ips.insight.com/healthcare Identifying mobile security challenges in healthcare

Similar documents
2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

mhealth SECURITY: STATS AND SOLUTIONS

Encrypting PHI for HIPAA Compliance on IBM i. All trademarks and registered trademarks are the property of their respective owners.

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Secure Access for Microsoft Office 365 & SaaS Applications

Securing Health Data in a BYOD World

Mobile Technology meets HIPAA Compliance. Tuesday, May 2, 2017 MT HIMSS Conference

CHANGING FACE OF MOBILITY RAISES THE STAKES FOR ENDPOINT DATA PROTECTION

Executive Insights. Protecting data, securing systems

The New Healthcare Economy is rising up

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Securing Today s Mobile Workforce

Healthcare in the Public Cloud DIY vs. Managed Services

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Mobile Technology meets HIPAA Compliance Tuesday, March 28, 2017

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Healthcare HIPAA and Cybersecurity Update

Small Business Is Big Business in Cybercrime A TrendLabs Primer

Learning from a breach

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International.

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Protecting Health Information

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

As Enterprise Mobility Usage Escalates, So Does Security Risk

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Altitude Software. Data Protection Heading 2018

Cybersecurity and Nonprofit

Integrated Access Management Solutions. Access Televentures

2015 VORMETRIC INSIDER THREAT REPORT

Background FAST FACTS

Mastering The Endpoint

Cybersecurity and Hospitals: A Board Perspective

Preventing Unauthorized Access & Attacks: Strategies for Securing Mobile Certificates

Machine Learning and Advanced Analytics to Address Today s Security Challenges

Cybersecurity. Securely enabling transformation and change

White Paper. Enabling Mobile Users and Staying Compliant. How Healthcare Organizations Manage Both

HOSTED SECURITY SERVICES

U.S. State of Cybercrime

Ransomware, Viruses, and Hackers in Health Care: Five Steps to Avoid Being the Next Victim. Michael Overly and Chanley Howell.

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

Best Practices in Securing a Multicloud World

WHY MOBILE SECURITY SHOULD BE IN YOUR TOP PRIORITIES

Choosing the right two-factor authentication solution for healthcare

Have breaches declined since the massive Heartland Payments leak in 2008? What proportion of breaches are the result of hacking?

a publication of the health care compliance association MARCH 2018

HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

DeMystifying Data Breaches and Information Security Compliance

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

Modeling Factors Associated with Healthcare Data Breaches. Session #155, March 3, 2018 Dr. Alex McLeod, Dr. Diane Dolezel, Texas State University

Business White Paper. Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data

align security instill confidence

Cybersecurity for Health Care Providers

CYBERSECURITY OF MEDICAL DEVICES AND UL 2900

Building a Threat Intelligence Program

The Problem with Privileged Users

Spotlight Report. Information Security. Presented by. Group Partner

Cloud Communications for Healthcare

Combating Cyber Risk in the Supply Chain

HIPAA Compliance & Privacy What You Need to Know Now

Entertaining & Effective Security Awareness Training

Office 365 Buyers Guide: Best Practices for Securing Office 365

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

Practical Guide to the FDA s Postmarket Cybersecurity Guidance

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Security Issues

Compliance in 5 Steps

THALES DATA THREAT REPORT

Challenges and. Opportunities. MSPs are Facing in Security

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

The Modern Workplace Watchdog. How Office 365 helps keep your data safe and your team productive.

SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)

I D C T E C H N O L O G Y S P O T L I G H T

HEALTH CARE AND CYBER SECURITY:

Sales Presentation Case 2018 Dell EMC

Neil Peters-Michaud, CHAMP Cascade Asset Management ITAM Awareness Month December 2016

Is Runtime Application Self Protection (RASP) too good to be true?

IP Risk Assessment & Loss Prevention By Priya Kanduri Happiest Minds, Security Services Practice

CYBER RESILIENCE & INCIDENT RESPONSE

Get Smart about Backup & Recovery

2018 THALES DATA THREAT REPORT

TRUSTED MOBILITY INDEX

Security-as-a-Service: The Future of Security Management

UPS system failure. Cyber crime (DDoS ) Accidential/human error. Water, heat or CRAC failure. W eather related. Generator failure

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

Tripwire State of Container Security Report

All Aboard the HIPAA Omnibus An Auditor s Perspective

Memorial Hermann Health System Eases Encryption with Zix

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

Mobility Advantage: Why Secure Your Mobile Devices?

