Information Managers
  • Home
  • Services
    • All Services
  • Templates
  • Blog
  • Contact Us
  • Practice Management Success
  • Podcasts

Making Passwords Secure in Your Healthcare Practice

Posted on April 14, 2016 by Jean Eaton in Archive

In this FREE 30-minute Practice Management Nugget Webinar with Dovell Bonnett you will learn how to fix the weakest cybersecurity link  in your healthcare practice.

 

Dovell Bonnett, “The Password Guy”, corrects the errors, misconceptions and lies about passwords

3dTransparent

Dovell will explain why password management is the key component of managing the cybersecurity of your healthcare practice.

You need to understand how to properly implement reasonable cyber safeguards to:

  • protect your businesses from cyber-attacks
  • free individual computer users from cumbersome security policies, and
  • put IT administrators back in control of their networks

Have you seen this?

  • post-it notes on computer monitors with the password written on it
  • computer users sharing the same credentials
  • passwords that are easy to guess

 

“Expensive backend cybersecurity products are worthless when the virtual front door has a lousy lock!”

Dovell Bonnett

The management of passwords is the real security nightmare.

User authentication is the most ignored risk to enterprise cybersecurity. When end users are allowed to generate, know, remember, type and manage their own passwords, IT has inadvertently surrendered the job title Network Security Manager to employees – the weakest link in the cybersecurity chain.

Dovell Bonnett reveals the truth about the elephant in the room that no one wants to mention: Expensive backend security is worthless when the virtual front door has a lousy lock! Making Passwords Secure breaks down THE SIMPLE TRUTH about Multi-Factor Authentication (and how to make MFA fast, easy and affordable)!

Dovell proves that making passwords secure is not only possible, passwords can actually become an effective, cost efficient and user friendly feature of robust cybersecurity. After examining how encryption keys are secured, this book introduces a new strategy called Password Authentication Infrastructure (PAI) that rivals digital certificates.

Passwords are not going away.
What needs to be fixed is how passwords are managed.

Register here for the FREE Webinar with Dovell Bonnett.

Email Address




Dovell - smallDovell Bonnett has been creating computer security solutions for over 20 years. His passionate belief that technology should work for humans, and not the other way around, has lead him to create innovative solutions that protect businesses from cyber-attacks, free individual computer users from cumbersome security policies, and put IT administrators back in control of their networks.

He has spent most of his career designing solutions to solve business security needs, incorporating multiple applications onto single credentials using both contact and contactless smartcards. The most famous example of his work is the ID badge currently used by all Microsoft employees.

Dovell has contributed to numerous papers for the Smart Card Alliance organization; magazines, including Card Manufacturing Magazine; and is the author of two books, Online Identity Theft Protection for Dummies® and Making Passwords Secure: How to Fix the Weakest Link in Cybersecurity. Dovell is a frequent speaker and sought-after consultant on the topic of passwords, cybersecurity, and building secure, affordable and appropriate computer authentication infrastructures.

 

Thursday, April 21, 2016

 Join us for Practice Management Nugget Webinar

Making Passwords Secure with

Dovell Bonnett

Email Address



hosted by Jean Eaton of Information Managers Ltd.

Your Practice Management Mentor and Practical Privacy Coach

cyber security, Dovell Bonnett, Multi-Factor Authentication, password management, Practice Management Mentor, privacy, Report this, security

May 17 2016 Practice Management Q&A

Posted on April 13, 2016 by Jean Eaton in Archive

Replay for Members only

Recorded Live Tuesday, May 17, 2016 at 10:30 am MDT

Welcome to May's live Practice Management Q&A with Jean Eaton, Your Practice Management Mentor.

Below you will be able to view the presentation, hear the audio, and participate in the chat and ask questions.

May Q&A topics include:

Does a custodian who also owns the clinic need to complete a confidentiality oath?

What are the fines if an affiliate does not report a privacy breach to a custodian?

What if I'm working for a custodian and they don't report a privacy breach?

Send your questions about practice management, human resources issues, clinic management best practices, procedures, resources, practical privacy tips and more!

 

Have a question?

Send an email to Jean at jean[at]informationmanagers dot ca.

 

 

Resources – Confidentiality Oath Custodians Physicians Resources – Confidentiality Oath Affiliates Employees

 

Are you a member of the Information Managers Network?

You can access all the replays from your membership account.

