With the rise of technology, there is an increased use of mobile devices, both personally and in the work place. While mobile technology is a great tool for practice management and increasing practice efficiency, there are security threats that you need to be on top of when using mobile devices. Health Information Technology has answered some of the frequently asked questions surrounding the use of mobile devices in the healthcare industry. Today, we are going to share with you some of the important security questions and answers that we think will most affect your practice.
Before we get started with the FAQs, there are some important terms we want to define so you can better understand the use of mobile technology with your EHR software.
Encryption: A method of converting an original message of regular text into encoded text.
Secure Wi-Fi Network: The use of passwords and secure encryption methods to send wireless data between a mobile device and an Internet connection point.
Remote Wipe: Remotely erasing data on a mobile device if it is lost or stolen.
Remote Disabling: Remotely locking data on a mobile device if it is lost or stolen. If the device is recovered, it may be unlocked and the data may be retrieved.
Virtual Private Network (VPN): VPNs are built on top of existing physical Internet networks to provide secure communication for information transmitted between private and public networks.
Firewall: A security tool that limits access between networks and/or systems.
Security Software: Software that protects against malicious programs like viruses, spam, and malware.
Virus: A self-replicating program that runs and spreads by modifying other programs of files.
Spam: Electronic junk mail.
Malware: A program inserted into a system in order to compromise the confidentiality, integrity, or availability of the data, applications, or operating system.
There are several safety measures you should be taking in order to protect the mobile devices used in your practice:
This depends on the nature of the device, but the most common aspects of vulnerability are:
While there are risks involved with using a personal device in the office, you can reduce that risk by implementing a centralized security management system for any staff member who will be using their personal device for work purposes. This system should include configuration requirements, like installing remote disabling on all devices and downloading security software. Your management should have a policy in place for users. If your office doesn’t have a policy set, you can check out Health Information Technology’s Develop, Document, and Implement page for how to get a policy started.
When an employee leaves your practice, or a particular provider is no longer associated with your practice, it is extremely important that you revoke their access to all health information that can be accessed through mobile devices. This can be done by removing their unique user ID that had previously been used to gain access, or by removing the mobile device itself from your network, and wiping the health data from the device.
There are several precautions you should take to ensure security when using your mobile device for work at home or in public:
When your Bluetooth is on, your device is discoverable and attracts hackers. It is best to keep Bluetooth turned off, but if you need to have it on, keep it set to "non-discoverable". This will keep you hidden to any unauthorized devices.
If the communication is going to involve patient-sensitive information, it is best to avoid email and text messages from your mobile device as those can be unsecure communication methods. We recommend using a secure third-party messaging system, or patient portal to ensure that the information being communicated is kept safe.
A strong password is one that is easy for you to remember, but hard for anyone else to guess. We recommend having a strict password policy in place for any staff that might be using a mobile device for work purposes. A strong password should include:
It is also important to ensure you keep your password safe to prevent breaches. Some tips for protecting your password are:
Those are the top 8 FAQs about mobile devices that we felt were important for practices to know. If you want to view the full list of facts and learn more about using your mobile device in the workpalce, visit Health Information Technology's Mobile Device Privacy and Security page.
Subscribe to our blog and never miss out on important industry information!