
Sign up to save your podcasts
Or
Mobile devices are vulnerable just like your network, servers, laptops, and desktops. Your risk analysis should include checking on any types of messages, pictures, or access to your data that can be done on your smartphones. Even if you don't put PHI on them they may be able to be used against you in some way to crack your network and your PHI.
PatchesIf you lose the phone or it dies will you lose important things? Figure out a backup plan but make sure it is properly secured too.
Unsecured WiFi and BluetoothUnderstand this is the new frontier for hackers. Ransomware and malware for smartphones are growing quickly
4.9
6161 ratings
Mobile devices are vulnerable just like your network, servers, laptops, and desktops. Your risk analysis should include checking on any types of messages, pictures, or access to your data that can be done on your smartphones. Even if you don't put PHI on them they may be able to be used against you in some way to crack your network and your PHI.
PatchesIf you lose the phone or it dies will you lose important things? Figure out a backup plan but make sure it is properly secured too.
Unsecured WiFi and BluetoothUnderstand this is the new frontier for hackers. Ransomware and malware for smartphones are growing quickly
3,014 Listeners
38,704 Listeners
38,649 Listeners
43,909 Listeners
225,807 Listeners
1,006 Listeners
25,558 Listeners
34,045 Listeners
27,214 Listeners
7,871 Listeners
187 Listeners
9,095 Listeners
44,368 Listeners
57,908 Listeners
7,093 Listeners