By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: mHealth: Mitigating Mobile Security Risks
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Mobile Health > mHealth: Mitigating Mobile Security Risks
eHealthMobile Health

mHealth: Mitigating Mobile Security Risks

onlinetech
onlinetech
Share
5 Min Read
US Dept. Homeland Security Bulletin
SHARE

With the use of mobile devices in the healthcare industry come several risks and points of entry, according to the U.S. Department of Homeland Security. These points are listed below, as reported in the National Cybersecurity and Communications Integration Center’s bulletin, Attack Surface: Healthcare and Public Health Sector:

With the use of mobile devices in the healthcare industry come several risks and points of entry, according to the U.S. Department of Homeland Security. These points are listed below, as reported in the National Cybersecurity and Communications Integration Center’s bulletin, Attack Surface: Healthcare and Public Health Sector:

US Dept. Homeland Security Bulletin

US Dept. Homeland Security Bulletin

Insider: This can include employees and the ability to transfer information by using portable media devices or the cloud. The most common method of data exfiltration involves network transfer by email, remote access channel or file transfer.
Malware: Malware created to steal information includes keystroke loggers, remote access trojans and more.
Spearphishing: This is an email-based attack in which malicious attachments or links are sent to management, administrators and other key personnel, bypassing email filters and antivirus software in order to penetrate a network.
Web: Silent redirection, obsfucated JavaScript and even search engine optimization (SEO) are a few web behaviors used to gain access to a network. Web servers with injection flaws or broken authentication may also lead to a data breach.
Equipment Loss: As more and more sensitive data is stored on devices such as laptops, desktops, backup tapes, smartphones, flash drives and others, the theft or loss of ePHI (electronic protected health information) increases due to poor physical security mechanisms and hardware encryption.

It’s important to take note of the several points of entry in order to start the risk analysis/assessment any healthcare organization and business associate should undergo in efforts to mitigate data breach risks, especially if they use mobile devices to transfer, store or collect ePHI.

More Read

online healthcare discussions are dominated by patients and caregivers
Online Healthcare Discussions 98% Patient or Caregiver Driven
Glass Half-Empty? Not for MS Blogger Matt Cavallo [Podcast]
Behind the Curtain of Healthcare’s New CommonWell Alliance
Electronic Medical Records: Should the SEC Track the Brokerage Accounts of Hospital Clerks?
HIPAA and Protecting Patient Information

The bulletin also includes advice on taking a ‘layered security approach’ with these example best practices (for detailed tips and more on IT security and HIPAA compliant hosting, read our white paper, HIPAA Compliant Data Centers):

  • Operating well maintained external facing firewalls, network monitoring techniques, intrusion detection techniques, and internal network segmentation, containing the medical devices, to the extent practical.
  • Establishing strict policies for the connection of any networked devices, particularly wireless devices, to Health Information Network (HIN) including; laptops, tablets, USB devices, PDAs, smartphones, etc. such that no access to networked resources is provided to unsecured and/or unrecognized devices.
  • Establishing policies to maintain, review, and audit network configurations as routine activities when the Medical IT network is changed.
  • Implementing safe and effective, but legal patch and software upgrade policies for Medical IT networks which contain regulated medical devices.
  • Securing communications channels, particularly wireless ones, by the use of encryption and authentication at both ends of a communication channel.
mHealth Patient Care

mHealth Patient Care

Although the risk of using mobile in healthcare may be considerable, the benefits are high – 40 percent of consumers reported they would pay for mobile remote monitoring, according to a presentation on mobile growth in Michigan given by Linda Daichendt of the Mobile Technology Association of Michigan at Online Tech’s Spring into ITseminar event. Likewise, 40 percent of physicians said they could eliminate up to 30 percent of office visits by using mobile health strategies.

Mobile App Economic Trends

Mobile App Economic Trends

When it comes to mobile apps, research firm Gartner estimates that total app revenue will increase to 30 billion by 2013 – with over 21 billion downloads and an 87 percent increase in free or ad-funded apps.

With no signs of slowing down, the mobile industry is pushing ahead with the need for regulatory bodies and IT security experts to keep up.

Recommended Reading:
HIPAA Compliant Data Centers [White Paper]
What’s in a HIPAA Risk Analysis?
Data Center Standards Cheat Sheet – From HIPAA to SOC 2
Tips for Passing a HIPAA Audit

References:
Attack Surface: Healthcare and Public Health Sector (PDF)
The Mobile Explosion: What Does it Mean for You, Your Business, and Michigan’s Economy (PDF)

TAGGED:security
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

file a police report after a car accident
Can Filing a Police Report Help with Medical Bills?
Policy & Law
November 2, 2025
Slips and falls can happen in the blink of an eye, often in spaces we believe to be safe. A brief moment of misstep
When a Simple Fall Becomes a Serious Health Concern
Health
November 1, 2025
How Setting Boundaries Helps Trauma Survivors Heal
Health
October 30, 2025
how to improve REM sleep
Unlock Better Sleep: How to Improve REM Sleep Naturally
Wellness
October 30, 2025

You Might also Like

Medical RecordsNewsSocial MediaTechnology

Dealing With A Health Crisis? Avoid Medical Identity Theft With These Tips

July 25, 2019

Back to School: An Ongoing Need for Patients

March 24, 2013
Image
Global HealthcareMobile Health

Mobile Health Around the Globe: 10 Best Tools to Boost mHealth Initiatives in Africa: Part II

September 10, 2012

Would a Birth Control Counseling App Help Teens?

August 10, 2011
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?