The Basics of Mobile Device Security for Protected Health Information
The single most common way Protected Health Information (PHI) is compromised is through the loss of devices themselves, whether this happens by accident or by theft. Technology — thumb drives, CDs, smart phones, tablets — has made it possible for large amounts of information to be tucked into our pockets or purses and carried to […]
The Basics of Mobile Device Security for Protected Health Information Read More »