Without a shadow of doubt, the concept of Bring Your Own Device (BYOD) offers plenty of benefits to both healthcare employees and employers.
To name a few, users are familiar and more comfortable with their own devices which can increase output. There is also no time spent on training because the devices are owned by the employees, and as a result the hospitals are saved from incurring additional expenditure.
However, despite the foregoing benefits, security issues continue to haunt the BYOD concept, which keeps hospitals from implementing it. Personally owned devices can raise a number of concerns with regards to HIPAA related security protocols. Here’s the thing: No matter who owns the device, in case of a data breach, the hospital is going to be held responsible.
Such devices are least likely to have enterprise-level security controls such as encryption, and are also vulnerable to viruses from personal apps, social media forums, email, web browser, etc. These devices also lack complete monitoring, which makes it difficult for an IT department to manage them completely.
So what can you do to make the most of this concept while avoiding a data breach?
According to a new research by CDW, here’s what you should do to reap the benefits of BYOD safely.
Use mobile device management (MDM) solution
An MDM solution enables the IT department of your hospital to:
- Better control the devices attached to hospital networks from a centralized location, irrespective of the type of the device’s operating system or ownership status.
- Cut down support costs, protect data and meet HIPAA compliance with advanced capabilities to secure devices, enforce passcodes, provide encryption, and remotely lock and wipe devices that are lost or stolen.
- Better monitor and control applications that are installed on the devices, access the content that is stored on the devices and control what information is shared in and out of them.
- Better monitor devices, including asset tracking, reporting and geo-location.
Use high-level security
MDM is only one element of a multi-layered approach for ensuring a secure and better managed BYOD strategy. Some of the other elements include:
- Geo-fencing and contextual MDM provide an innovative way to secure and lock down devices based on location. For example, the camera or access to some apps can be restricted as soon as the employee enters the hospital premises.
- It is crucial for hospitals to upgrade their IT networks with solutions which not only prevent threats but also data loss.
- Virtualization technologies support data-focused security strategies by preventing sensitive data from being stored on devices. Virtualization can also be used to separate personal and business data on a single device, making BYOD a more viable option for hospitals.
- Another way is to have these devices connect to HIPAA servers through VPN in order to better protect patient data.
Periodically assess infrastructure capabilities and costs
A robust network is the one which incorporates both wireless and cellular components, and can optimize performance and control costs. Hospitals should look to:
- Use telecom expense management (TEM) solutions to track carrier costs and data usage.
- Control data usage costs by opting for unlimited plans with wireless carriers whenever possible, as well as encouraging Wi-Fi use when available.
- Carefully evaluate and select wireless carriers to ensure reliability and security for mobile devices.
- Take advantage of carrier plan discounts.
- Anticipate annual increases in mobile user demand and upgrade wireless networks as needed.
Hospitals which implement and enforce an enterprise-level mobile policy, will certainly avoid a lot of trouble. Additionally, hospitals should look to train staff on breach of security, and establish clear guidelines for downloading apps. A user agreement for BYOD will also help spell out responsibilities for users and the hospital.
Reader Interactions