Healthcare Security & Compliance Services
Why Healthcare Security?
Nearly all of today’s healthcare data is generated, conveyed, collected, and stored digitally. As a result, rigorous information security and data privacy practices are extremely vital to the survival of any healthcare organization.
The compromise of healthcare information has been proven to be more harmful than the compromising of credit card information. Hence the need for extreme security measures for patient and provider information held electronically in healthcare IT systems is critical.
At Core Mobile, we partner with you to understand your organization, it’s compliance requirements, security needs, and technology infrastructure. We are uniquely equipped to assist both large and small healthcare organization through the intricacy of healthcare operations, healthcare regulation, and healthcare privacy.
Core Mobile’s healthcare security practice is driven by its founder who has extensive experience in the security industry at Citrix Systems, Nokia/Check Point, Netscreen Technologies, and Juniper Networks; in addition to experience at HP, Motorola, AT&T Bell Labs, and Unisys.

We can assist with:
- HIPAA/HITECH/FIPS Risk Assessments
- HIPAA/NIST Security Standard Gap Analysis
- Network Infrastructure Assessments
- Wireless/Mobile Device Susceptibility Assessments
- Firewall Reviews
- Third Party Vendor Risk Assessments
- Disaster Recovery and Business Continuity Planning
- Meaningful Use (MU) Risk Assessments
- Enterprise Risk Management
HIPAA Certified
- Password protection – requires strong password use.
- Data encryption during data transfer to and from mobile device.
- Messages stored on a HIPAA certified cloud from Rackspace or IBM.
- Logs of messaging events and time stamps stored on a HIPAA certified cloud from Rackspace or IBM.
- Only those staff members assigned to a particular patient can view the communications.
- Corey™ detects accidental patient name entry and makes it anonymous.
Security Features
- Logout wipes all information from mobile device – information only accessible after further login.
- Automatic logout of users after 15 min of inactivity.
- Automatic logout when leaving work location.
- User can only be logged into one device at any time.
- Automatic account lock out of Corey™ after 3 failed password attempts.
- Reactivation after account locks out by Administrators.
- Administrator resetting community each day deletes messages
- Administrator can disable an account and all information deleted immediately
How is Core Mobile Being Utilized Today?
“The initial study using paper charting took in total about 14 months to complete. Whereas the same study using Core Mobile software took about 16 weeks to complete and present at a conference."
“The use of the CoreyPatient™ mobile app has not only improved our patient pre-surgical instruction compliance, reduced cancellations, and increased throughput; but it has also enhanced our post-surgical follow-ups to advance overall patient satisfaction and patient outcomes. I would highly recommend CoreyPatient to any surgery center who wishes to bring their facility to the next level of efficiency and patient engagement.”
“Epic training takes 8 hours initially and a 2 month "go live" period with Epic trainers in the hospital with you. Compared to that, anyone who can send a text and use a simple smart phone app can use CoreMobile apps after 30 minutes.”
“Core Mobile addresses a gap in delivering useful content to end users of cloud-based services with a technology that identifies the most relevant subset of content, correlates it across multiple sources, and delivers it via a user-friendly interface that fits the small display of a smartphone – all in real time.”