Mobile Security in The Enterprise: Tackling The Risks of Mobile Proliferation
Mobile Security in The Enterprise: Tackling The Risks of Mobile Proliferation
www.ahia.org
Shift to a consumer-focused market and mHealth
2
01011000 010110001000101110101100011001100100010101001000010010011010110001
00100001001001010110001100110010 110010001010100100001001001011000100010111001001001011
01010100100001110010101110010000000010010010110 101011000110011001000101010010000100100101100010001011100100100101
0
010110001100110010001010100100 100100001001001010110001100110
01001001011000 00101010010000111001010111001000000001001001011
0101100011001100101011100101010101000010 1010110001100110010001010100
010010000100100101100 001001001011
010110001100110 10101100011001100101011100101010101000
10001010100100001001 101011000110011001000101010010000100100101100010001011100100100101
01011000
The image part with relationship ID rId4 was not found in the file.
11000100010111001001001011000 100100001001001010110001100110
00100001001001010110001100110010 00101010010000111001010111001000000001001001011
01010100100001110010101110010000000010010010110 1010110001100110010001010100
0 001001001011
010110001100110010001010100100 10101100011001100101011100101010101000
01001001011000
0101100011001100101011100101010101000010
0100100001001001011000
010110001100110
10001010100100001001
01011000
$$$
Health Insurance
mHealth Consumerism growth Meaningful Use (MU)
g ((HIX))
Exchanges
Background
g
4
Device
D i 172 25% $ 180
sales million growth million
in 2009 in 2016
Mobile
data
$ 35 514% $ 215
Usage
billion growth billion
in 2009 in 2016
0%
1- HIMSS. “HIMSS Mobile Technology Survey,” December 2011. Strong interest in Would like to get Want to digitally
2- Deloitte Center for Health Solutions, Keckley, P., Coughlin, S., and Eselius, L. “Consumerism in Health Care.” Deloitte Review, 11, health monitoring
2012, 70-83.
appointment email schedule an
devices2 reminders3 appointment3
3-“Few Patients Use Online Services, But Most Want Them, Poll Finds.” Wall Street Journal, September 12, 2006.
Background
g
5
41 30
of consumers
“If you value
developedself-
an ongoing health But, more than 30% of
monitoringcondition
devicesthat needed to be checked or
that respondents feel that
treated regularly, how interested
offer connectivity to mobile apps are likely to
would you be in using the following
their physician
tools or supports on a regular basis if
have or lead to potential
the technology became available to errors
you?”
How can this impact security and privacy for an
organization’ss business and consumer interactions?
organization
6
Text Email
Direct
Access to Skype
EMR
101011000110011001000101010010000100100101100010001011100100100101100010
101100011001100100010101001000010010010110001010110001100110010001010100
Health
110000100100010101010101001011010110100000000000010101100011001100100010
Personal
101001000010010010110001010110001100110010001010100100001001101011000110
Health Insurance
011001010111001010110001100110010101110010101100011001110001100110010101
Exchanges
Record 1
mHealth Identity
Security Theft
Cyber
Encryption Security
What technologies can be put in place to secure ePHI*?
7
Health Care
Organizations and
Business Partners Consumers
101011000110011001000101010010000100100101100010001011100100100101100010
0110001100110010001010100100001001001011000101011000110011001000101010010
0001001000101010101010010110101101000000000000101011000110011001000101010
0100001001001011000101011000110011001000101010010000100110101100011001100
101011100101011000110011001010111001010110001100110010101110000010101010
010010110101101000000000000
10101010100001010101100011001100100
010101001000010010010110001010110001100
1001000101010010000
10010001010
1010101001011010
10101100011001100100010101001000010010010110011
0001100110010001010100100001001001011000101011000110
0010001011100100100101100010101100100010101001000100010111001001001011000
* Electronic Protected Health Information
1010010001011100100100101100010100100010111001001001011000101
The Mobility Landscape
8
Mobile computing has been growing at a staggering rate across all age groups, income
groups, industries,
i d i geographies hi and d cultures
l and
d is
i widely
id l expected
d to continue
i its
i
exponential growth rate over the next five years.
Current mobile landscape Expected growth
Mobile cellular subscriptions surpassed 5B By
B endd off 2011,
2011 over 85% off the
th
in 2010 (Gartner) handsets will be able to access the
mobile web (Gartner)
300M smartphones sold globally in 2010
((Forrester)) Smartphone unit sales will surpass
laptop unit sales in 2012 (Gartner)
One of the major device vendors has sold
20M smartphones in Q2 2011 and 15M Approximately 470M smartphones will
tablets since product launch in 2010 be sold globally in 2011 (IDC)
(Strategy Analytics) Approximately 980M smartphones will
83% of US population owns cellphones; be sold globally in 2016 (IMS)
35% of these are smartphones (Pew By 2015, global mobile data traffic
Research) volume will be approximately 25 times
2010 volume (FCC)
Mobility and mobility services are not only gaining ground among consumers but
also among enterprises
Internal drivers for mobility & mobility security considerations
It is not only consumers but employees and enterprises as well who want to take advantage of everything
mobility has to offer. However there are some security challenges to consider when adopting mobility
within an enterprise.
