Access your Pro+ Content below.
Healthcare information security at a crossroads with endpoints
This article is part of the Pulse issue of February 2016 | Volume 4 Issue 1
When I think of healthcare information security for endpoints in hospitals, my mind usually wanders to my own technological setup at home. I've got a work laptop, personal laptop, TV streaming stick, smartphone and DVD player all connected to my wireless network. Sometimes visitors hook their phones into the wireless router, too. Maybe this situation sounds familiar to some of you. It certainly wouldn't take much for, say, my kid to fool around with my streaming stick and download an HDTV app I didn't want him watching. That's an endpoint breach no parent wants to deal with. It's also a breach that could happen with me managing only five access points at home. Multiply that by tens of thousands of devices and you get an idea of the mountain that IT pros have to climb to ensure healthcare information security. Our cover story in the February issue of Pulse hits endpoint access head-on by looking at the risks coming down the road, mainly from the proliferation of mobile devices. Contributor Nicole Lewis talks to a pair of major ...
Access this PRO+ Content for Free!
Features in this issue
With digital healthcare images increasingly being stored and shared in provider data networks, medical imaging systems need more cybersecurity, according to experts.
As smartphones and tablets proliferate in hospitals -- increasing the risks of an endpoint security breach -- health IT executives must broaden and harden their defenses.
People from low income populations suffering from chronic diseases could benefit from the use of wearable healthcare technology. However, there are several barriers in the way, experts said.
As more healthcare providers send aspects of their business into the cloud, they must be aware that such a move doesn't free them from their HIPAA compliance duties.
Columns in this issue
With an ever-increasing array of mobile devices available, healthcare IT pros must ensure healthcare information security at endpoints.