 I'm a member of Information Managers' Network

Not a member, yet? Become one today!

I want to know more about being a member of Information Managers' Network

 

Resources

Practice Management Q&A series is hosted by Jean Eaton (Your Practice Management Mentor) of Information Managers Ltd.

clinic management, Practical Privacy Coach, practice management, Practice Management Mentor

Business are Victims of Economic Crime and Fraud

Posted on March 14, 2016 by Jean Eaton in Blog

March is Fraud Prevention Month

40% of Canadian organizations reported that they were victims of fraud in the last two years. This includes asset mis-appropriation, procurement, and cyber fraud, as reported on CanadaAM on March 9, 2016 interview with Lori-Ann Beausoleil, PWC Canada.

Ophthalmology Business article, ‘6 Ways To Curb Employee Theft‘  includes tips that physicians and administrators can do to curb the risk of theft.

  1. Vet your employees
  2. Track inventory
  3. Let employees know that you are concerned about fraud
  4. Separate financial-related duties
  5. Out of sight, out of mind
  6. Use electronic health records (EHR) to your advantage

Read ‘6 Ways To Curb Employee Theft‘ to see all the suggestions by Jean L. Eaton, Steve Dawson, Jodie Boxe in this article by Vanessa Caceres.

For more suggestions on how to manage risks especially when your staff work alone, see my interview with Dave Rodwell, ‘Do Your Staff Work Alone?'

There are many things that you can do to prevent fraud in your healthcare practice. Being aware of the risk is your first step.

corporate security, Dave Rodwell, fraud prevention, health care, healthcare, incident plan, Jodie Boxe, ophthalmology, Practice Management Mentor, Practice Management Nugget, risk management, security, Steve Dawson, Vanessa Caceres, work alone

April 12 2016 Practice Management Q&A

Posted on March 8, 2016 by Jean Eaton in Member QA

Recorded Tuesday, April 12, 2016 at 10:30 am MDT

Welcome to April live Practice Management Q&A with Jean Eaton, Your Practice Management Mentor.

Below you will be able to view the presentation, hear the audio, and participate in the chat and ask questions.

April Q&A topics include:

  1. Another healthcare provider intended to send us a fax about our patient. The fax went to a different business. Who is required to report this privacy breach?
  2. When do we need to tell a patient that their information was breached?

Have a question?

Send an email to Jean at jean[at]informationmanagers dot ca.

 

 

 

Are you a member of the Information Managers Network?

You can access all the replays from your membership account.

 I'm a member of Information Managers' Network

Not a member, yet? Become one today!

I want to know more about being a member of Information Managers' Network

 

Resources

Practice Management Q&A series is hosted by Jean Eaton (Your Practice Management Mentor) of Information Managers Ltd.

clinic management, Practical Privacy Coach, practice management, Practice Management Mentor

March 08 2016 Practice Management Q&A

Posted on March 7, 2016 by Jean Eaton in Archive

Tuesday, March 08 at 10:30 am MDT

Welcome to March live Practice Management Q&A with Jean Eaton, Your Practice Management Mentor.

Below you will be able to view the presentation, hear the audio, and participate in the chat and ask questions.

March Q&A topics include:

  1. We live and work in a small community. How can we handle our employee's personal health records? Our
    employee's family members come to this clinic, too. What additional safeguards can we use to protect the
    confidentiality of these records?
  2. Patient access requests.

Have a question?

Send an email to Jean at jean[at]informationmanagers dot ca.

Webinar will start in

 

Are you a member of the Information Managers Network?

You can access all the replays from your membership account.

 I'm a member of Information Managers' Network

Not a member, yet? Become one today!

I want to know more about being a member of Information Managers' Network

 

Resources

Practice Management Q&A series is hosted by Jean Eaton (Your Practice Management Mentor) of Information Managers Ltd.

clinic management, Practical Privacy Coach, practice management, Practice Management Mentor

Are They Watching You?

Posted on January 30, 2016 by Jean Eaton in Blog

Smart appliances may be too smart for our own good. Take smart TVs, for instance. As this article illustrates, some of these new appliances are particularly vulnerable to hackers. Once compromised, the TVs allow access to account information, including login credentials (which owners may use for access to more than just their smart-TV account).

Even scarier, hackers could gain access to front-facing cameras to see everything happening in the room where the TV is connected. Instead of you watching your favorite program, criminals may be watching you!   This may also apply to Skype webcams, X-box and other games with webcams (Kinect, Wii, PS, etc), laptops and security cameras.

