
Sign up to save your podcasts
Or


Mobile devices are vulnerable just like your network, servers, laptops, and desktops. Your risk analysis should include checking on any types of messages, pictures, or access to your data that can be done on your smartphones. Even if you don't put PHI on them they may be able to be used against you in some way to crack your network and your PHI.
PatchesIf you lose the phone or it dies will you lose important things? Figure out a backup plan but make sure it is properly secured too.
Unsecured WiFi and BluetoothUnderstand this is the new frontier for hackers. Ransomware and malware for smartphones are growing quickly
By Donna Grindle and David Sims4.9
6161 ratings
Mobile devices are vulnerable just like your network, servers, laptops, and desktops. Your risk analysis should include checking on any types of messages, pictures, or access to your data that can be done on your smartphones. Even if you don't put PHI on them they may be able to be used against you in some way to crack your network and your PHI.
PatchesIf you lose the phone or it dies will you lose important things? Figure out a backup plan but make sure it is properly secured too.
Unsecured WiFi and BluetoothUnderstand this is the new frontier for hackers. Ransomware and malware for smartphones are growing quickly

228,853 Listeners

153,483 Listeners

386 Listeners

3,946 Listeners

1,020 Listeners

28,317 Listeners

87,155 Listeners

112,022 Listeners

8,061 Listeners

16,956 Listeners

74 Listeners

9,951 Listeners

50,215 Listeners

57,889 Listeners

16,896 Listeners