Nuviun
Register with nuviun FREE Log in
Register with nuviun Log in
  • digital health
    • Big Data
    • eHealth
    • EHR - EMR
    • Gamification
    • Health 2.0-Social Media in Healthcare
    • Health and Wellness Apps
    • Health IT
    • Interoperability
    • Medical Imaging
    • mHealth
    • Personal Genomics
    • Quantified Self
    • Sensors and Wearables
    • Telehealth/Telemedicine/Connected Health
    • Betting Sites UK
  • content library
    • Series
  • dashboard
  • directory
    • people
    • companies
  • events
nuviun
Content library
Why BYOD Doesn’t Mean BYOS (Bring Your Own Security)

Why BYOD Doesn’t Mean BYOS (Bring Your Own Security)

Published 07/04/2014 at 00:00 Sue Montgomery, RN, BSN, CHPN Health and Wellness Apps mHealth Security GCC nuviun United Arab Emirates United States 0 comments
Why BYOD Doesn’t Mean BYOS (Bring Your Own Security)

BYOD use is exploding in organizations across the globe. But while it may seem like a cost-effective solution to business budgets, there are a lot of hidden risks within the practice – like the lack of security that can expose your organization to more hazards than you bargained for.

There are 6.8 billion mobile subscriptions worldwide, and many belong to employees who combine business and personal use on the same device – creating a BYOD nightmare for IT security officers across the globe.

Today’s healthcare systems are similarly being infiltrated with BYOD by clinicians who insist on using such tools – a fact supported by recent Cisco data indicating that 86% of healthcare respondents cited smartphone use for work purposes.

Over the last decade, with the expansion of wireless capabilities and advancement in mobile devices, the workforce that traditionally sealed itself behind the security of organizational walls are now working remotely - using the same device to access patient records and enter clinical notes as they do to download videos, chat on social media, and find out what’s for dinner.

A dream or a nightmare?

It may sound like a mobile worker’s dream, but it can be an organization’s nightmare when such employees don’t have appropriate security measures in place – and sometimes the organization is partly to blame. According to a 2013 Forrester Consulting report entitled, “Five Key Business Insights for Mobile Security in A BYOD World”, 90% of companies surveyed permit BYOD use, but only half required employees to obtain adequate security coverage prior to use. Additionally, Cisco’s BYOD Insights 2013, found that:

  • 9 in 10 individuals use their smartphones for work.
  • 40% don’t password-protect their smartphones
  • 51% connect to unsecured wireless networks with their smartphones

Those are the kind of numbers that keep IT officers awake at night, since one accidental download of an unsafe application, or click on a malicious link can open an entire healthcare system to the vulnerabilities of malware and phishing threats. With the GCC containing some of the highest numbers of smartphone users in the world, and topping smartphone penetration rates for high-use countries, you can be sure that BYOD is a significant security issue for healthcare systems in the region.

A common companion to BYOD use is the installation of third-party software, which creates a significant security risk, as indicated by a recent HP study that revealed some hair-raising findings about the security status of the apps that were assessed:

  • 97 percent contained some type of privacy issue
  • 86 percent lacked basic security mechanisms
  • 75 percent lacked proper data encryption

When you consider all of the sensitive data within your organization, and the fact that a single device loaded with just one of these hazardous apps may be granting accessibilities you never dreamed of, you’ll be pulling out your BYOD policies for updates, or creating new ones if they don’t already exist.

Action is essential

To say in theory that BYOD security is an issue and agree upon the need to address it, unfortunately doesn’t mean that action will be taken or policy enforcement will occur. According to an Acronis “2013 Data Protection Trends Research” study, 60 percent of companies in the eight countries surveyed don’t have BYOD policies in place – with nearly 80 percent reporting they haven’t educated their employees regarding BYOD. According to Anders Logfren, director of mobility solutions at Acronis,

“The fact that 80 percent of the companies we surveyed do not train their staff on BYOD best practices shows us that we’re really still at the early stages of this movement. BYOD has been talked about for years, but now that it’s become so pervasive in the workplace, no company can afford to ignore it – let alone such a large majority…In order to successfully transition into the BYOD era, without risk of data leakage or corruption, these companies need to take more proactive steps to integrate safe, enterprise-grade BYOD management tools that not only put IT back in control of sensitive data, but that are easy enough to use, so that employees won’t feel bogged down by a movement that was meant to empower them.”

Healthcare's challenges

BYOD in healthcare organizations creates additional security challenges. While HIMSS’ recently released Mobile Technology Survey revealed that almost all of the organizations polled supplied company-owned mobile computing devices to clinicians, what they do with them may not be what’s expected.

Many clinicians practice in more than one healthcare system, are unwilling to be confined to a separate device-per-system configuration, and are increasingly demanding the ability to streamline their busy lives by using one device to achieve all purposes - including those related to their personal needs.

