Your Perfect Assignment is Just a Click Away

Starting at $8.00 per Page

100% Original, Plagiarism Free, Customized to Your instructions!

glass
pen
clip
papers
heaphones

Healthcare Information Security

Healthcare Information Security

Instructions

You are the recently hired CISO for ACME Health System. One of the organizations strategic missions is to increase provider access to patient information to improve patient care. One initiative being promoted is the adoption of mobile technologies. However, as you’re surveying the security posture of the organization, you realize that the company is weak in the area of basic technical protection mechanisms against security threats. You must first build a strategy to fix these gaps with new tools.

Part 1 – Fixing Existing Issues

What are some technologies that you might recommend to fill basic gaps in protection for ACME in the following areas? Locate two tools or products for each area listed below.

  1. Personal Firewall (for laptops of employees)
  2. Endpoint security (also known as endpoint protection)
  3. Data Loss Prevention
  4. Vulnerability Management Tools
  5. Security Audit Log Monitoring

It is important to clearly cite the source of information and the names of the vendors or providers of the firewall products. Note that even if a firewall function is combined into a larger, more comprehensive security suite, you can still use it as an alternative.

Describe your strategy, and why you’ve chosen these specific tools.

Part 2 – Planning for Mobile Device Deployment

Now that you’ve developed a plan for fixing the existing security issues, you need to address the mobile technology initiative. You know that it is best practice to employ a Mobile Device Management (MDM) solution, but you also need to make sure whatever tool you purchase is able to do the job you require. First, you need to analyze common security and privacy threats of mobile health technologies in terms of software (e.g., apps, programs, mobile-friendly patient portals) and hardware (e.g., personal/remote devices, on-site devices, smart devices). You are convening a meeting with your security team to highlight some of the main security and privacy issues, and you want to provide them with a one-page tip sheet covering the following information:

  1. Summarize the mobile device vulnerabilities presented by the Government Accountability Office (GAO) Congressional Report (Links to an external site.).
  2. For each vulnerability/threat, briefly summarize a policy, procedure, technical requirement, or software solution that can eliminate or mitigate these vulnerabilities.
  3. Locate three (3) reputable and high-quality resources that you can provide your staff to help them gain more knowledge on mobile device privacy and security issues. Briefly explain why you selected these resources.

Format

For Part 2,  a table has been provided to help you organize the comparisons.  Download the Lesson 9 Comparison template.


"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Ace Tutors only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Ace Tutors are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Ace Tutors is known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Ace Tutors, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.