|
Technology
|
|
Weak authentication mechanisms |
Identity and access management/MDMa to manage user authentication centrally
Strong passwords
Two-factor authentication with single sign-on
Automatic log off after periods of inactivity
|
|
Malicious medical apps downloaded on BYODb devices |
|
|
BYOD devices connected to unsecure networks/hotspots |
Over-the-air network scanning
Remote access through virtual private network
Data protection in rest and motion (use of AESc/TLSd)
|
|
Vulnerable devices connected on hospital network |
|
|
Mixing of personal and hospital data |
Containerization for logical separation of hospital and personal data
Use sandboxed apps for PHIe access
Use secure and encrypted clinical communication platforms
|
|
Lost device containing sensitive PHI |
Use MDM to track/lock device remotely
Use MDM with containerization to selectively wipe hospital data
Limit storage of hospital data on device using virtual desktop infrastructure
Report theft incidents to hospital information technology department
|
|
Policy
|
|
Lack of strategy/direction for ideal BYOD use |
Define hospital-wide BYOD strategy to be updated regularly
Dedicated BYOD policy for complete guidance on authentication, access control, chain of responsibility, data ownership, devices allowed, acceptable use, training, legislation, and noncompliance
Mandating signing of user agreement for BYOD users
|
|
Maintaining compliance with health care data protection laws |
Notify relevant government departments about breaches as per law
Perform regular audits and legal risk assessments
Define applicable privacy regulations and penalties for noncompliance
Train BYOD users about incident reporting to notify breaches/thefts
|
|
Access privilege abuse |
|
|
People
|
|
Inappropriate behavior by BYOD users |
Penalize staff found guilty of breaches
Encourage safe and secure use by establishing a security culture
Monitor user behavior regularly
|
|
Lack of awareness among hospital BYOD users |
Educate BYOD users periodically
Check awareness levels regularly, for example, through phishing campaigns
|
|
Poor user experience |
|
|
Cybersecurity budget and skills shortage |
Government investment in technology, education, and research
Hiring experts
Sponsoring and supporting employees for skills improvement
|