© Eric C. Thompson 2017

Eric C. Thompson, Building a HIPAA-Compliant Cybersecurity Program, https://doi.org/10.1007/978-1-4842-3060-2_15

15. Social Media, BYOD, IOT, and Portability

Eric C. Thompson

(1)Lisle, Illinois, USA

Social media, Bring Your Own Device (BYOD), and the Internet of Things (IoT) are potential headaches and cybersecurity risks. Data moves so freely in the age of digitization that it places vast amounts of ePHI at risk in new and complicated ways. The diverse social media risks cover more than the typical concern over posting of sensitive information on these sites. End users often share sufficient intelligence about the companies they work at that attackers may not have to dig as much during the reconnaissance stage. Social media ...

Get Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.