Healthcare BYOD Security Embraces Cloud, Biometric Authentication

November 2, 2017 - Organizations demand more flexibility from their healthcare mobile strategy as clinicians are able to access information in more convenient ways. However, entities need to be aware of how healthcare BYOD security affects the network. Bitglass polled over 200 IT and security professionals across all major verticals to learn more about how IT staff and decision-makers handle the growing threat...

More Articles

3 HIT Infrastructure Tips for Success in Healthcare VDI Resurgence

by Bill Kleyman

I get the chance to work with healthcare organizations around the entire country. This includes major hospital chains, smaller clinics, and specialized healthcare like orthopedics. Over the course of the last five years or so, the use of virtualization...

BYOD Policies Challenge Health IT Infrastructure, Data Security

by Elizabeth O'Dowd

Bring-your-own-device (BYOD) policies are becoming more common but healthcare organizations struggle with BYOD policies and how to make sure data is secure on devices they don’t own. A recent Spok study polled over 350 healthcare leaders...

Gartner EMM Report Highlights Mobile Security Advancements

by Elizabeth O'Dowd

With evolving healthcare mobile devices, organizations must consider an enterprise mobility management (EMM) solution that can adapt to the rate of device advancement and address mobile security concerns. Gartner’s latest Magic Quadrant for...

IoT, BYOD Prompt Healthcare Cloud Security Market Growth

by Elizabeth O'Dowd

The healthcare cloud security market is growing as organizations continue to embrace cloud-based IT infrastructure solutions. According to a recent Markets and Markets report, the cloud security market is expected to rise steadily through 2022....

Ruckus Expands Network Security with VMware, Lightspeed Systems

by Elizabeth O'Dowd

Ruckus Wireless announced new integrations between its Cloudpath software and Lightspeed Systems and VMware software to offer better network security. Cloudpath allows organizations to establish policy-based security for wired and wireless networks....

How to Secure an Evolving HIT, BYOD Mobile Infrastructure

by Elizabeth O'Dowd

Healthcare organizations have been exploring bring-your-own-device (BYOD) deployments in health IT infrastructure over the past several years, but many organizations have been hung up on challenges presented by security concerns of employees...

Healthcare Orgs Over Spending on Unified Endpoint Management

by Elizabeth O'Dowd

Osterman Research and Unify Square released the results of a joint survey highlighting the demand to improve enterprise endpoint management and control. The survey found that three quarters of respondents do not have software or services in their...

Impact of Consumerization of IT, BYOD on Healthcare IT

by Elizabeth O'Dowd

The consumerization of IT movement encourages healthcare organizations to embrace technology used by clinicians and patients in their personal lives to access the secure healthcare network. Lifestyle changes over the past decade have driven end...

NAC Denies Unauthorized Devices Access To Health IT Network

by Elizabeth O'Dowd

Healthcare organizations allowing mobile devices to access IT infrastructure need to manage which devices are granted rights to their network. Network access control (NAC) protects the network by passing devices through security clearance protocols...

54% of Orgs See Health IT Infrastructure as Top Mobility Test

by Elizabeth O'Dowd

Fifty-four percent of healthcare organizations named health IT infrastructure as their top challenge when deploying employee mobile device usage, according to a recent survey released by Spok Holdings. Fifty-eight percent of healthcare organizations...

Potential for Virtual Mobile Infrastructure in Healthcare

by Elizabeth O'Dowd

Virtual mobile infrastructure (VMI) is the latest form of virtualization technology weaving its way into health IT infrastructure. VMI takes the concept of virtual desktop infrastructure (VDI) and applies it to mobile devices and operating systems...


Sign up for our free newsletter covering the latest IT technology for Hospitals:

Our privacy policy

no, thanks