When organizations simply refuse to address the BYOD issue, they risk a system end-around by stakeholders who simply do not understand the security issues at stake - and the enormous ramifications that can result from attaching unsecured devices and careless user practice to organizational networks filled with sensitive information. As August Calhoun, VP and GM at Dell Healthcare and Life Sciences notes,

“The last thing you need is a doctor losing a tablet or smartphone that can be used by anyone to access your network.”

The answer in dealing with the BYOD reality certainly isn’t a head-in-the-sand approach, but to clearly understand how users are actually practicing, and then finding a compromise that optimizes both functionality and enterprise security. By dealing with the BYOD issue head-on, healthcare organizations across the GCC will ensure that they provide employees and providers with the resources they desire – while keeping everyone’s data safer in the process.

Log in or register for FREE for full access to ALL site features

As a member of the nuviun community, you can benefit from:

  • 24/7 unlimited access to the content library
  • Full access to the company and people directories
  • Unlimited discussion and commenting privileges
  • Your own searchable professional profile

Not yet a member?

Register now

Already a member?

Log in for immediate access:

Login failed, check your credentials and try again.

Author:

Sue Montgomery, RN, BSN, CHPN
Sue Montgomery, RN, BSN, CHPN View profile
Categorised:

Categorised:

  • Health and Wellness Apps
  • mHealth
  • Security
  • GCC
  • nuviun
  • United Arab Emirates
  • United States
Share with friends and colleagues
Discuss this post You must be logged in to comment on this post.
  • Most popular
  • Most recent
  • Oculus Rift in the Operating Room

  • One way healthcare providers can use big data to generate revenue fast

  • Why 2015 is the pivotal year for #digitalhealth

  • Talent to Task: The Digital Health Accelerator Dilemma

  • 7 Best Gamification Fitness Apps For 2015

  • 90 Healthcare Leaders Discuss Opportunities in Digital Health

  • nuvi & mo episode 9

  • Mitigating Hope and Hype: The Evolving Role of the Physician in the Era of eHealth

  • “You Click, We Care.” Profile in Digital Health: Raouf Khalil, CEO of Mobile Doctors 24/7

  • Solving the Innovation Puzzle with Partnerships: Our Second Day in India

  • The gaping privacy hole in healthcare data is not where you think

  • “Make them use it” is not a valid EMR adoption strategy

More by this author
  • Why BYOD Doesn’t Mean BYOS (Bring Your Own Security)

    Digital Health Rounds: Editor’s Progress Notes—March2015, Friday #2

  • Why BYOD Doesn’t Mean BYOS (Bring Your Own Security)

    Digital Health Rounds: Editor’s Progress Notes—March2015, Friday #1

  • Digital Health Rounds: Editor’s Progress Notes—Feb2015, Friday #4

  • Digital Health Rounds: Editor’s Progress Notes—Feb2015, Friday #3

  • Digital Health Rounds: Editor’s Progress Notes—Feb2015, Friday #2

Related posts
  • Why BYOD Doesn’t Mean BYOS (Bring Your Own Security)

    Solving the Innovation Puzzle with Partnerships: Our Second Day in India

  • Why BYOD Doesn’t Mean BYOS (Bring Your Own Security)

    “You Click, We Care.” Profile in Digital Health: Raouf Khalil, CEO of Mobile Doctors 24/7

  • Why BYOD Doesn’t Mean BYOS (Bring Your Own Security)

    The gaping privacy hole in healthcare data is not where you think

  • Why BYOD Doesn’t Mean BYOS (Bring Your Own Security)

    Solving the Innovation Puzzle with Frontline Research: Our First Day in India

  • Why BYOD Doesn’t Mean BYOS (Bring Your Own Security)

    Adoption and sustainability identified as major needs for mhealth rollout in Africa

  • Why BYOD Doesn’t Mean BYOS (Bring Your Own Security)

    Digital Health Rounds: Editor’s Progress Notes—March2015, Friday #2

Digital Health Live 2015

Dubai World Trade Center

May 5th - 7th 2015

Doctors 2.0 and you - Paris 4th and 5th of June 2015
Explore nuviun
  • Home
  • About nuviun
  • Join our team
  • Contact nuviun
  • Site map
  • Privacy and cookies
  • Terms and conditions
Dashboard
  • Dashboard
  • Content Library
  • Subscriptions
  • Directory
  • Edit profile
  • My account
Connect with us
facebook linkedin twitter
© 2015 Nuviun. All rights reserved. MintTwist CMS Websites

nuviun.com uses cookies to enhance your experience. By using this site you agree to have cookies placed on your computer. To learn more, please see our cookies policy and privacy policy pages. Thanks for reading.

Apologies

These features are reserved for registered users of nuviun.com. Registration is FREE.

It's simple to:

  • log in if you've already registered
  • or super quick to register a new account if you don't have one yet.
Log inRegister with nuviun

You have unfavourited the article [title]