Billing_MarApr15_12

Billing_MarApr15

mation about particular vendors and the way in which they are paid. If someone who was intentionally trying to gain information about this business sat where I was, the consequences could be notable. What if, for example, a person with ill intent removed the tablet while the owner slept? That person could make a transfer of funds or a bill payment to a fraudulent recipient. Users of mobile technology must maintain control of the devices they use at all times. They also must be aware of the venue in which they are using their smartphones, tablets, and laptops, because the presence of prying eyes and enormous ears is a very real possibility and is therefore a concern. Further, this could potentially be a HIPAA violation if patient data was visible on the device Organizations should have mobile security policies in place and processes to implement them. in use. People should just take a few moments to verify the security of the location in which they choose to use their devices. What Types of Devices Are Available? Vendors have been actively updating both hardware and software during this past year. Whether you choose Apple iPhones and iOS, Android phones from a variety of manufacturers, Blackberry, or Windows phone options, you’ll discover new hardware and new operating systems. Likewise, tablets including the iPad, Android, and Windows options have all had hardware and software updates. Apple has increased the size of its phones, with both the iPhone 6 and 6 Plus sporting new 4.7-inch and 5.5-inch screen sizes. Security may have become simpler with fingerprint identification included on these products, as well as on the iPad Air 2 tablet. The biggest innovation in iOS 8.1 is the arrival of Apple Pay, which promises to be a contender in near field communication (NFC) payment options. You can expect vendors to incorporate these payment options into encounter systems because of their ability to integrate so many payment sources. Further, the security of the payments are good, while convenience is excellent. With the October 1, 2015, requirements of EMV (Europay, MasterCard, and Visa) chip compliance, payment systems will be radically changed over the next year. Remember to work with your billing clients, and your own firm, to ensure compliance so the bankcard issuer retains the liability on any credit card payment, instead of you, the acquirer. 12 HBMA BILLING • MARCH.APRIL.2015 The Android operating system is transitioning from version 4.4 to 5.0 with a number of convenience and security improvements. For example, if you receive a call from a number not in your contacts, your phone will look for matches from businesses with a local listing on Google Maps. The supporting hardware, such as the Samsung Galaxy S5 or the Samsung Galaxy Note 4, are providing larger screens, with faster processors. Motorola/Google/Lenovo is making similar hardware improvements in the Android lineup. Remember that Android features and operating systems vary widely by manufacturer and product. Even though Blackberry no longer dominates the corporate world, their operating system and the Blackberry Enterprise Server (BES) is still the most secure mobile operating system available without using MDM. Further, BES has been updated to support iPhones, Android, and the Windows operating systems. Blackberry introduced new hardware recently, as well. You will find new options in the Windows platform with the Nokia Lumia family, specifically the 1525. With Windows 8.1 mobile, and the arrival of Windows 10 in 2015, we will see the portability of apps between the desktop/laptop and the mobile devices. Protect Yourself Moving Forward Because of the growing use of and dependence on mobile devices, the amount of information stored and accessed by these units is increasing. This makes them a more interesting target for those with nefarious intent. Because this is the case, you should protect both the devices and the content they deliver. Organizations should have mobile security policies in place and processes to implement them. Individuals need to exercise due diligence to make sure the mobile devices they carry are as secure as possible. ■ Randy Johnston is the CEO and cofounder of Network Management Group, Inc. He and his NMGI team provide IT consulting services and recommendations to HBMA members as a membership benefit. If you have questions on any hardware, software, procedures, or IT strategies for your firm, contact helpdesk@nmgi.com.


Billing_MarApr15
To see the actual publication please follow the link above