Published: September 2, 2024

Is Your Practice Cyber-Secure?

Catch up on our Tech Talks series for invaluable tips that will help you protect patient health records and other sensitive data from bad actors.


Shutterstock 2458438177Medical practices face increasing risks from viruses, malware, and hackers as bad actors become more sophisticated and take advantage of the vulnerabilities inherent in storing and managing patient health records and other data. Safeguard your practice against cyberattacks by catching up on our Tech Talks series, which provides you with the fundamentals of digital security best practices.

Tech Talk

Tech Talk | Cyber Insurance: Alignment with Cybersecurity Best Practices
When was the last time you reviewed your cyber insurance policy? Significant changes have taken place within this segment of the insurance industry, most likely caused by the exponential growth of threats and losses from cyber events. According to Forbes, the healthcare industry faced a 755% increase in ransomware attacks in 2021. This article provides an update on what you need to know.

Tech Talk | Internet of Things (IoT) Cybersecurity: What You Need to Know
More devices are going online. From baby monitors to medical devices, it seems that everything is connected. You can’t buy a new heating, ventilation, and air conditioning (HVAC) system without the thermostat needing to be connected to your home Wi-Fi. With all this interconnectivity, how do you stay safe from hackers and protect the data that needs to be protected? This article provides practical guidance for understanding and protecting Internet of Things (IoT) devices. 

Tech Talk: User-Centric Cybersecurity Foundation
Cybersecurity is one of the most important and broadest topics in the technology management space. The defense in-depth approach has always been key. Regular software patches, firewalls, intrusion detection, network monitoring, and antivirus protection are some of the many landscape components to keep the bad guys out and sensitive information in. These preventive technology elements are vital, but full protection to prevent data breaches requires concentration on the end-user experience.

Tech Talk: A Framework for Combating Ransomware
For most practices, cybersecurity is not your highest priority. However, a single incident could be catastrophic. Hackers are starting to target small businesses since these organizations are perceived as softer targets, particularly for ransomware attacks. Ransomware encrypts your data until you pay the ransom for the encryption key. To combat the threat practical guidance is needed for managing your cybersecurity risks. At a high level, information security encompasses people, processes, and technologies and concentrates on how to protect the confidentiality, integrity, and availability of information.

Tech Talk: Protecting Data against Equipment Failure
Technology and cyberthreats are ever changing. This article highlights some standard operations you may want to consider employing related to the protection of on-premise servers against equipment failure. These are based on two key axioms: All systems will eventually fail, and single points of failure should be eliminated.



More from September 2024 – Vol. 43, No. 9