By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: 13 Tips for Fighting Mobile Device Threats in Healthcare
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Mobile Health > 13 Tips for Fighting Mobile Device Threats in Healthcare
eHealthMobile Health

13 Tips for Fighting Mobile Device Threats in Healthcare

thielst
thielst
Share
2 Min Read
SHARE

I’ve been on a bit of a roll lately with data security and lately it is focused on mobile devices.  Here is another article, this one with 13 tips for fighting mobile device threats in healthcare organizations.

I’ve been on a bit of a roll lately with data security and lately it is focused on mobile devices.  Here is another article, this one with 13 tips for fighting mobile device threats in healthcare organizations.

My offering is first and I really like it, because it isn’t so techie!  It takes me back to my risk management roots and pre-tech days! Additionally, I think it is much better than using glue to plug up the port.  What if you ever want to use that port for legit reasons?

1. Consider USB locks.

More Read

Why Telemedicine’s Slow Climb to Adoption Isn’t Quite Over Yet
VA Will Use Telemedicine to Train Primary Care Docs
How Does Your Medical Device (Digital) Marketing Support Your Sales Force?
6 Questions: Reality Check for Healthcare Ads & Slogans
Embracing Technology and Providing Care: The Role of Email and Texting in the Patient Encounter

2. Try geolocation tracking software or services

3. Brick the device if it becomes lost or stolen.

4. Encrypt, encrypt, encrypt.

5. Forget about ‘sleep mode.’ 

6. Recognize that employees will use personal devices.

7. Use strong safeguards to permit access to PHI through mobile devices.

8. Educate employees on the importance of safeguarding their mobile.

9. Implement electronic protected health information (EPHI) security.

10. Work to get ahead of the “BYOD upgrade curve.”

11. Have a proactive data management strategy.

12. Keep in mind transparency and end-user consent opt-in.

13. Remember that the mobile Web and “app” landscape is not your father’s Internet. 

TAGGED:security
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

What Are the Steps to Obtain Health Equity Accreditation?
What Are the Steps to Obtain Health Equity Accreditation?
Health
December 18, 2025
a cosmetologist doing beauty treatment to a woman
Compliance Regulations for Aesthetic Clinics in the EU
Health Women Health
December 18, 2025
sunlit portrait with delicate lace shadows
Dr. Michael Piepkorn: Understanding The Genetic Links Behind Familial Skin Cancer
Skin
December 17, 2025
post-surgical recovery
Your Guide To Key Milestones In At Home Post-Surgical Recovery
Health Infographics
December 14, 2025

You Might also Like

Physicians Should Be Part of Online HealthCare Discussions

March 26, 2012
eHealthHealth careMedical RecordsMobile HealthTechnology

How Can Big Data Leverage Healthcare Industry

January 2, 2018

Writing Safety Critical Software

June 17, 2013
patient engagement
eHealthMobile HealthTechnologyWellness

Patient Engagement in Healthcare: Stewards of the Brand Promise

February 8, 2014
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?