This article highlights some things you can do to make sure your system users can recognize intrusion dangers from other sources like email and malicious links.
This article highlights some things you can do to make sure your system users can understand intrusion risks from other sources like email and malicious links.
Whether your organization is a covered entity or business associate, the HIPAA umbrella casts a long shadow. Information breaches bring strong sanctions, even in the “Unknowing” category–with a maximum of $50,000 per violation up to $1.5 million annually. The fines and administrative penalties following a hack or unauthorized discloser are somewhat akin to receiving a traffic ticket following an accident that totals your vehicle after you have loaned it to an inexperienced driver.
Security measures are only the beginning
Your personal health record data is undoubtedly protected in secure servers. You employ malware and virus protection, because you know just how valuable medical records are to the cyber underworld. So the protection may be in the engine, but what about the users at the wheel?
Cyber attacks don’t always depend on backdoor intrusions through vulnerable websites or Internet browsers. For example, this LA Times online story chronicles how 108 county employees opened a phishing email and provided user names and password to their accounts, “some of which contained confidential patient or client information…”
Yes, county officials said “they have strengthened security measures…and enhanced employee training…” but that is scant consolation to the 756,000 people whose names, addresses, dates of birth, Social Security numbers, financial information and medical records ended up in the hands of a Nigerian scammer.
User Training is essential…
So protecting files is not the same thing as protecting access to them. The LA County incident illustrates several points made in this Health IT Security.com online article by Bill Kleyman:
End-user awareness of underlying security is no more complicated than learning how to identify the threats. Kleyman advises educating employees in what they should not do, i.e.:
In the do category, Kleyman recommends:
How Where To Start can help
Looking for help with cyber security and training for your employees in San Francisco? Contact us at firstname.lastname@example.org
to learn more, or call us at
Privacy: We will keep your information safe and
will not be given to third parties!
Business UP And Running
Is One Of Our Key Goals
Fill in the form below to get started.
Privacy: We will keep your information safe and will not be given to third parties!