By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: mHealth: Mitigating Mobile Security Risks
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Mobile Health > mHealth: Mitigating Mobile Security Risks
eHealthMobile Health

mHealth: Mitigating Mobile Security Risks

onlinetech
onlinetech
Share
5 Min Read
US Dept. Homeland Security Bulletin
SHARE

With the use of mobile devices in the healthcare industry come several risks and points of entry, according to the U.S. Department of Homeland Security. These points are listed below, as reported in the National Cybersecurity and Communications Integration Center’s bulletin, Attack Surface: Healthcare and Public Health Sector:

With the use of mobile devices in the healthcare industry come several risks and points of entry, according to the U.S. Department of Homeland Security. These points are listed below, as reported in the National Cybersecurity and Communications Integration Center’s bulletin, Attack Surface: Healthcare and Public Health Sector:

US Dept. Homeland Security Bulletin

US Dept. Homeland Security Bulletin

Insider: This can include employees and the ability to transfer information by using portable media devices or the cloud. The most common method of data exfiltration involves network transfer by email, remote access channel or file transfer.
Malware: Malware created to steal information includes keystroke loggers, remote access trojans and more.
Spearphishing: This is an email-based attack in which malicious attachments or links are sent to management, administrators and other key personnel, bypassing email filters and antivirus software in order to penetrate a network.
Web: Silent redirection, obsfucated JavaScript and even search engine optimization (SEO) are a few web behaviors used to gain access to a network. Web servers with injection flaws or broken authentication may also lead to a data breach.
Equipment Loss: As more and more sensitive data is stored on devices such as laptops, desktops, backup tapes, smartphones, flash drives and others, the theft or loss of ePHI (electronic protected health information) increases due to poor physical security mechanisms and hardware encryption.

It’s important to take note of the several points of entry in order to start the risk analysis/assessment any healthcare organization and business associate should undergo in efforts to mitigate data breach risks, especially if they use mobile devices to transfer, store or collect ePHI.

More Read

Social Media, Research and Community Managers
Debunking Digital Patient Recruitment Myths for Clinical Trials: Myth #1
Interview with Liza Bernstein: ePatient, Breast Cancer Survivor, and Social Media Person
Insurance Shopping Tools Online: Open Enrollment Nears
mHealth: Valuable Information in PwC Report, But are the Findings Remarkable?

The bulletin also includes advice on taking a ‘layered security approach’ with these example best practices (for detailed tips and more on IT security and HIPAA compliant hosting, read our white paper, HIPAA Compliant Data Centers):

  • Operating well maintained external facing firewalls, network monitoring techniques, intrusion detection techniques, and internal network segmentation, containing the medical devices, to the extent practical.
  • Establishing strict policies for the connection of any networked devices, particularly wireless devices, to Health Information Network (HIN) including; laptops, tablets, USB devices, PDAs, smartphones, etc. such that no access to networked resources is provided to unsecured and/or unrecognized devices.
  • Establishing policies to maintain, review, and audit network configurations as routine activities when the Medical IT network is changed.
  • Implementing safe and effective, but legal patch and software upgrade policies for Medical IT networks which contain regulated medical devices.
  • Securing communications channels, particularly wireless ones, by the use of encryption and authentication at both ends of a communication channel.
mHealth Patient Care

mHealth Patient Care

Although the risk of using mobile in healthcare may be considerable, the benefits are high – 40 percent of consumers reported they would pay for mobile remote monitoring, according to a presentation on mobile growth in Michigan given by Linda Daichendt of the Mobile Technology Association of Michigan at Online Tech’s Spring into ITseminar event. Likewise, 40 percent of physicians said they could eliminate up to 30 percent of office visits by using mobile health strategies.

Mobile App Economic Trends

Mobile App Economic Trends

When it comes to mobile apps, research firm Gartner estimates that total app revenue will increase to 30 billion by 2013 – with over 21 billion downloads and an 87 percent increase in free or ad-funded apps.

With no signs of slowing down, the mobile industry is pushing ahead with the need for regulatory bodies and IT security experts to keep up.

Recommended Reading:
HIPAA Compliant Data Centers [White Paper]
What’s in a HIPAA Risk Analysis?
Data Center Standards Cheat Sheet – From HIPAA to SOC 2
Tips for Passing a HIPAA Audit

References:
Attack Surface: Healthcare and Public Health Sector (PDF)
The Mobile Explosion: What Does it Mean for You, Your Business, and Michigan’s Economy (PDF)

TAGGED:security
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

Traumatic Brain Injuries
Understanding Traumatic Brain Injuries: What Families Need to Know
Policy & Law
October 10, 2025
Remote Monitoring touchpoints
Remote Monitoring Touchpoints Patients Will Actually Follow
Technology
October 9, 2025
dental care
Importance of Good Dental Care for Health and Confidence
Dental health Specialties
October 2, 2025
AI in Healthcare
AI in Healthcare: Technology is Transforming the Global Landscape
Global Healthcare Policy & Law Technology
October 1, 2025

You Might also Like

Employee Makes Fun of Patient on Facebook

January 5, 2012
remote diagnostics
eHealthMobile HealthRemote Diagnostics

High Quality, Low Cost HealthCare Video Interview Series: Dr. Ivana Schnur Explains Sense.ly’s Remote Assesment Hub

May 7, 2013
Telehealth Project from my UW SON Clinical Informatics class. Circa 2011
BusinesseHealthFinanceHospital AdministrationTechnology

BIG-BIG-BIG: Company, Heart and Checkbook

March 12, 2015
BusinesseHealthMedical DevicesMedical InnovationsTechnology

Scanadu Rocks Indiegogo For $1.1M … And Counting

July 4, 2013
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?