Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.

Slides:



Advertisements
Similar presentations
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
Advertisements

Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Financial Services Workshop Margaret Umphrey ECU Information Security Officer March 12, IT Security, East Carolina University.
Mobile Device Security and Control NSAA IT Conference and Workshop Fourth Session: 2:45pm – 4:00pm _____________________________________.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Security for Mobile Devices
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
BYOD in practice KPMG case study 13 March © 2013KPMG Romania, a Romanian limited liability company and a member firm of the KPMG network of independent.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
HELP US HELP YOU: MAKING YOUR MOBILE DEVICE WORK FOR YOU IT Pro Name Company Name Date Note: Consider having one of your execs present this with you to.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Free HIPAA Training BCI Computers Free HIPAA Training (c) 2014 BCI Computers all rights reserved.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
SANS Technology Institute - Candidate for Master of Science Degree Design Phase 1 of an iPhone Rollout Mark Baggett, Jim Horwath June 2010.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
Top of Content Box Line Subtitle Line Title Line Right Margin Line Wearables: Panacea or Pandora’s Box – A Security Perspective Gary Davis | Chief Consumer.
Steps to Compliance: Bring Your Own Device PRESENTED BY.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
Smartphone Security How safe are you?. Main Points 1. Malware/Spyware 2. Other Mischief 3. How a phone might get infected 4. Staying Safe a. Malware b.
Information Security Awareness:
CS691 Robin Kimzey Cell Phone Security a little computer in your pocket an easy target for malcontents.
Part of the BRE Trust Protecting People, Property and the Planet Smart Buildings and Security: Developing a unified approach Will Lloyd BRE Global Limited,
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
A+ Certification Guide Chapter 10 Mobile Devices.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
INFORMATION TECHNOLOGY Personal Electronic Devices Information Technology College of Public and Community Service University of Massachusetts at Boston.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
How Safe Is Your Mobile Information? Issues and Safeguards for Mobile Devices Dan Morrissey, CHSP Catholic Health Initiatives Fourteenth National HIPAA.
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
By Kovtunenko Inna. Payment risks Protection measures Safety rules.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Network Security for End Users in Health Care Name of Presenter Title of Presenter.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Equipping Your Mobile Workforce for a Seamless Customer Experience in an Unsecured Wireless World Dr. Simon Blake-Wilson Chief Security Advisor.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Mobile Devices in the Corporate World
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Mobile Operating Systems
East Carolina University
Michael Etse and Maverick Fermill
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Configuring Windows Firewall with Advanced Security
Tim Carter Sales Director Sybase Confidential Propriety.
Tim Carter Sales Director Sybase Confidential Propriety.
MICROSOFT AZURE ISV PROFILE: ONEBE
Implementing Client Security on Windows 2000 and Windows XP Level 150
Security in mobile technologies
Introduction to the PACS Security
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2

3

Mobile device: Electronic computing or storage device Smart phone USB drive Tablet CD, DVD PHI: Protected Health Information 4

Mobile devices are necessary in health care PHI will migrate to mobile devices Mobile technology will evolve Devices will be stolen or lost 5

Types of connections: Cellular WIFI Bluetooth Radio (RFID) With more to come… TransferJet 6

The risks: Device is hacked User sends data to wrong destination The solutions: Trusted connections only Secure connections SSL for web traffic WPA2 for WIFI Data encryption 7

The risks: Device is lost or stolen Device is hacked 8 The solutions: Encryption, encryption, encryption! Minimum necessary Remote wipe capability Password policy

9 The risks: Device is hacked Device is rendered inoperable/unreliable The solutions: Trusted applications only Minimum necessary Security application (scans for malware)

10 The risks: Device is unavailable App compromises data The solutions: Secure connections, anti-malware, trusted applications Update the OS and apps

The risks: Device is hacked App compromises data The solutions: Secure connections, anti-malware, trusted applications, update the OS and apps Reset the OS (locally or remotely) 11

Minimum Necessary Data Secure Connection Password Policy Malware Protection Data Encryption Trusted Applications OS Management Remote Wipe 12 Can be managed with software

Identify the benefits of mobility Quantify the risks Weigh the risks and benefits Find a solution that mitigates the risks Write your operators manual Policies and procedures Keep track of things Keep your staff educated 13

HIPAA compliance is possible if you have a plan Achieve the right balance of technology and security 14

QUESTIONS? Lauri Scharf