
Sign up to save your podcasts
Or


Mobile devices are vulnerable just like your network, servers, laptops, and desktops. Your risk analysis should include checking on any types of messages, pictures, or access to your data that can be done on your smartphones. Even if you don't put PHI on them they may be able to be used against you in some way to crack your network and your PHI.
PatchesIf you lose the phone or it dies will you lose important things? Figure out a backup plan but make sure it is properly secured too.
Unsecured WiFi and BluetoothUnderstand this is the new frontier for hackers. Ransomware and malware for smartphones are growing quickly
By Donna Grindle and David Sims4.9
6060 ratings
Mobile devices are vulnerable just like your network, servers, laptops, and desktops. Your risk analysis should include checking on any types of messages, pictures, or access to your data that can be done on your smartphones. Even if you don't put PHI on them they may be able to be used against you in some way to crack your network and your PHI.
PatchesIf you lose the phone or it dies will you lose important things? Figure out a backup plan but make sure it is properly secured too.
Unsecured WiFi and BluetoothUnderstand this is the new frontier for hackers. Ransomware and malware for smartphones are growing quickly

39 Listeners

200 Listeners

8 Listeners

38 Listeners