Video: Why You May Need a Secure File Transfer
Biscom Secure Delivery Server Overview
What are the top 5 Reasons to Make the Move to Hosted Fax??
Biscom - A History of Innovation
Join Biscom and mindSHIFT Technologies for an ILTA webinar on May 14 where we will review trends, best practices and technologies for managing and mitigating risks associated with the proliferation of personal mobile devices in the legal environment.
How Does BDS Work?
Bill Ho, Biscom As you know, HIMSS 2013 just wrapped up. Among the main security challenge with healthcare BYOD (bring your own device) security lies in the dual-use nature of mobile devices. A stolen or lost physician’s laptop will probably already have security measures built in such as whole disk encryption and authentication requirements, but smart phones and tablets, especially personal devices, often eschew these added layers of protection in favor of ease of use, simplicity and quick access.
One of the biggest dangers of BYOD is the latest crop of Dropbox-style synchronization applications. By poking a hole in an institution’s security fabric to synchronize files to mobile devices, the physician is potentially creating a new channel through which confidential patient information could leak. It is important to know that many healthcare institutions have decided to shut off access to these synchronization tools until there’s a way to manage them as hospital applications with centralized control, granular permission and integration with established authentication services.
Seven years ago, my suit pockets overflowed with phones. I had a mobile for work and a mobile for home, plus chargers for both. A ringing mobile device often solicited multiple pats until I located the right culprit. Now, I carry only one phone that does double duty for work and personal communications.
HIMSS 2013 was an excellent opportunity to meet with Biscom customers and connect with new prospects. The event included 2.5 days of exhibits, with all the leading suppliers of Health IT products in the industry who market to hospitals, health plans, and practices.
10 ways to meet BYOD security requirements
LegalTech New York is right around the corner and frankly, I’m counting down the days. I always enjoy the opportunity to connect with colleagues and clients and discuss the latest developments in legal IT and its users. I anticipate that mobile communications and trends such as BYOD will dominate discussions. This isn’t surprising in a time when hacking is common place and it only takes one small finger slip to expose confidential or government-regulated data.
Healthcare institutions involved in medical research, like Dana Farber Cancer Institute (DFCI) of Partners Healthcare communicate diverse files inside and outside of their walls-- many files and big ones. DFCI's 100 Mbytes email storage limit quickly clogged up their email servers.
© 2013 MMIX Biscom Inc. All Rights Reserved