200 likes | 322 Views
BYOD – Thoughts to Consider HIMSS Spring Meeting - May 2012. HIMSS Mobile Technology Survey. 164 respondents – nearly all (93%) are using mobile devices 38% had no mobile technology policy 84% look up non-PHI data on mobile devices 75% view patient data on mobile devices
E N D
HIMSS Mobile Technology Survey • 164 respondents – nearly all (93%) are using mobile devices • 38% had no mobile technology policy • 84% look up non-PHI data on mobile devices • 75% view patient data on mobile devices • 28% store patient data on mobile devices
Pros and Cons of BYOD Saves the organization a lot of money Increases productivity Increases the risks to the organization of a breach of PHI Organization has less control over risks • Usage policy • User acknowledgement • End user training Users don’t like “Big Brother”
iPad SecuritySource: (http://www.healthcareitnews.com) • Auto erase, remote wipe, password • Limit use of unsecured networks-turn off Blue Tooth • Permanently mark/engrave device • Cases with tethered locks • Download apps from trusted sources • Use full potential of capabilities (camera, location-based tracking, etc.) • GPS can help track lost/stolen devices • Mobile Device Management • Apps should be optimized for an iPad • Carry adaptors for VGA and HDMI for better presentations
Smart Phones • Emails on mobile devices • Encrypt phones • Password protect phones • Remote wipe • Access email via portal • Texting PHI
Policy Driven Approach • Requiring users to sign an acknowledgement • Require training for mobile device users • Allow mobile access for only certain roles?
Acceptable Use PolicySource: Cisco • Employee awareness • Decide which systems devices may access • Allow only business related apps? • Require connection over VPN • Require MDM, which maintains a lot of control • Require everyone to register their devices
HIMSS Mobile Security Tool Kit http://www.himss.org/ASP/topics_PStoolkit_MobileSecurity.asp
System Center Suite consists of 5 Pieces • Configuration Manager (SCCM) • Operations Manager (SCOM) • Data protection Manager (SCDPM) • Virtual Machine Manager (SCVMM) • Service Manager (SCSM) • System Center Orchestrator • All of the formerly independent pieces now bundled together with SCCM 2012. If you have it, you have it all
System Center Configuration Manager (SCCM) • Inventory • Software • Hardware • Deploy Operating Systems • Deploy Applications • Manage Mobile Devices
“Depth” Mobile Device Management • Extend and align mobile device management • Integration of System Center Mobile Device Manager and ConfigMgr 2007 features • Enable secure, compliant mobile devices • Secure over-the-air enrollment • Monitor and remediate out-of-compliance devices • Deploy and remove applications • Inventory
Cisco Identity Services Engine (ISE) • Pervasive service enablement of Cisco TrustSec for borderless networks • Delivers necessary services such as AAA, profiling, posture, guest management • Unified policy platform ties organizational security policies to business components such as security and network infrastructure, user identity, resources and IT operational processes • Customers create/manage centralized policies. Cisco TrustSec delivers policies and enforcement through the network
Cisco Identity Services Engine (ISE) • Security: Secures your network by providing real-time visibility into and control over the users and devices on your network. • Compliance: Enables effective corporate governance by creating consistent policy across an infrastructure. • Efficiency: Helps increase IT and network staff productivity by automating traditionally labor-intensive tasks and streamlining service delivery. • Enablement: Allows IT to support a range of new business initiatives, such as bring your own device (BYOD), through policy-enabled services
Cisco ISEHighlights • Business-relevant policies • Systemwideoperational visibility • Context-aware enforcement • Highest Precision Device Profiling • Flexible services architecture • Operational Efficiencies Through IT Automation • MDM Integration