Once the machine is compromised, hackers can stealthily activate its front-facing camera (available on higher-end smart TVs), hijack a Samsung account, steal credentials by presenting fake login pages and infect other applications on the TV with malware.

Your App is Watching

When you download an app, it tells you it can work better or give you personalized offers or other things you might like if you switch Location Services on. For example, a dining recommendations app might offer you a coupon when you walk past a restaurant. Are there other types of apps that might want your location? What types of offers would make it a worthwhile exchange for you? Do you think this is useful or Creepy? For more examples, see “Helpful or Creepy? The Creep-O-Meter Could Help You Find Out” and try the ‘Creep-o-Meter’ activity.

Tools and programs like the Creep-o-Meter can help digital citizens be more privacy aware and own their online presence. Remember these STOP. THINK. CONNECT. tips when you use social media, play online games and engage with other technology platforms and tools.

  • Share with care: what you post can last a lifetime: Before posting online think about how it might be perceived now and in the future and who might see it.
  • Learn about and use privacy and security settings on your favorite online games, apps and platforms.
  • Be aware of what’s being shared: Be aware that when you share a post, picture or video online, you may also be revealing information about others. Be thoughtful about when and how you share information about others.
  • Personal information is like money. Value it. Protect it. Be thoughtful about who gets your personal information and how it’s collected through apps and websites.

Tip:  When you are not using the webcam, unplug it!

How many times a day are you handing over your information?

How many times a day are you handing over your information?

Instructions

  • Use a hard wired LAN connection from PC to Smart TV – often more secure than using wireless networking (as wireless is often not installed securely, either).
  • Unplug the Ethernet cable and/or delete the wireless network connection settings.
  • Put tape over the camera and inbuilt mic if included, and put a blank 3.5″ plug into any mic input sockets.
  • Don't allow your Smart TV access to any other devices on your network (laptops, PCs, smartphones, tablets).
  • Don't log in from your TV to any websites that have sensitive information
  • DON'T re-use passwords on any other sites, especially not high-value sites like banking or email.

Resource

Privacy for Everyone: Closing the Gap Between the Privacy-Have's and the Privacy Have-Nots  Address by Patricia Kosseim, Senior General Counsel and Director General, Legal Services, Policy and Research Branch, (June 2014)

Rebecca Herold (a.k.a. The Privacy Professor) for more tips.

‘Technocreep' author says new technologies have been invading our privacy like never before , CBC interview, The Current with Anna Maria Tremonti and Tom Keenan

WeLiveSecurity. ESET 10 Steps to Staying Secure on Public Wi-Fi. 2015-Sep-02

#PrivacyAware, Data Privacy Day, Internet of Things, IOT, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security, smart appliances

Is Your Email Secure?

Posted on January 29, 2016 by Jean Eaton in Blog

Is your email secure? Backed up? If you suddenly lose your email, calendar, or contact list, this could either be a speed bump in your busy day, or a nightmare that may take days or weeks and a lot of money to recover.

If you use email as temporary communications or your primary method of business, it needs to be managed securely. When you or your staff use email from multiple devices – such as your desktop computer, smart phone, or website – you have additional privacy and security requirements.

Whether you use your email as temporary communications or your primary method of business, it needs to be managed securely. Many small businesses have purchased an email software system like Outlook as part of their desktop software.

If you use free email accounts – like gmail or yahoo – emails, calendars, and contact information are on the public cloud where it is accessible from any internet connection. Of course, it then becomes difficult to back up to a local device that you can control.

If you are an employee or business owner, if you use email for business –  employee records, business contacts, company newsletters, subscriptions, financial or consumer purchases, or personally identifying messaging –  you need to meet privacy and security requirements. Make sure that you keep separate email accounts for your business emails and your personal emails.

Having sensitive information in your emails makes it vulnerable to attack, and it could leave you, your clients, and your employees, open to identity fraud.

Tip: Consider using a hosted email service, where your emails would be backed up, protected, and accessible.

Instructions:

  • Make sure that you have an email account for your business and a separate email account for your personal life.
  • Confirm your backup plan for your email accounts. If you don't have one, create a plan.
  • Do a test restore of your email account – did it include everything that you need – including your calendar, contacts, and all of your folders?

