By now you have probably heard this and read it a thousand times. But one last time, we will cover it with some background on the whys and how’s.
Information Technology now dominates almost every part of our daily lives and in most cases, we do not have to think or worry the outcomes. We trust that what we input on our phones, keyboards and tablets will result in the right answer. With these repetitive motions it has allowed our business to grow and flourish. But what happens when those items break?
Over the last few years, cell phones have become computers, capable of much of the functionality that your office computer has. This is also true for small portable devices such as iPads, Windows and Android tablets. Are these devices and applications as secure as those you use from your clinic? In most cases, the answer is no.
Over the past several years the healthcare industry has become the number one target of cyberattacks. These attacks have exposed tens of millions of customers’ identities worldwide, costing an estimated $1 billion USD in losses.
January 14, 2020 is a special day for Microsoft Corporation (you know that little company that controls 82.88 percent of the computer software market share). On that date, Microsoft will end the life of some of the major software that businesses use. End of life means that the manufacturer will no longer support the product. This list includes:
National Cybersecurity Awareness Month was created in 2004 by the Department of Homeland Security and the National Cyber Security Alliance to remind us that each we all have the power to make the Internet safer.
Is your EHR application in the cloud or are you considering moving to a cloud based provider? If so ensuring that you know the providers processes for data backup, disaster recovery and overall security are extremely important.
According to the Ponemon Institute – www.ponemon.org - the average cost of a data breach was $3.62 million dollars. This breaks down to $141 dollars per stolen record. International Data Corporation – www.idc.com – estimates that globally data storage will grow ten-fold by 2025 total of 163 zettabytes (a trillion gigabytes) by 2025. Data is stored in a vast range of devices including your smart phone, laptops, notebooks, workstations, tablets and even on your smart TV. Most businesses focus on the technical aspects of how to avoid data breaches (firewalls, anti-virus, security patches, etc.) and often how physical technical assets are destroyed at the end of their life are often overlooked or do not have a set process in place.
You may not be getting all you can out of your browsing experience
and may be open to security risks!
Consider upgrading to the latest version of your browser or choose on below: