We all know that cybersecurity is an issue that each person and company (i.e. practice) needs to deal with. But how many of you have said...
Sound like you? I bet for most of you, it's hitting a bit close to home. It seems like in this world of medicine and business, there are so many other things... that we simply don't put a priority on cybersecurity. But you should.
Here are just some recent descriptions of various threats and attacks on health care facilities. Some are prepared. Some are not. What would an article say about your company if you were attacked by a hacker?
Cybersecurity is something that we all need to be concerned about. Regardless if we use our computers for casual use, business, fun, or all of the above, there undoubtedly are times when we need to enter usernames and passwords.
If you are like I am, I literally have a list of hundreds of passwords for various sites. The best practice is that you have a different password for each site. But that can be very hard to do. After a while, you just have a hard time even thinking up new passwords, let alone remember them. And beyond that, truly secure sites often require you to change your password every 60, 90 or 120 days. Use upper and lower case. Add a number or two. Then add in a few random symbols. Sheesh! When will it end?
Yes, creating and using complex passwords is good practice, and you should do it.
But there is a flaw in the...
Let's face it. Keeping up with data security is a pain...in the password.
There are SO many different ways that malicious people can hack into your system and cause havoc. Not just in being in your system, but potentially deleting, destroying, modifying and generally messing things up.
Such problems are not just inconvenient to your business, they can be huge problems, opening up your business to severe fines, penalties and censures. Security is no longer just a "nice" thing to do, it's the required thing to do.
In this article "7 common mistakes..." there are several items that should be done for ALL I.T. installations, not just your business. These are also equally applicable to your personal networks.
In addition to the items listed in the article, there are several others that should become part of your routine I.T. security that I have come up with. Do you have others? If so, share them below...
1. If...
50% Complete
Thanks for your interest. Once you enter your first name and email, be sure to check your email and complete your opt-in. While you are at it, be sure to "white list" emails from WhiteCoatRiskManagement.com
Thanks!
Why do we do a double opt-in? Because we want to provide you with that extra degree of security.