9
Co-mingling of business and personal use of Expanding “gray area” between enterprise mobile device
mobile devices management/acceptable use and personal use activities.
activities
Enterprises are no longer able to enforce the Shift from ‘one-size-fits-all’ tactical response to building a strategy
single brand restrictions of the past across multiple platforms.
Supporting today’s
today s enterprise mobile environment
Mobile security strategies will need to account for integration into
will ultimately involve integration with the broader
various infrastructure levels.
mobile ecosystem
Mobility
y Risk Categories
g
10
1. Operational
p 2. Technology
3. Legal & &
11 Regulatory Data
Protection
2. Technology
gy and Data Protection
2. Technology
3. Legal & &
12 Regulatory Data
Protection
3. Legal
g & Regulatory
g y 2. Technology
3. Legal & &
13 Regulatory Data
Protection
A. Mobile device attacks and varying attack vectors increases the overall risk
exposure
B. Multiple choices in the devices, OS platforms, apps, etc., requires
companies to employ diverse technologies expanding the attack surface
C. Third party apps installed on corporate devices may contain vulnerabilities caused
by developer mistakes or re-packaged malware
D. Securing of mobile transmissions and channels is complex given a varied protocol
landscape and the newer communication channels
E. Mobile devices are easily lost or stolen in comparison with other IT assets (e.g.,
laptops) and remote wipe efforts frequently fail
After determining the right approach to meet your overall mobile security
objectives a critical next step to consider is to address a few key strategic choices
objectives,
and/or decisions that your organization should make.
Below are some of the pros and cons associated with Bring-your-own v. Corporate
Provided:
Below are some of the pros and cons associated with managing security in-house
v outsourcing:
v.
Manage security in-house Outsource security
Tighter control and flexibility One stop shop for mobile security
Greater visibility into ongoing operations management
Potentially lower overall cost More viable option for larger fleets
Pros
More sustainable for smaller IT Various mobile device and app
organizations and small fleets management packages available with
service provider
May require increased IT staffing Restricted control and flexibility for internal
Requires specialized mobile security IT
expertise Not much visibility into ongoing operations
Cons IT will have to develop mobile security Potentially higher overall cost, recurring
management processes from scratch annual spend
Significant time and effort involvement from Less sustainable for smaller IT organizations
IT is required
3rd Party Tools vs. Native Platform Tools
18
Below are some of the pros and cons associated with 3rd Party Toos v. Native
Platform Tools:
Below are some of the pros and cons associated with application management vs.
application guidance:
About Deloitte
Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of
member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description
of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Please see www.deloitte.com/us/about for a detailed
description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the
rules
l and d regulations
l ti off public
bli accounting.
ti
22
MOBILE TECHNOLOGY:
AN AUDITOR’S TOOLKIT
PHYLLIS A. PATRICK, MBA, FACHE, CHC
PRESIDENT
PHYLLIS A. PATRICK & ASSOCIATES LLC
www.ahia.org
Our Topics
p
2
People
Technology Process
Policy Safeguards
“Pill
Pill in a chip
chip”
Disease management
Consumer expectations
New and emerging technologies
Big data/data analytics
Lots of devices
devices, untrained users
users, difficulties in
achieving security
Encrypt devices.
Analyze malware risks. Implement preventive
measures.
Phyllis A. Patrick & Associates LLC
Strategies
g to Reduce Risks (cont’d)
( )
16
SSecurity
i M Management Program
P for
f Mobile
M bil Devices
D i
should be a key component of Security Governance.
49% do nothing.
46% have policies governing proper use of devices.
25% install antivirus products.
products
23% install encryption.
21% use passwords d or keypad
k d locks.
l k
12% use “other” protections.
Source: Ponemon Institute’s 2011 Benchmark Study on Patient Privacy and Data
y, December 2011.
Security,
Mobility
y is a critical component
p of the Information
Technology planning process.
Mobile strategy development
Budget and staffing
Security of devices, networks
Managing workforce devices (BYOD)
Addressing Lifecycle management
eDiscovery and Freedom of Information Act issues
Managing mobility-driven big data (research,
collaborations across organizations)
The Plan needs to be updated frequently (twice/year?)
Phyllis A. Patrick & Associates LLC
Designing
g g a Mobile Device Strategy
gy
22
Management
g assures that risks associated with
mobile computing are thoroughly evaluated and
that mobile security risk is minimized.
Risk assessments performed prior to implementation of
new mobile security devices
Continuous risk monitoring program evaluated changes
in or new risks
Risk assessments for different devices
Risk assessment governance – who sponsors risk
management and reviews risk assessments?
Mobile Computing
p g Awareness Training g
Customized training (role-specific)
Training revised to reflect new technologies and
organizational policies
Documentation of Awareness Training
M
Mobile Computing
C Awareness
A Governance,
G i.e., processes
for management feedback to understand usage and risks
identified byy device users;; and accountability,
y,
responsibility and communication with device users
through feedback to management
W kf
Workforce members
b and d contractors
Phyllis A. Patrick & Associates LLC
Final Thoughts
g
35
[email protected]
h lli @ h lli t i k
914‐696‐3622
www.phyllispatrick,com