BYOD policies must be part of healthcare network security

Greater volume of personal device usage has forced healthcare organizations to take a long look at their network security approach

By Healthcare Facilities Today


A greater volume of personal device usage has forced healthcare organizations to take a long look at their network security approach, according to an article on the Health IT Security website.

Wile securing internal user access and preventing outside intrusion, healthcare IT decision makers are beginning to recognize that the idea of having “four walls” is a thing of the past. Instead these administrators have become authenticators that base access on user role, their privileges and the type of data being accessed. And the technologies have evolved as well, the article said.

One increasingly-important part of network access control these days is aligning security measures with BYOD policies. Administrators are now able to control everything on a healthcare network as part of a BYOD control policy. These management platforms can be integrated with network security components such as Application Delivery Controllers (ADC) or Network Delivery Controllers (NDC).

These appliances are able to do device interrogation to ensure that specific security policies are applied, according to the article. Is the user coming in from a rooted device? Does the device have AV? Is the user coming in from a secure connection? What is the geo-location of the device? All of these can be set as rules to either allow or prevent a device from access the network. 

Read the article.

 

 



December 2, 2013


Topic Area: Information Technology


Recent Posts

The HAI Challenge Goes On

The CDC estimates that about 23,000 people die each year from 17 types of antimicrobial-resistant infections acquired in healthcare facilities.


Report: Violence Costs Hospitals More than $18B Per Year

Building safety into the facilities’ designs is one approach to preventing violence and ensuring resilience.


Doctors Imaging Group Ensnared in Data Breach Event

Their investigation determined that the network had been accessed by unknown actors between November 5, 2024, and November 11, 2024.


EaaS: Funding Infrastructure Projects with Energy Savings

Process converts necessary upgrades from capital liabilities into strategic investments using operational dollars.


Balancing Security Systems with Patient Comfort in Healthcare

Security systems, safety and inviting atmospheres don’t have to be in conflict.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.