Instructions
Mobile Devices and Application Security in Healthcare
Mobile devices need to support multiple security objectives such as confidentiality, integrity, and on-demand, anywhere availability which requires that they be secured against a variety of threats. Centralized mobile device management strategies are needed to control the use of both organization-issued and personally-owned mobile devices by both healthcare providers and patient users.
To prepare for this Discussion, review the information in the assigned readings and research several external sources from current peer-reviewed references to for the comprehensive response to the following questions based on the Information Security Officer (ISO) role:
General Hospital has had numerous requests by the healthcare providers to implement mobile application solutions for use throughout the hospital providing real-time access to healthcare data. Since patients are also allowed to use their personal mobile solutions throughout the hospital the information security team has decided to investigate whether a patient mobile application(s) could also be provided to empower patients in their care.
What sources of threats specific to mobile devices would be of concern to the IS team?
What mobile device and application management security best practices would be applicable to this setting?
What application security best practices would you use to monitor and ensure compliance?
Provide your rationale and evidence from peer-reviewed sources to justify your argument.