By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Health Works CollectiveHealth Works CollectiveHealth Works Collective
  • Health
    • Mental Health
  • Policy and Law
    • Global Healthcare
    • Medical Ethics
  • Medical Innovations
  • News
  • Wellness
  • Tech
Search
© 2023 HealthWorks Collective. All Rights Reserved.
Reading: Securing Smartphones: Simple Steps to Avoid a Data Breach
Share
Notification Show More
Font ResizerAa
Health Works CollectiveHealth Works Collective
Font ResizerAa
Search
Follow US
  • About
  • Contact
  • Privacy
© 2023 HealthWorks Collective. All Rights Reserved.
Health Works Collective > eHealth > Mobile Health > Securing Smartphones: Simple Steps to Avoid a Data Breach
eHealthMobile Health

Securing Smartphones: Simple Steps to Avoid a Data Breach

onlinetech
onlinetech
Share
4 Min Read
Find My iPhone
SHARE

BYOD (Bring Your Own Device) may allow for flexibility, ease of use and mobility when it comes to employee productivity, but there are still serious security and compliance concerns to be taken into account. CIO-Today.com reports on the simplest but often-overlooked security measures that can be taken to prevent a data breach.

BYOD (Bring Your Own Device) may allow for flexibility, ease of use and mobility when it comes to employee productivity, but there are still serious security and compliance concerns to be taken into account. CIO-Today.com reports on the simplest but often-overlooked security measures that can be taken to prevent a data breach.

While different industry compliance standards, such as HIPAA or PCI, may require more stringent data security technology, the average mobile device user can take their first steps toward a more protected environment by first enabling remote wipe on their devices.

CIO-Today.com reports that only 55 percent of mobile users have remote wipe enabled on their smartphones. Remote wipe is offered by default or as an application on many different types of mobile devices that you can install and configure to meet your needs. In the case of a lost or stolen device, remote wipe allows you to log into an interface, click on a button and have the option to permanently delete all data and settings currently on your device.

More Read

Physician Websites – What Works, What Doesn’t
Top Paid Medical Apps for iPhone
RSNA 2013: Mobile Connect—Image Viewers and Patient Access for Radiology
NeuCare: Concierge Medicine
How to Take Advantage of the Medical Industry’s Underinvestment in Local Search

This is key to remediation in the event of a data breach – limiting the scope of risk should be part of an incident response plan’s processes. By having the capability to remotely delete data off of a lost or stolen device, you can significantly reduce the chances of data misuse.

Find My iPhone

Find My iPhone

Additionally, if you are using an iPhone, you can enable Find my iPhone; an app that will attempt to locate your lost or stolen iPhone and pinpoint the location on a map. You can choose to send a message or activate a sound to help locate or draw attention to your device.

Mobile Defense App

Mobile Defense App

For Android phones, third-party apps can be used for remote wipe, such as the free Mobile Defense app. This app can also locate your device with the exact address displayed on an embedded interactive map. Mobile Defense will also email you if someone tries to swap out your SIM card as part of their security measures.

While remote wipe and device locators can be ideal after a device is lost or stolen, another way to prevent a potential data breach is to secure the data in a protected network/environment, not only on a device. In a blog post I wrote in May, Keep ePHI on Secure Networks, Not Mobile Devices, Recommends OCR, two-thirds of large healthcare breach cases involved loss or theft, and one-third involved electronics. Sixty-three thousand individuals were affected by the theft of stolen mobile devices.

Instead of losing the sole copy of your data when you lose your phone or laptop, consider keeping critical data and applications safe in a protected data center with all of the proper physical, network and administrative security in place. That way, you can recover and access important data and it isn’t dependent on access to one device. Read more about secure data centers.

 

Recommended Reading:
Bring Your Own Device (BYOD) with Virtualization
Simple Security Improvements with Your Mobile Device
BYOD: Mobile Healthcare Policies

References:
BYOD Trend Opens Companies to Security Breaches
Mobile Defense App
Find My iPhone App

TAGGED:BYOD
Share This Article
Facebook Copy Link Print
Share

Stay Connected

1.5kFollowersLike
4.5kFollowersFollow
2.8kFollowersPin
136kSubscribersSubscribe

Latest News

Slips and falls can happen in the blink of an eye, often in spaces we believe to be safe. A brief moment of misstep
When a Simple Fall Becomes a Serious Health Concern
Health
November 1, 2025
How Setting Boundaries Helps Trauma Survivors Heal
Health
October 30, 2025
how to improve REM sleep
Unlock Better Sleep: How to Improve REM Sleep Naturally
Wellness
October 30, 2025
uv protection in winter
Winter Sun Safety: Why UV Protection Matters Year-Round
Health
October 29, 2025

You Might also Like

Just-in-Time Health Information

November 21, 2012
Image
Social Media

Does Pharma Get Social Media?

September 24, 2013
Mobile Health

The Verizon Foundation Gives a Gift of Technology, Tech Support, and Money to Non-Profit Health Care Organizations

December 5, 2012
Image
eHealthTechnology

Integrative Medicine Part III – Humanism In Medical Care

May 21, 2012
Subscribe
Subscribe to our newsletter to get our newest articles instantly!
Follow US
© 2008-2025 HealthWorks Collective. All Rights Reserved.
  • About
  • Contact
  • Privacy
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?