
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"mHealth: Mitigating Mobile Security Risks","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"dOzu2rS1Co\"><a href=\"https:\/\/www.otava.com\/blog\/mhealth-mitigating-mobile-security-risks\/\">mHealth: Mitigating Mobile Security Risks<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/mhealth-mitigating-mobile-security-risks\/embed\/#?secret=dOzu2rS1Co\" width=\"600\" height=\"338\" title=\"&#8220;mHealth: Mitigating Mobile Security Risks&#8221; &#8212; OTAVA\" data-secret=\"dOzu2rS1Co\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"With the use of mobile devices in the healthcare industry come several risks and points of entry, according to the U.S. Department of Homeland Security. These points are listed below, as reported in the National Cybersecurity and Communications Integration Center\u2019s bulletin, Attack Surface: Healthcare and Public Health Sector: Insider: This can include employees and the ability to transfer information by using portable media devices or the cloud. The most common method of data exfiltration involves network transfer by email, remote access channel or file transfer. Malware: Malware created to steal information includes keystroke loggers, remote access trojans and more. Spearphishing: This is an email-based attack in which malicious attachments or links are sent to management, administrators and other key personnel, bypassing email filters and antivirus software in order to penetrate a network. Web: Silent redirection, obsfucated JavaScript and even search engine optimization (SEO) are a few web behaviors used to gain access to a network. Web servers with injection flaws or broken authentication may also lead to a data breach. Equipment Loss: As more and more sensitive data is stored on devices such as laptops, desktops, backup tapes, smartphones, flash drives and others, the theft or loss of ePHI (electronic...","thumbnail_url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/US-Dept.-Homeland-Security-Bulletin.png"}