//
archives

Tablets

This tag is associated with 5 posts

6 Tips for Healthcare IT Security

6 Necessary Tips for Maintaining Clear and Steady Healthcare IT Security Adroit – Create a flexible IT infrastructure for compliance processes including verification, loss, and relationships Consistent – Apply the same standards for compliance across all systems Effective – Maximize integration using technology pushing for single solution reporting, monitoring, and auditin Transparent – Create clear … Continue reading

16 Tips for Assigning Priorities to Risks while Justifying Investment in IT Security

16 Tips to Successful Risk Abatement Collect Data Define Risks Consolidate Risks Prioritize Risks Define Impact of Change Define Monetary Cost if the Risk is Realized both Direct and Indirect Define the Additional Risk Over Time if each Risk is not Addressed Develop a Strategic Plan of Risk Abatement Define Benefits to Mitigating Risks Investigate … Continue reading

Can EHR Workflow Issues and Security Issues Be Fixed?

I’ve listened over the years to many health care providers, small and large. The EHR roll out has been a nightmare in my opinion and is a direct result of pressure from DC that had too little experience about real world business needs of the medical profession.  But the effort as usual had the best … Continue reading

The Consumerization of BYOD will result in the Consumerization of The Cloud

Last Article in the new Issue of Pentest Auditing and Standards

Smart-phones and tablet devices are making users much more productive. The reasons for this may not be clear at first glance. Certainly we are more connected as a result. The additional “connection time” to the internet itself may be a large part of our increased effectiveness in finding solutions for tasks we are given. It is also quite possible that the targeted niche applications available on smart devices are responsible for delivering a very targeted solution to very targeted needs. And then of course, there is the direct benefit of those of us who have learned to use social media for near instant feedback on otherwise difficult business decisions. Social media business associates are typically a variety of trusted perspectives of others with similar backgrounds but perhaps different experiences. The near instant feedback from this source of trusted set of “friends” can be one of tremendous value. Many perspectives can offer many solutions to difficult issues. BYOD devices have encouraged this collective decision process by the additional usage of personal devices as part of a generalized pattern of work flow efficiency.

Balancing the increases in productivity against the risks to security posed by personal digital devices has been one of the biggest challenges to today’s solution providers.

The challenges to securely manage these devices as the first step to providing access has created a relatively new security platform known as MDM (Mobile Device Management). Mobile Device Management (MDM) solutions, while focusing on the device management process itself, do not typically address the need to properly provision and control data access for the requesting device, requiring instead an additional solution for network access controls. IT Security Managers need real solutions to manage the possible future threats that BYOD mobile devices may present.

A well thought out BYOD Blueprint will result in no additional threats of BYOD in the enterprise.  For ideas on how to accomplish this you can refer to an article on The Consumerization of IT – Embracing BYOD and Beyond. 

These devices are fueling another phenomenon. Since storage is fixed in these smartphones and tablets, external storage is critical to their success in processing and using vast amounts of data in the task of becoming more efficient users.  Services such as iCloud, Box.com, DropBox, iDrive, SkyDrive and others are taking up this challenge and introducing the vast amounts of data storage that is normally only associated with notebook computers in portable digital devices.  While still being used primarily by early adopters of digital these public cloud sites can expect massive growth in the consumer sector for these Cloud Service Providers are creating virtual massive storage devices for BYOD users.

Continue reading

Why Businesses Must Embrace BYOD and Social Media.

Of late there is much talk of the insecurity that BYOD brings to the enterprise trying to incorporate BYOD into the enterprise environment.  What there is less talk about is the ability for BYOD to greatly enhance employee productivity and the great benefit enhanced productivity and increased employee morale can have on creativity and efficiency.  … Continue reading

Enter your email address to follow this blog and receive notifications of new posts by email.