HITInfrastructure

Mobile Device Security

Internet of Medical Things Devices Demand Dynamic Networks

July 3, 2018 - Organizations are relying on data more and more as digital tools prove to significantly help clinicians gain better insight into patient health. The data that Internet of Medical Things (IoMT) devices collect can also keep patients informed about their health so they can make steps to take care of themselves between visits to the doctor. The IoMT market is expected to grow at a CAGR of...


More Articles

Healthcare APIs Put Patients in Control of Their Data

by Elizabeth O'Dowd

The introduction of blockchain into health IT infrastructure has sparked the concept of giving patients more control of their own data. Organizations need to consider healthcare application programming interfaces (APIs) to begin thinking...

Managing Healthcare Apps for Better Mobile Device Security

by Elizabeth O'Dowd

Over the past several years, mobile device management strategies have evolved as healthcare organizations figure out the best way to manage their mobile devices. Implementing mobile device security without infringing on users’...

Healthcare Mobile Content Management Supports Device Security

by Elizabeth O'Dowd

New mobile devices are constantly being introduced into health IT infrastructure systems and organizations are responsible for making sure devices are totally protected. Mobile content management (MCM) in healthcare is one mobile device...

Mobile Health Tool Adoption Supports Population Health

by Elizabeth O'Dowd

Organizations are adopting more healthcare mobile health tools as those tools are developed to help patients be more involved in their own personal health. These mobile tools can help clinicians more accurately understand how a patient...

Securing Mobile Medical Apps on Devices Adds Flexibility

by Elizabeth O'Dowd

More mobile devices are being introduced into health IT infrastructure environments. Organizations must find the right way to manage and monitor different mobile medical apps to ensure reliable and secure connections. Entities need tools...

Medical Device Security Begins with Health IT Infrastructure

by Elizabeth O'Dowd

Medical device security complexities continue to plague healthcare as organizations look for health IT infrastructure solutions to exchange data over the network. As more medical devices connect to the network, the more complex securely...

Healthcare BYOD Security Embraces Cloud, Biometric Authentication

by Elizabeth O'Dowd

Organizations demand more flexibility from their healthcare mobile strategy as clinicians are able to access information in more convenient ways. However, entities need to be aware of how healthcare BYOD security affects the...

Healthcare Enterprise Mobility Management Fuels Mobile Success

by Elizabeth O'Dowd

Mobility solutions are gaining popularity as healthcare organizations seek ways to encompass more tools into their health IT infrastructure for increased flexibility and efficiency. Healthcare enterprise mobility management is one key way...

Healthcare IoT Infrastructure Relies on Device-to-Cloud Security

by Elizabeth O'Dowd

Samsung announced its ARTIK secure “s” systems-on-modules and services for the ARTIK IoT Platform to strengthen device-to-cloud security for organizations building their healthcare IoT infrastructure. The tool increases edge...

Cloud, Mobile Strategies Critical to HIT Infrastructure Growth

by Elizabeth O'Dowd

Organizations are faced with advancing their HIT infrastructures as more advanced technology proves its worth in increasing workflow, security, and patient care. However, IT decision-makers are challenged by how to tackle pieces of their...

Top Healthcare IoT Concerns Include Interoperability, Security

by Elizabeth O'Dowd

Organizations are adding more healthcare IoT devices to their health IT infrastructure as the need for tracking, communication, and mobility continues to increase. A recent report released by Verizon states that healthcare organizations...

Mobile Security Vendors Must Provide Usability, Flexibility

by Elizabeth O'Dowd

Gartner recently released its Critical Capabilities for High-Security Mobility Management report, outlining the subset of enterprise mobility management (EMM) and highlighting the qualities healthcare organizations should look for in a...

Android Oreo Improves Enterprise Mobility Management, Security

by Elizabeth O'Dowd

Android announced the availability of its latest operating system Android 8.0 Oreo which includes new enterprise mobility management, application programming interface (API), and security features. Work profile on work managed devices is...

Healthcare Cyberattacks Remain Persistent Despite Better HIT

by Elizabeth O'Dowd

A recent KPMG survey found that the healthcare industry has experienced an increase in healthcare cyberattacks and data loss since 2015. The healthcare executives polled stated that while they are more prepared than ever, they still...

Internet of Medical Things Security Gaps Threaten Health IT

by Elizabeth O'Dowd

Organizations are rapidly adopting mobile devices, which requires them to consider Internet of Medical Things (IoMT) security and what steps need to be taken to secure the devices. Most IoMT devices, such as wearables and monitors,...

Trend Micro Adds Mobile Security, Device Monitoring Tools

by Elizabeth O'Dowd

Trend Micro joined VMware’s Mobile Security Alliance by integrating its Mobile Security for Enterprise solution with AirWatch and VMware Workspace ONE to enhance device monitoring and mobile security. The partnership aims to make it...

Healthcare Mobility Device Diversity Key Challenge

by Elizabeth O'Dowd

Spok Holdings released the second part of its annual healthcare mobility survey, determining that organizations need their health IT infrastructure to support a variety of mobile devices. The survey polled over 300 U.S. healthcare...

Blue Cedar Releases Enterprise Mobility Management Alternative

by Elizabeth O'Dowd

Blue Cedar announced the release of its new enterprise mobile security platform aimed at extending traditional enterprise mobility management (EMM) solutions. The platform provides secure data access for all end users and secured mobile...

How to Protect Patient Healthcare Data from Shadow IT Threats

by Elizabeth O'Dowd

Shadow IT is one of the most prominent threats to patient healthcare data because it often goes undetected unless the IT department has tools in place to flag and prevent the unauthorized use of third party apps and devices. Shadow IT...

X

Sign up for our free newsletter covering the latest IT technology for Hospitals:

Our privacy policy

no, thanks