By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: mHealth: Mitigating Mobile Security Risks
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Mobile Health > mHealth: Mitigating Mobile Security Risks
eHealthMobile Health

mHealth: Mitigating Mobile Security Risks

onlinetech
onlinetech
Share
5 Min Read
US Dept. Homeland Security Bulletin
SHARE

With the use of mobile devices in the healthcare industry come several risks and points of entry, according to the U.S. Department of Homeland Security. These points are listed below, as reported in the National Cybersecurity and Communications Integration Center’s bulletin, Attack Surface: Healthcare and Public Health Sector:

With the use of mobile devices in the healthcare industry come several risks and points of entry, according to the U.S. Department of Homeland Security. These points are listed below, as reported in the National Cybersecurity and Communications Integration Center’s bulletin, Attack Surface: Healthcare and Public Health Sector:

US Dept. Homeland Security Bulletin

US Dept. Homeland Security Bulletin

Insider: This can include employees and the ability to transfer information by using portable media devices or the cloud. The most common method of data exfiltration involves network transfer by email, remote access channel or file transfer.
Malware: Malware created to steal information includes keystroke loggers, remote access trojans and more.
Spearphishing: This is an email-based attack in which malicious attachments or links are sent to management, administrators and other key personnel, bypassing email filters and antivirus software in order to penetrate a network.
Web: Silent redirection, obsfucated JavaScript and even search engine optimization (SEO) are a few web behaviors used to gain access to a network. Web servers with injection flaws or broken authentication may also lead to a data breach.
Equipment Loss: As more and more sensitive data is stored on devices such as laptops, desktops, backup tapes, smartphones, flash drives and others, the theft or loss of ePHI (electronic protected health information) increases due to poor physical security mechanisms and hardware encryption.

It’s important to take note of the several points of entry in order to start the risk analysis/assessment any healthcare organization and business associate should undergo in efforts to mitigate data breach risks, especially if they use mobile devices to transfer, store or collect ePHI.

More Read

online medical practice
Grow Your Medical Practice Online: 6 Practical Steps
Articles about Disclosure in Online Communities
Get That Hospital Trending: How to Make an Impact on Social Media
The Importance of the Cloud and Data Security in Healthcare
Advances In Telehealth In 2020 You’ll Want To Know About

The bulletin also includes advice on taking a ‘layered security approach’ with these example best practices (for detailed tips and more on IT security and HIPAA compliant hosting, read our white paper, HIPAA Compliant Data Centers):

  • Operating well maintained external facing firewalls, network monitoring techniques, intrusion detection techniques, and internal network segmentation, containing the medical devices, to the extent practical.
  • Establishing strict policies for the connection of any networked devices, particularly wireless devices, to Health Information Network (HIN) including; laptops, tablets, USB devices, PDAs, smartphones, etc. such that no access to networked resources is provided to unsecured and/or unrecognized devices.
  • Establishing policies to maintain, review, and audit network configurations as routine activities when the Medical IT network is changed.
  • Implementing safe and effective, but legal patch and software upgrade policies for Medical IT networks which contain regulated medical devices.
  • Securing communications channels, particularly wireless ones, by the use of encryption and authentication at both ends of a communication channel.
mHealth Patient Care

mHealth Patient Care

Although the risk of using mobile in healthcare may be considerable, the benefits are high – 40 percent of consumers reported they would pay for mobile remote monitoring, according to a presentation on mobile growth in Michigan given by Linda Daichendt of the Mobile Technology Association of Michigan at Online Tech’s Spring into ITseminar event. Likewise, 40 percent of physicians said they could eliminate up to 30 percent of office visits by using mobile health strategies.

Mobile App Economic Trends

Mobile App Economic Trends

When it comes to mobile apps, research firm Gartner estimates that total app revenue will increase to 30 billion by 2013 – with over 21 billion downloads and an 87 percent increase in free or ad-funded apps.

With no signs of slowing down, the mobile industry is pushing ahead with the need for regulatory bodies and IT security experts to keep up.

Recommended Reading:
HIPAA Compliant Data Centers [White Paper]
What’s in a HIPAA Risk Analysis?
Data Center Standards Cheat Sheet – From HIPAA to SOC 2
Tips for Passing a HIPAA Audit

References:
Attack Surface: Healthcare and Public Health Sector (PDF)
The Mobile Explosion: What Does it Mean for You, Your Business, and Michigan’s Economy (PDF)

TAGGED:security
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5KFollowersLike
4.5KFollowersFollow
2.8KFollowersPin
136KSubscribersSubscribe

Latest News

woman in pink long sleeve shirt sitting on gray couch
Understanding Divorce Law and the Role of Attorneys in Family Disputes
Policy & Law
January 14, 2026
Redefining Romance: How Care and Presence Are Showing as Big Gestures
lifestyle
January 9, 2026
dental check up
What to Expect From Your First Visit to a Dentist
Dental health
January 9, 2026
foot and vein health
The Hidden Connection Between Foot and Vascular Health
Health
January 8, 2026

You Might also Like

eHealthGlobal Healthcare

How Technology Can Change Healthcare In Developing Countries

October 20, 2018

Balancing Technology and The Art of Medicine

October 9, 2012

From Yellow Pages to Google My Hospital

September 18, 2015
eHealth

Benefits of Getting Prescriptions Online

June 15, 2018
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Go to mobile version
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?