fever: Is There A Cure? 9 Mobile Health Apps Worth A Closer Look
About the Author(s)
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
The State of Supply Chain Threats
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment