SearchHealthIT TechTarget TechTarget
Sign-up now. Start my free, unlimited access.
Login Register
  • Techtarget Network
  • News
  • Features
  • Tips
  • More Content
    • Answers
    • Buyer's Guides
    • Definitions
    • Essential Guides
    • Opinions
    • Photo Stories
    • Podcasts
    • Quizzes
    • Tutorials
  • Photo Stories
  • SearchHealthIT
  • Topic IT infrastructure
    • EHR systems
    • Health care regulations
    • Health IT planning
    • Health IT conferences
    • Hospital IT applications
    • Health IT compliance
    • All Topics
  • SubTopic Mobile
    • Desktop/laptop
    • Servers
    • Security
    • Cloud architecture
    • Storage
    • Medical devices
    • Mobile
    • PACS
    • Networking
    • All Subtopics
  • Follow:
    • Download
  • Share this item with your network:
  • Download

BACKGROUND IMAGE: iSTOCK/GETTY IMAGES

Download This Issue

Health IT

Strategies to secure personal mobile devices on health care networks July 2012
In This Issue
  • TipTools and techniques to improve mobile device security in health care
  • TipSupporting mobile device usage in a health care setting
  • TipMeeting technical requirements for mobile health care deployments
  • Tools and techniques to improve mobile device security in health care

    Clinicians are clamoring to use their iPads, but they must be secured. This tip examines eight trends in mobile device security that help keep health care data safe and secure. Read More

  • Supporting mobile device usage in a health care setting

    Mobile device usage policies are essential in health care organizations, where employees are using their own tablets and smartphones in the course of their workflow.Read More

  • Meeting technical requirements for mobile health care deployments

    IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.Read More

Health IT Explore the hottest topics and trends in today’s complex (and competitive) health IT market. Readers get access to major news stories, industry research, on-location conference coverage and exclusive advice from CIOs on the leading-edge.

Latest TechTarget resources

  • Compliance
  • CIO
  • Cloud Computing
  • Mobile Computing
  • Security
  • Storage

SearchCompliance

  • GDPR compliance benefits emerge a year and a half later

    While some may see GDPR as a set of restrictions, it can improve business practices. Learn more about the GDPR compliance ...

  • Designing secure, compliant identity access and management

    Desperately seeking secure IAM? You're not alone, and it gets extra tricky when biometrics are involved. Learn to employ modes of...

  • IAM-driven biometrics in security requires adjustments

    IAM is foundational to cybersecurity, but the latest systems use biometrics and other personal data. Learn how to cope with the ...

SearchCIO

  • Shell, Halliburton, Unibap AB execs share real-world AI strategies

    Technology advances like quantum computing mean AI's best years are still to come, but that doesn't mean companies aren't already...

  • What's the difference between RPA and IPA?

    To prepare for robotic process automation combined with the more sophisticated intelligent process automation, CIOs first need to...

  • The technological evolution of IT industry leaders: 2000 - 2020

    As technology has shifted since 2000, so have IT leaders. This guide looks at how Oracle, Cisco, Dell and SAP have adapted to ...

SearchCloudComputing

  • Review these Azure Service Bus best practices

    When applications talk, you need to listen. Learn about Microsoft's cloud messaging service, its main features, best practices to...

  • Instill cloud change management best practices

    Automation is essential to change management in the cloud. Discover the best practices that ensure your IT team is in sync and ...

  • How much cloud does an IT disaster recovery plan need?

    It's not easy to get the right mix of traditional and cloud-based DR resources. Here's how to strike a balance between what's ...

SearchMobileComputing

  • Compare Intune alternatives to Intune for mobility management

    Intune stands out in the EMM market in part due to its incumbency as a PC management platform. IT must evaluate Intune compared ...

  • Deploy kiosk devices with the Managed Home Screen Android app

    The Managed Home Screen app allows Microsoft Intune admins to deploy multi-app kiosk devices. IT should learn the two best ...

  • New Outlook features appeal to users on the go

    At Ignite, Microsoft announced some improvements to its Office app and Outlook for iOS and Android. Learn about how it benefits ...

SearchSecurity

  • DOJ takes action against Dridex malware group, Evil Corp

    The U.S. Justice Department indicts two alleged members of the Russian threat group behind the Dridex banking Trojan, known as ...

  • Session cookie mishap exposed HackerOne private reports

    A security researcher used a mishandled session cookie to access private HackerOne bug reports with an account takeover attack ...

  • NSS Labs drops antitrust suit against AMTSO, Symantec and ESET

    NSS Labs dropped its antitrust suit against the Anti-Malware Testing Standards Organization, Symantec and ESET, ending a ...

SearchStorage

  • Samsung V-NAND SSDs designed for high capacity, speed, efficiency

    Samsung's V-NAND chip breaks through existing 3D NAND cell stacking limits with the industry's first 100+ layers in a move ...

  • Portworx ships backup, capacity management for containers

    Portworx's storage product tacks on PX-Backup and PX-Autopilot for Capacity Management modules for enterprises building stateful ...

  • Computational storage for IoT and other potential use cases

    IoT is the main application for computational storage. Another potential use case is inside scale-out server architecture, but ...

  • About Us
  • Meet The Editors
  • Contact Us
  • Privacy Policy
  • Advertisers
  • Business Partners
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Archive
  • Site Map
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

All Rights Reserved, Copyright 2009 - 2019, TechTarget

Close