TRUE SECURITY-AS-A-SERVICE

MITIGATE CYBER ATTACK RISK

Cyber Pulse: The State of Cybersecurity in Healthcare

Anatomy of a Healthcare Data Breach

Vulnerability Management Trends In APAC

Transcription:

ips.insight.com/healthcare Identifying mobile security challenges in healthcare

Mobile device adoption is soaring in healthcare environments. Healthcare is one of the fastest-growing industries in the world and one of the biggest targets for cybercriminals. Research notes that four in five clinicians are using smartphones daily, while nearly half are using tablets daily. Because mobility in healthcare spans a broad array of devices and applications from notebooks and tablets to Radio-Frequency Identification (RFID)-based medical instruments organizations must take a comprehensive view of mobile security. Experts believe an enterprise approach, both in healthcare facilities and in outpatient interactions, is an essential element in solving problems before they become intractable.

The cost of healthcare data breaches $3.5 $359 PLUS million per incident in 2015 up 15% from just two years earlier 1 average per-record cost to healthcare organizations nearly 150% greater than the cost for all industries 1 the potential for multimillion-dollar fines for compliance violations under the Health Insurance Portability and Accountability Act (HIPAA) and the Affordable Care Act 1

No. 1 source of medical records breach = loss or theft of mobile devices Forrester Research indicates that 78% of record breaches in healthcare are attributable to lost or stolen devices, compared to just 15% across all industries. 2

Device vulnerability As practitioners, medical staff and administrators increasingly adopt mobile devices, they often encounter new varieties of phishing, malware and social engineering. Mobile medical devices are an increasingly significant security problem. The U.S. Food and Drug Administration has issued a safety communication to address cybersecurity threats posed by medical devices and hospital networks, noting that a wide array of threats open up the devices as intrusion methods to infiltrate and steal Protected Health Information (PHI). 3

Cloud challenges Rising adoption of cloud computing in healthcare is closely linked to widespread mobility usage. As healthcare Forrester mobility Research grows, the indicates increasing that 78% number of record of access breaches points in healthcare makes healthcare are attributable providers to lost a more or stolen devices, compared to just 15% attractive target for hackers. across all industries. Cloud-based solutions are particularly useful for a mobile workforce that needs to access easy-touse applications and real-time information from anywhere, at any time, says Jeffrey Kaplan, founder and managing partner at THINKstrategies.

Wearable devices According to analyst firm Mordor Intelligence, worldwide revenues of wearable medical devices are expected to increase from $2.8 billion in 2014 to $8.3 billion in 2019. 4 These devices introduce new access points for hackers to capture protected health information. While data points about glucose levels or blood pressure do not pose a significant security risk, the complete medical history of an individual that can be uploaded to wearables over time is more valuable.

Reducing your risk While these and other steps are logical starting points for reducing mobile security risks, Mobile Device Management (MDM) is a must-have for health IT organizations. For many healthcare organizations, that capability now is being expanded into a comprehensive, enterprisewide solution referred to as enterprise mobility management.

Insight knows healthcare security. As the use of mobile devices, instruments and applications continues to surge in healthcare, data breaches and other security challenges are likely to pop up with more frequency. This creates potential for significant economic and operational impact. Healthcare security must balance vigilance and HIPAA compliance with the need to support devices in our mobile world. Insight understands the challenging dynamics healthcare providers face every day. With more than 5,000 top technology partners, and an experienced healthcare team, we can help you design and deploy a network that protects your data without sacrificing agility or speed. ips.insight.com/healthcare Learn how Insight can help you build flexible, secure healthcare solutions by visiting us at www.ips.insight.com/healthcare.

Resources 1 2 Ponemon Institute, Quantifying the cost of a data breach, May 2014. http://www-935.ibm.com/services/us/en/it-services/securityservices/cost-of-data-breach/ Forrester Research, What You Should Do Today to Protect Endpoint Devices in Healthcare, Chris Sherman, February 3, 2015:. http://www. healthdatamanagement.com/web_seminars/what-you-should-do-todayto-protect-endpoint-devices-in-healthcare-49472-1.html. 3 U.S. Food and Drug Administration, Cybersecurity for Medical Devices and Hospital Networks: FDA Safety Communication, June 13, 2013. http://www. fda.gov/medicaldevices/safety/alertsandnotices/ucm356423.htm 4 EMDT, Security Concerns Mount as Wearables Enter Healthcare, Thomas Klein, January 21, 2015.