Dan Meacham, security information officer for Baylor Health Care System, answers readers' questions about wireless security. The HIPAA security rule gives you some flexibility on how you interpret and implement reasonable controls to protect the data. However, there is another side to the wireless HIPAA question, and that would be protecting the data at rest on the wireless device. Our organization considers wireless technology a business and productivity enhancement, as well as a significant exposure. To this end, Baylor has integrated additional controls to help ensure the secure transmission and authorized access to the wireless infrastructure. Q: Have you seen wireless local area networks as targets of attacks?A: Absolutely. Two words: war chalking. It’s also possible that someone could create a denial-of-service attack by disrupting your WLAN…but then, someone would probably notice that. In the past two years, we have seen an increase of media awareness with retail and corporate wireless networks that were left open. The key threat or exploit of a WLAN is access to resources and information. Competitors may have access to data or better yet, someone may use your network to make a phone call. I remember reading about a team on the West Coast that bought an IP telephone service, registered the number as an East Coast number and placed calls to its security teams using open WLANs across the state. The scary part of the story was that the security teams had no idea as to where the calls were coming from (most of the time, it was from a car).Q: How are you incorporating wireless technology in the hospital setting? A: Our organization has integrated several pilots and production wireless capabilities with multilayered security controls. For example, BlackBerry devices require a password to unlock them, strong encryption, and have a feature that allows us to remotely destroy the data if they are lost or stolen. Our Voicera deployment runs wireless voice over IP on a virtual LAN. And the WLAN has several additional security protocols running on top of the standard device capabilities. Apart from the standard forms and agreements, our team communicates and educates security awareness to the user; as these devices are distributed, the deployment team reviews the user’s responsibilities and accountability. Q: Do you allow “nonowned” wireless devices to authenticate to your network?A: No, we do not allow nonowned wireless devices to authenticate to our network. At times, we have allowed contractors to physically connect to a trusted network segment after their systems have been certified or reviewed by our field support team, and after we verify that the systems meet our security standards. If a system does not meet our standards, temporary licenses are issued to install our standard security software. In all cases, a confidentiality agreement and a “Rules of Behavior” must be signed. Furthermore, there is an employee who is accountable for the actions of the contractors. Related content news UK businesses face tightening cybersecurity budgets as incidents spike More than a quarter of UK organisations think their cybersecurity budget is inadequate to protect them from growing threats. By Michael Hill Oct 03, 2023 3 mins CSO and CISO CSO and CISO C-Suite news Cybersecurity experts raise concerns over EU Cyber Resilience Act’s vulnerability disclosure requirements Open letter claims current provisions will create new threats that undermine the security of digital products and individuals. By Michael Hill Oct 03, 2023 4 mins Regulation Compliance Vulnerabilities opinion Cybersecurity professional job-satisfaction realities for National Cybersecurity Awareness Month Half of all cybersecurity pros are considering a job change, and 30% might leave the profession entirely. CISOs and other C-level execs should reflect on this for National Cybersecurity Awareness Month. By Jon Oltsik Oct 03, 2023 4 mins CSO and CISO Careers feature The value of threat intelligence — and challenges CISOs face in using it effectively Knowing the who, what, when, and how of bad actors and their methods is a boon to security, but experts say many teams are not always using such intel to their best advantage. By Mary K. Pratt Oct 03, 2023 10 mins CSO and CISO Advanced Persistent Threats Threat and Vulnerability Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe