Health center - White papers, Tech tips & Articles

Beware of a security breach! Is your mobile data protected?

» Small & Medium Business

» Update email profile
Get the latest health expert advice and offers from HP
Health center - White papers, Tech tips and Articles

Beware of a security breach! Is your mobile data protected?

Your laptop was stolen from an examination room and it contains critical information - is that information protected from a potential security breach? A staggering number of recorded data breaches took place in 2011 alone: 535 breaches involving 30.4 million sensitive records. According to Privacy Rights Clearinghouse, a nonprofit consumer information and advocacy organization, the total reported records breached in the U.S. since 2005 is 543 million. It is vital to be aware of the implications of a security breach, options available for protecting your patient data, and the cost of recovery as your practice continues to collect greater amounts of data on a daily basis.
Consider the following checklist of five questions you should be asking concerning your data protection:
1.  Where and how is your patient and medical practice data stored?
2.  What steps are in place should your data be compromised?
3.  Do you have multiple levels of data access, and is your data encrypted?
4.  Can your delete data remotely?
5.  Is your equipment traceable, and recoverable?
Think for a moment about the daily transfer of data: It is accessed through multiple applications and hardware such as desktops, laptops and wireless hand-held devices. It is essential to take into account all the potential ways your data can be compromised.
Assigning users with different levels of access according to their role within the practice is a valuable security tool. The HP Device Access Manager allows you to create customized access for specific responsibilities within the practice. Similarly, data encryption is the best way to protect information contained on a hard drive. HP ProtectTools1 enables encryption of specific data or entire volume, encoding the information on a hard drive making it unreadable to an unauthorized user.
The ability to delete data remotely, and track and trace lost equipment is an invaluable service offered by Computrace. It is embedded in the firmware of current HP PC's and tablets. Computrace, when activated2 helps ensure that your critical data is protected.
There is no doubt that the risks associated with patient data exposure have exploded with the digital age. An effective data security program is vital for the safety of your practice.
To learn more about how to protect your data, visit http://www.hp.com/sbso/solutions/pc_expertise/great-desktops/protect/tools.html ›
1.
2.