Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs. In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities.
Thoroughly analyzed the identified risks and thoroughly developed factors to mitigate the risks.
Understanding the risk of using wireless or mobile technology makes it easier to come up with a plan is place to try preventing further actions. Maintaining secure wireless network is an ongoing process that requires greater effort that the required for other networks and systems. By assessing the risks, testing and evaluating system security controls for wireless networks more frequent can help prevent problems. There are many ways to improve the management of wireless or mobile technology like the following: * Creating backups of data frequently * Preforming
References: Milligan, P., & Hutcheson, D. (2008). Business risks and security assessment for mobile devices, Audit and Control Association. www.isaca.org https://docs.google.com/viewer?a=v&q=cache:rCt1m3UM18AJ:www.isaca.org/Journal/Past-Issues/2008/Volume-1/Documents/jpdf0801-business-risks.pdf+risk+inherent+in+using+mobile+and+wireless+technology&hl=en&gl=us&pid=bl&srcid=ADGEESgchcyiW7LOd-akV09EkMxXxd1VCumIKTw58NI7lN-xbA3vJ_Em37ErJgIG2BrGjlsxy6j1wT7j3U4ARwDDOGdiGVeGNN05pJ3Ljfp UeR4pzS5T49FrOr-xnPMFf-Kzzreojwin&sig=AHIEtbSeyo3aKqdZD3uk79VZzWkrHelkNQ Urbas, G., & Krone, T. (2006). Retrieved from Australian Government website: https://docs.google.com/viewer?a=v&q=cache:XuG2OtzcfBMJ:www.aic.gov.au/documents/E/9/9/%257BE99293FF-9E0F-4522-8E54-0598720C45B2%257Dtandi329.pdf+risk+of+wireless+and+mobile+technology&hl=en&gl=us&pid=bl&srcid=ADGEEShcsgs_t1p3InoPrVRj8zP9bLecXSi-GeXslZ2em5A76abYH3wtw3EyAynwG1QIqn-sTfizBnWbowmgKMnEW1nNIAyWWmbKv5ls8hI8s3juB4JhFQqZCsJkXdRKJPl GcjE0vBEP&sig=AHIEtbQZ9NmKUg9ECEV4V-xsKXD9QqgQwg Kim , D., & Solomon, M. (2012). Funsamentals of information system security. Ontario: Jones &Bartlett learning Canada.