Tag: byod

As the gap between desktop and mobile becomes smaller and smaller, businesses are encouraging the use of mobile apps and a BYOD environment. But with this power of creativity and productivity comes responsibility to security, and that’s something many CISOs are worried about. One of these threats to enterprise security is data jacking. It’s the misuse or theft of data on a mobile from its primary owner. Examples of data jacking include ransomware, mobile malware, and theft of mobile devices …

As we get more devices and connect them to the cloud, it’s only natural that the rise of user-centric computing should follow. What is that, and what effect does it have on the IT industry? Let’s start with defining user-centric computing. According to OneStopClick, “A user-centric computing system is a ubiquitous system consisting of information and devices that users can access anytime and anywhere.” Wikipedia says, “The chief difference from other product design philosophies is that user-centered design tries to optimize the …

With the era of easily shareable apps and cheap(er) devices in full swing, Shadow IT has emerged as a growing priority to manage for IT organizations. And it’s with good reason—when technology is being used behind your back, it’s tough to know if your business is as secure and compliant as it should be. What can you do to minimize the risk? Here are five ways to manage Shadow IT in your business Stay on top of what’s going on: …

5 tools to protect patient data

Posted on October 3, 2014 by

As HIPAA regulations increase and cybersecurity threats advance, the healthcare industry’s effort to protect patient data gets more complex. Online Tech recently contributed to a story posted on BlogHIPAA.com that covers five tools to help protect patient information and ease the compliance burden: Email encryption Mobile phone BYOD protection HIPAA-compliant storage HIPAA-compliant hosting Compliance tracking solution BlogHIPAA spoke with representatives from industry-leading organizations in each of these areas, each of them focused on compliance. They each provided insight into why …

More and more healthcare organizations are allowing employees to connect their own mobile devices to their network, but more than half are not confident those devices are secure. According to the Ponemon Institute’s fourth annual Benchmark Study on Patient Privacy and Data Security, Bring Your Own Device (BYOD) programs usage continues to rise despite concerns about employee negligence and the use of insecure mobile devices. According to the study: “…88 percent of organizations permit employees and medical staff to use …

BY TATIANA MELNIK Health IT Attorney As the clock struck midnight on New Year’s Eve, it was already clear that 2014 was shaping up to be an exciting year for all things healthcare IT. With enforcement actions squarely on the heels of the new year, the on-going healthcare-related data breach litigation (and a renewed focus on data breaches from federal legislators because of the Target incident), the upcoming ICD-10 conversion deadline, the continued move to BYOD, and the growth of …

Note: The following article is part of a shared content agreement between Online Tech and InfoSec Institute. (View original post.) For more BYOD information, check out a replay of a past Online Tech webinar co-hosted by Tatiana Melnik, an attorney concentrating her practice on IT, data privacy and security, and regulatory compliance, “To be BYOD or not to be BYOD: Is a Bring Your Own Device Policy Right for Your Organization?” We’ve also previously compiled some of the best articles, …

Here’s the best of mobile security from 2013, including articles, white papers, previously recorded webinars and more that explain mobile health IT (mHealth) data security and how to prevent compromised data in your organization. Online Tech is also headed to the 2013 mHealth Summit this December in Washington, D.C. to exhibit encrypted HIPAA hosting solutions for mobile software as a service (SaaS) and other health IT companies. Visit us at booth #1112 if you’re attending, and follow us @OnlineTech on …

A guest blog from HITECHAnswers.net lists security tips from HHS.gov to help ensure that patient data is secure in a BYOD (Bring Your Own Device) environment that includes the use of personal devices such as iPhones and iPads in the workplace. One of HealthIT.gov’s tips includes encrypting data stored locally on your mobile device as well as data sent by your device (data at rest and in transit). While device encryption can provide one layer of defense, if you go …

Join Attorney Tatiana Melnik and Senior Product Architect Steve Aiello as they discuss how to securely implement an effective BYOD (Bring Your Own Device) strategy in your workplace. Title: To be BYOD or not to be BYOD: Is a “Bring Your Own Device” Policy Right for Your Organization? Register: Sign up online Who: Attorney Tatiana Melnik and Online Tech’s Senior Product Architect Steve Aiello When: Nov 12, 2013; 2:00 PM – 3:00 PM (EST) Description: Mobile devices are becoming ubiquitous in all companies, including those …

Get started now. Exceptional service awaits.

Live Chat