This page contains a Flash digital edition of a book.
41
Quarter of healthcare identity? Obviously the staff with good, workable and
professionals worried about medical profession has a secure alternatives to carrying
P
patient details being held on responsibility to protect all information around on USB
ERSP
mobile devices our confidential records – so sticks and other devices. The
Credant’s advice would be for survey also shows up some ECTIVES SECURIT
A quarter of the medical all healthcare IT departments examples of very bad practice.
practitioners expressed anxiety to implement a data-centric Every data breach has the
that patient details are being information protection potential to undermine faith
held on mobile devices. Many solution that includes policy in the NHS and its ability to
were quite clued up on what enforcement and centralised keep patient records secure,
the hacking community could management and reporting. so this is not an issue that
get up to, with many can fall off the health service’s
commenting that if the hackers In doing this, IT departments agenda.”
really wanted to get to their can significantly limit patient
data they knew they probably and other important data Many healthcare professionals Y
could. exposure even as it resides on admitted to resorting to their
personal devices.” Lyn own mobile devices to store
Michael Callahan, VP Global Whitfield, managing editor of information because it was
Marketing at Credant E-Health Insider, said: “Our much more convenient with
Technologies said “Anyone survey reveals some positive the following explanations: “I
who owns a mobile device trends. It seems that the need to continue to work
such as a smartphone or Department of Health’s focus once I get home”, “I am
laptop should stop and think on the security of patient limited to what I can email
– can someone easily open it? information is having some using my work laptop”,
impact and that NHS trusts “access is controlled so I need
If so, once they are in, could are taking this issue seriously to bypass it by using my own
they access patient records, at a policy level. device”, “network issues (long
read my emails and then use log-in or load times)”,
this information to access the “However, there is a lot still to “hardware issues (insufficient
company network, such as the do in terms of NHS trusts work stations)”, “need to take
NHS hospital network? If so taking control of their data outside the network”.
what damage could they do if networks and the devices that
they were to assume my connect to them, or providing www.credant.com
Credant Technologies recommend these following tips to securing
data on the move
1. Encrypt the data on every device you carry if it’s sensitive.
2. Get a solution which can detect devices trying to connect to the enterprise and
sync up with corporate data.
3. Make sure the encryption solution is transparent to end-users and doesn’t interfere
with any of your operational activities.
4. IT departments should never leave data security up to the end user. It is imperative
that this is controlled and managed centrally This can also reduce TCO (total cost of
ownership) as machines don’t need to be locked down or bought into the office to
update them.
WWW.SNS-UK.CO.UK MAR/APR 09
Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44
Produced with Yudu - www.yudu.com