Information Managers
  • Home
  • Services
    • All Services
  • Templates
  • Blog
  • Contact Us
  • Practice Management Success
  • Podcasts

What Healthcare Providers Need To Know About Computer Security And Standards

Posted on April 28, 2020 by Meghan in Blog

Do you see cyber and privacy incidents in the news – and worry that your computer system is at risk?

Are you overwhelmed with managing your computer network by yourself?

 

Jon Harmon knows that healthcare providers need to have strong computer security and standards.   

Jon shares his tips about computer security and standards that every healthcare provider needs to know.

Jon Harmon is my guest expert on Practice Management Nuggets For Your Healthcare Practice.

 

Jon Harmon's #1 Tip to Healthcare Providers and Vendors

Keep your systems up-to-date! Click to Tweet

My Favorite Takeaways From The Podcast

  • When using WiFi connections, always keep devices with confidential information connected to a separate private network – this helps mitigate the risk from outside threats.
  • Keep you computer systems up-to-date.
  • Have a regular off-site backup of your data.
  • Always accept regular updates to all network devices.
  • Don't let hardware run past it's recommended lifecycle.
  • Regularly update yourself and your staff on computer security.
  • Have siloed permissions on data on a need-to-know basis.
  • Don't rely on one person – great computer security needs a team!

Featured Guest: Jon Harmon

Accounts Manager, TRINUS

Jon joined TRINUS as Accounts Manager in October, 2017.

He likes to challenge himself in new and exciting opportunities in the Technological world. Jon loves being a husband and a dad. He’s passionate about Martial Arts and is also an avid historian of all incarnations of Punk Rock, Classic Rock and Alternative Rock.

Visit the Trinus Technologies website!

 

 

Be sure to tune in to my interview with Jon Harmon,

What Healthcare Providers Need to Know About Computer Security and Standards | Episode #087

 

Listen To The Podcast Here
#PracticeManagementNugget, computer security, cyber aware, cyber security, healthcare, information technology, podcast

What Are You Doing to be More Cyber Aware?

Posted on October 3, 2017 by Jean Eaton in Archive

Did you know

  • 44.2% of cyberattacks in Canada targeted the service sector and, most frequently, the business services and health care sectors in 2016.
  • 80% of all privacy breaches are caused inside the business.
  • Most of these breaches are the result of error or mistakes by employees.
  • 60% of small and medium business owners go out of business within 6 months after a privacy and security breach. 

What are you doing in your business or home to be more cyber aware?

October is Cyber Security Awareness Month and Information Managers is celebrating by hosting their annual 15 Day Privacy Challenge.

This is the perfect way for businesses, employees, and their families to make small changes easily to improve the privacy and security of their information right away!

The 15 Day Privacy Challenge starts October 15th, for fifteen days.

Each challenge includes a privacy and security tip, a short description about why this tip is important, how to get started, and links to additional resources. Each challenge will take approximately 15 minutes to complete.

At the end of the challenge, you will receive a printable certificate of completion. Successful challengers might also find that this qualifies for CPE credits, too!

If you have been wondering what you can do to improve your privacy and security program, provide great training to your employees and save time, money and your reputation, you won’t want to miss this!

Register right away while this is fresh in your mind! You won’t want to miss a single one!

Register Right Away!

 

[s3vpp id=76e578bab4abbf657a26f7a48ce65d47]

#15DayPrivacyChallenge, #CyberAware, 15 Day Privacy Challenge, cyber aware

What is the elephant in the room?

The Elephant in the Room Find out here...

 

Privacy Policy

 

“This was my first ever time I had to work on a PIA and I was a little nervous about doing it efficiently - but you really made it as simple and straight forward as possible. Thank you for being available for my questions when I had them. I would easily recommend Privacy Impact Assessments to Protect Your Practice course for anyone to do their own PIA's! Thank you so much!”

- Karen Sarabura, Clinic Manager and Privacy Officer, CGA Medical Imaging, Alberta

Register for Free On-line Privacy Breach Awareness Training!

Privacy Policy

Copyright 2023 Information Managers Ltd.

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}