 

Resources:

There are many features offered with a hosted email service. See our blog post Is a Hosted Email Solution For You? for additional details including things to look for in a hosted email solution vendor.

 

DPD Champ badgeWe are proud to be a Data Privacy Day Champ!
You can be one too! #PrivacyAware

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

 

Register Here – Don’t miss out on this free E-course!

#PrivacyAware, Data Privacy Day, Email security, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security

Own Your Online Presence This Data Privacy Day

Posted on January 29, 2016 by Jean Eaton in Blog

“Johnny Smith: Epic night! Arrested for being drunk by a cop on a horse!”

“Bill likes this”

Boy, that sounds like a fun night. Except, of course, when Johnny's boss sees this in the morning after Johnny didn't come into work. Uh oh.

Social media can be great – we can connect with long lost friends and relatives, share photos and ideas, and learn about news and events. But what we post can have serious ramifications, for ourselves and others, and can remain on the internet indefinitely. What we think is funny at the moment may prove embarrassing in time to come.

 

DPD_NCSA_US_Consumer_Privacy_Index_2016_smallAccording to the research study “Consumer Privacy Index 2016” from TRUSTe and National Cyber Security Alliance, consumer privacy concern levels are rising quickly:

  • 68% of consumers listed not knowing how their personal information is collected online as a top concern
  • 45% of respondents are more worried about their online privacy than they were just one year ago
  • 74% have limited their online activity in the last year due to privacy concerns

Tip – Limit the amount of personally identifying information you share, and adjust your privacy settings.

Instructions

  • Set your privacy preferences to only friends to see your profile.
  • Regularly check on these settings, as some social network sites make changes without notifying you. Here are instructions for many of the popular products and services.
  • Do not use information that is often used as security identifiers, such as your full name, date or birth, or mother's maiden name.
  • Always ask yourself – “Is this information I wouldn't mind an employer seeing?”
  • Don't reveal your location online. It tells people where you are – but also where you're NOT, signifying that your home may be unoccupied and a potential robbery target.
  • Download, print, and discuss the Consumer Privacy Index 2016 Infographic from TRUSTe and National Cyber Security Alliance.
  • Watch this video from StaySafeOnline

Resources

Office of the Privacy Commissioner of Canada. Protecting your Privacy Online Frequently Asked Questions. 2011-May-06

STAYSAFEONLINE.org How to Own Your Online Presence infographic

See all the Data Privacy Day E-course resources posted each day on our website.

DPD Champ badgeWe are proud to be a Data Privacy Day Champ!
You can be one too! #PrivacyAware

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

 

Register Here – Don’t miss out on this free E-course!

#PrivacyAware, Data Privacy Day, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security, social media

How You Can Be a Password Pro

Posted on January 28, 2016 by Jean Eaton in Blog

Passwords. Can't live without 'em, can't even remember all of 'em.

Just about everything needs a password these days. From your email address to your social media accounts, to your online banking and to your smartphone.

But is your password uncrackable?

Hack-proofing your passwords is absolutely essential, especially if you run a business. Small businesses are major targets, with more than 80% being targets of opportunities.

A University of Cambridge study found that 90% of passwords are hackable. Try to make your passwords in the 10% of uncrackable passwords.

Your accounts are only as strong as your weakest link!

Easily improve your password with a password management tool like 1Password, LastPass, Dashlane, McAfee SafeKey and many more to choose from.

As a healthcare provide and /or business owner, you are responsible for not only your personal passwords but also ensuring that all your staff and vendors are also using strong (and really long!) passwords. Doing this for each application for all your internet devices can be nearly impossible. Instead of using the same password in many applications, writing down the logins and password or skip using passwords altogether – it is time for you to use a Password Manager tool.

Password Management_Information_ManagersUsing these tools will:

  • make it easy for you to create and use strong passwords
  • generate complex passwords for you
  • no problem to change your password regularly
  • some will even make it easier for you to create a secure sharing of login and password to an assistant
  • make it easier for your team to easily use good password management

Tip: Don't get frustrated whenever you forget your password. Instead, be proud that you change your password regularly using the “I forgot my password” re-set function!

  • Use your business passwords for work only. Don't reuse your work password on an external website, email, or bank account. Don't use the same password for all your social media accounts.
  • Avoid predictable and common passwords. Choose a phrase that you can remember, and add in the required characters – capital letters and numbers. You can try removing the vowels of easy to remember words (i.e. privacy = prvcy)
  • Use more characters. The longer the password, the harder it is to crack!

