1 / 20

BYOD – Thoughts to Consider HIMSS Spring Meeting - May 2012

BYOD – Thoughts to Consider HIMSS Spring Meeting - May 2012. HIMSS Mobile Technology Survey. 164 respondents – nearly all (93%) are using mobile devices 38% had no mobile technology policy 84% look up non-PHI data on mobile devices 75% view patient data on mobile devices

kipp
Download Presentation

BYOD – Thoughts to Consider HIMSS Spring Meeting - May 2012

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BYOD – Thoughts to ConsiderHIMSS Spring Meeting - May 2012

  2. HIMSS Mobile Technology Survey • 164 respondents – nearly all (93%) are using mobile devices • 38% had no mobile technology policy • 84% look up non-PHI data on mobile devices • 75% view patient data on mobile devices • 28% store patient data on mobile devices

  3. HIMSS Mobile Technology Survey

  4. Pros and Cons of BYOD Saves the organization a lot of money Increases productivity Increases the risks to the organization of a breach of PHI Organization has less control over risks • Usage policy • User acknowledgement • End user training Users don’t like “Big Brother”

  5. iPad SecuritySource: (http://www.healthcareitnews.com) • Auto erase, remote wipe, password • Limit use of unsecured networks-turn off Blue Tooth • Permanently mark/engrave device • Cases with tethered locks • Download apps from trusted sources • Use full potential of capabilities (camera, location-based tracking, etc.) • GPS can help track lost/stolen devices • Mobile Device Management • Apps should be optimized for an iPad • Carry adaptors for VGA and HDMI for better presentations

  6. Smart Phones • Emails on mobile devices • Encrypt phones • Password protect phones • Remote wipe • Access email via portal • Texting PHI

  7. Policy Driven Approach • Requiring users to sign an acknowledgement • Require training for mobile device users • Allow mobile access for only certain roles?

  8. Acceptable Use PolicySource: Cisco • Employee awareness • Decide which systems devices may access • Allow only business related apps? • Require connection over VPN • Require MDM, which maintains a lot of control • Require everyone to register their devices

  9. HIMSS Mobile Security Tool Kit http://www.himss.org/ASP/topics_PStoolkit_MobileSecurity.asp

  10. System Center Suite consists of 5 Pieces • Configuration Manager (SCCM) • Operations Manager (SCOM) • Data protection Manager (SCDPM) • Virtual Machine Manager (SCVMM) • Service Manager (SCSM) • System Center Orchestrator • All of the formerly independent pieces now bundled together with SCCM 2012. If you have it, you have it all

  11. System Center Configuration Manager (SCCM) • Inventory • Software • Hardware • Deploy Operating Systems • Deploy Applications • Manage Mobile Devices

  12. Configuration Manager 2012

  13. User Centric – Device Management

  14. “Depth” Mobile Device Management • Extend and align mobile device management • Integration of System Center Mobile Device Manager and ConfigMgr 2007 features • Enable secure, compliant mobile devices • Secure over-the-air enrollment • Monitor and remediate out-of-compliance devices • Deploy and remove applications • Inventory

  15. Cisco Identity Services Engine (ISE) • Pervasive service enablement of Cisco TrustSec for borderless networks • Delivers necessary services such as AAA, profiling, posture, guest management • Unified policy platform ties organizational security policies to business components such as security and network infrastructure, user identity, resources and IT operational processes • Customers create/manage centralized policies. Cisco TrustSec delivers policies and enforcement through the network

  16. Cisco Identity Services Engine (ISE) • Security: Secures your network by providing real-time visibility into and control over the users and devices on your network. • Compliance: Enables effective corporate governance by creating consistent policy across an infrastructure. • Efficiency: Helps increase IT and network staff productivity by automating traditionally labor-intensive tasks and streamlining service delivery. • Enablement: Allows IT to support a range of new business initiatives, such as bring your own device (BYOD), through policy-enabled services

  17. Cisco ISEHighlights • Business-relevant policies • Systemwideoperational visibility • Context-aware enforcement • Highest Precision Device Profiling • Flexible services architecture • Operational Efficiencies Through IT Automation • MDM Integration

More Related