Listen

Description

Mobile devices are vulnerable just like your network, servers, laptops, and desktops. Your risk analysis should include checking on any types of messages, pictures, or access to your data that can be done on your smartphones. Even if you don't put PHI on them they may be able to be used against you in some way to crack your network and your PHI.

Patches

Encryption

MDM - Mobile Device Management

BYOD - Bring Your Own Device

Backup

If you lose the phone or it dies will you lose important things?  Figure out a backup plan but make sure it is properly secured too.

Unsecured WiFi and Bluetooth

Final Notes

Understand this is the new frontier for hackers. Ransomware and malware for smartphones are growing quickly