For more information see our blog post &Tgh2Crack! How tough is your password

Resources

Rubenking, Neil J. @neiljrubenking The Best Password Managers for 2016, PC Magazine. 2016-Jan-08

Davis, Gary. Password Safety in a Connected World,  McAfee Blog Central. 2013-May-06.

DPD Champ badgeWe are proud to be a Data Privacy Day Champ!
You can be one too! #PrivacyAware

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

Register Here – Don’t miss out on this free E-course!

#PrivacyAware, Data Privacy Day, password management, passwords, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security

10 Ways You Can Create Awesome Meetings

Posted on January 25, 2016 by Jean Eaton in PMN Replay, PMN Stitcher, Practice Management Nugget Interview

In this FREE 30-minute Practice Management Nugget Webinar with Professional Meeting Facilitator Gord Sheppard that explains 10 Ways You Can Create Awesome Meetings… and YOU are invited!

If you attend meetings or lead meetings and you want practical tips that you can use right away to make meetings more productive and profitable then you need to register for this webinar right away!

Recorded Live on Thursday, January 28, 2016

 Join us for Practice Management Nugget Webinar

10 Ways You Can Create Awesome Meetings

“10 Ways You Can Create Awesome Meetings” is an entertaining and informative presentation by Professional Meeting Facilitator, Consultant, Speaker, Instructor and Author, Gord Sheppard. Based on his experience in more than 2000 meetings, Gord offers funny stories and practical information that will help you to take action and create awesome meetings that are more productive and profitable!

On this interview you are going to hear Gord's Top 10 Ways You Can Create Awesome Meetings including

  • how to estimate the total cost per hour of your meetings, so that you can then make every second count
  • take responsibility for your own actions during a meeting is one of the most powerful ways to improve the meeting
  • techniques that you and your colleagues can use to build trust with each other so you can make your next meeting more productive
  • how to assess your current meeting facilitator, and then figure out a few ways to help them become more effective
  • how to link every meeting to your organization strategy
  • how to build a blockbuster agenda that everyone can get excited about

and MORE!

10 Ways To Create Awesome Meetings – E-Book

 

Changing The World, One Meeting At A Time.

What other people have to say about Gord Sheppard

“Over the years, I have been part of numerous planning sessions, but I have to say that Gord’s ability to get straight to the point and see through all of the cloudiness is inspirational. He has an uncanny gift of being able to read individuals and situations, while bringing out their best in a very short amount of time. He helped us to produce great results that are truly actionable.”
Cynthia Annett, Board Chair
Special Olympics Edmonton

“Having gathered a group of smart and powerful people to consult on a potential new project, I was nervous; these were not people with time to waste. I put my trust in Gord to create a meeting that would make good use of the time they were spending in the room that day, and he did not disappoint. Somehow, he simultaneously fostered a relaxed and casual atmosphere while keeping us on topic and on schedule. He ushered us through an extremely productive and rewarding conversation but never gave us any feeling of being controlled or overly formal. Not only did we accomplish our objectives, several of my attendees commented to me afterwards on the quality of the meeting and the facilitation. I’m grateful to have had Gord in my corner that day.”
Nadine Riopel
Facilitator and Community Organizer

Gord Sheppard 228x300

 Gord Sheppard

Gord Sheppard is a Professional Meeting Facilitator, Consultant, Speaker and Author at Create Awesome Meetings who can help you create more productive and profitable meetings. During his 25 years of work experience Gord has facilitated, run and participated in more than 2000 meetings and he has lived to tell the tale!

Gord's formal training includes a Masters in Business Administration from the University of Alberta, a Bachelor's Degree in Drama from Queen's and Prosci Change Management Certification. With his combined skill set Gord offers a people-centred facilitation approach that can help you make your next meeting awesome!

create awesome meetings, effective meeting, effective meetings, facilitation, facilitator, Gord Sheppard, meeting, Meetings, Practice Management Mentor, Practice Management Nugget

12345

Search the site

What is the elephant in the room?

The Elephant in the Room Find out here...

Privacy Policy

Thank you so much for the webinar [on Privacy Breach]. It was very informative and thought provoking.

- Sheryl McCormick, Executive Director, Cold Lake Primary Care Network

Register for Free On-line Privacy Breach Awareness Training!

Privacy Policy

Copyright 2022 Information Managers Ltd.

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}