By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
    Health
    Healthcare organizations are operating on slimmer profit margins than ever. One report in August showed that they are even lower than the beginning of the…
    Show More
    Top News
    improving patient experience
    6 Ways to Improve Patient Satisfaction Within Hospitals
    December 1, 2021
    degree for healthcare job
    What Are The Health Benefits Of Having A Degree?
    March 9, 2022
    custom software development is changing healthcare
    Digital Customer Journey Mapping and its Importance for Healthcare
    July 21, 2022
    Latest News
    The Wide-Ranging Benefits of Magnesium Supplements
    June 11, 2025
    The Best Home Remedies for Migraines
    June 5, 2025
    The Hidden Impact Of Stress On Your Body’s Alignment And Balance
    May 22, 2025
    Chewing Matters More Than You Think: Why Proper Chewing Supports Better Health
    May 22, 2025
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
    Policy and Law
    Get the latest updates about Insurance policies and Laws in the Healthcare industry for different geographical locations.
    Show More
    Top News
    COPD Patients Can Improve Condition with Physical Activity
    July 15, 2011
    More on Caregiving Costs and Toll
    August 23, 2011
    Patient-Centered Approach to Cancer Diagnosis and Treatment Planning (podcast)
    September 22, 2011
    Latest News
    Streamlining Healthcare Operations: How Our Consultants Drive Efficiency and Overall Improvement
    June 11, 2025
    Building Smarter Care Teams: Aligning Roles, Structure, and Clinical Expertise
    May 18, 2025
    The Critical Role of Healthcare in Personal Injury Recovery: A Comprehensive Guide for Victims
    May 14, 2025
    The Backbone of Successful Trials: Clinical Data Management
    April 28, 2025
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Securing Smartphones: Simple Steps to Avoid a Data Breach
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Mobile Health > Securing Smartphones: Simple Steps to Avoid a Data Breach
eHealthMobile Health

Securing Smartphones: Simple Steps to Avoid a Data Breach

onlinetech
Last updated: September 5, 2012 12:31 pm
onlinetech
Share
4 Min Read
Find My iPhone
SHARE

BYOD (Bring Your Own Device) may allow for flexibility, ease of use and mobility when it comes to employee productivity, but there are still serious security and compliance concerns to be taken into account. CIO-Today.com reports on the simplest but often-overlooked security measures that can be taken to prevent a data breach.

BYOD (Bring Your Own Device) may allow for flexibility, ease of use and mobility when it comes to employee productivity, but there are still serious security and compliance concerns to be taken into account. CIO-Today.com reports on the simplest but often-overlooked security measures that can be taken to prevent a data breach.

While different industry compliance standards, such as HIPAA or PCI, may require more stringent data security technology, the average mobile device user can take their first steps toward a more protected environment by first enabling remote wipe on their devices.

CIO-Today.com reports that only 55 percent of mobile users have remote wipe enabled on their smartphones. Remote wipe is offered by default or as an application on many different types of mobile devices that you can install and configure to meet your needs. In the case of a lost or stolen device, remote wipe allows you to log into an interface, click on a button and have the option to permanently delete all data and settings currently on your device.

More Read

proxy data access best practices
Best Practices for Proxy Data Access
mHealthSummit 2012 – Coming Up Next Week!
New Telestroke Initiative Discussion Group Added
High Quality, Low Cost HealthCare Video Interview Series: Dr Oliver Kharraz From ZocDoc Talks Appointments
A Garden of HealthCare Phone Apps – Watch it Grow

This is key to remediation in the event of a data breach – limiting the scope of risk should be part of an incident response plan’s processes. By having the capability to remotely delete data off of a lost or stolen device, you can significantly reduce the chances of data misuse.

Find My iPhone

Find My iPhone

Additionally, if you are using an iPhone, you can enable Find my iPhone; an app that will attempt to locate your lost or stolen iPhone and pinpoint the location on a map. You can choose to send a message or activate a sound to help locate or draw attention to your device.

Mobile Defense App

Mobile Defense App

For Android phones, third-party apps can be used for remote wipe, such as the free Mobile Defense app. This app can also locate your device with the exact address displayed on an embedded interactive map. Mobile Defense will also email you if someone tries to swap out your SIM card as part of their security measures.

While remote wipe and device locators can be ideal after a device is lost or stolen, another way to prevent a potential data breach is to secure the data in a protected network/environment, not only on a device. In a blog post I wrote in May, Keep ePHI on Secure Networks, Not Mobile Devices, Recommends OCR, two-thirds of large healthcare breach cases involved loss or theft, and one-third involved electronics. Sixty-three thousand individuals were affected by the theft of stolen mobile devices.

Instead of losing the sole copy of your data when you lose your phone or laptop, consider keeping critical data and applications safe in a protected data center with all of the proper physical, network and administrative security in place. That way, you can recover and access important data and it isn’t dependent on access to one device. Read more about secure data centers.

 

Recommended Reading:
Bring Your Own Device (BYOD) with Virtualization
Simple Security Improvements with Your Mobile Device
BYOD: Mobile Healthcare Policies

References:
BYOD Trend Opens Companies to Security Breaches
Mobile Defense App
Find My iPhone App

TAGGED:BYOD
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

Streamlining Healthcare Operations: How Our Consultants Drive Efficiency and Overall Improvement
Global Healthcare Policy & Law
June 11, 2025
magnesium supplements
The Wide-Ranging Benefits of Magnesium Supplements
Health
June 11, 2025
Preparing for the Next Pandemic: How Technology is Changing the Game
Technology
June 6, 2025
migraine home remedies and-devices
The Best Home Remedies for Migraines
Health Mental Health
June 5, 2025

You Might also Like

Beyond the Buzz: Scheduling Healthcare Tweets

February 15, 2014
pfizer and clinical data transparency
BusinessMedical RecordsPolicy & Law

Pfizer to Expand Clinical Trial Data Access, Takes Step Toward Transparency

December 6, 2013

New Concussion Sensors, Apps Help Without Solving Key Diagnostic Issues

October 7, 2013

Interoperability of Electronic Health Data: Is It Time to Herd Unicorns in a New Direction?

September 12, 2014
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?