Information Managers
  • Home
  • Services
    • All Services
  • Templates
  • Blog
  • Contact Us
  • Practice Management Success
  • Podcasts

Making Passwords Secure in Your Healthcare Practice

Posted on April 14, 2016 by Jean Eaton in PMN Replay, PMN Stitcher

In this FREE 30-minute Practice Management Nugget Webinar with Dovell Bonnett you will learn how to fix the weakest cybersecurity link  in your healthcare practice.

 

Dovell Bonnett, “The Password Guy”, corrects the errors, misconceptions and lies about passwords

3dTransparent

Dovell will explain why password management is the key component of managing the cybersecurity of your healthcare practice.

You need to understand how to properly implement reasonable cyber safeguards to:

  • protect your businesses from cyber-attacks
  • free individual computer users from cumbersome security policies, and
  • put IT administrators back in control of their networks

 

 

 

 

Replay is ready! Recorded Live April 21, 2016.

Replay will be available for a limited time . . . unless . . .

If you are a member of Information Managers Network you will have continued access to the replay and resources ‘forever' (as long as the internet is around).

You can return to this page (mark it as a favourite in your menu bar) – or from your Members Account Login – https://informationmanagers.ca/account/

See you soon!

Jean

 

 

 

Ask your questions here or use the chat:

 

“Expensive backend cybersecurity products are worthless when the virtual front door has a lousy lock!”

Dovell Bonnett

The management of passwords is the real security nightmare.

User authentication is the most ignored risk to enterprise cybersecurity. When end users are allowed to generate, know, remember, type and manage their own passwords, IT has inadvertently surrendered the job title Network Security Manager to employees – the weakest link in the cybersecurity chain.

Dovell Bonnett reveals the truth about the elephant in the room that no one wants to mention: Expensive backend security is worthless when the virtual front door has a lousy lock! Making Passwords Secure breaks down THE SIMPLE TRUTH about Multi-Factor Authentication (and how to make MFA fast, easy and affordable)!

Dovell proves that making passwords secure is not only possible, passwords can actually become an effective, cost efficient and user friendly feature of robust cybersecurity. After examining how encryption keys are secured, this book introduces a new strategy called Password Authentication Infrastructure (PAI) that rivals digital certificates.

Passwords are not going away.
What needs to be fixed is how passwords are managed.

 


Dovell - smallDovell Bonnett has been creating computer security solutions for over 20 years. His passionate belief that technology should work for humans, and not the other way around, has lead him to create innovative solutions that protect businesses from cyber-attacks, free individual computer users from cumbersome security policies, and put IT administrators back in control of their networks.

He has spent most of his career designing solutions to solve business security needs, incorporating multiple applications onto single credentials using both contact and contactless smartcards. The most famous example of his work is the ID badge currently used by all Microsoft employees.

Dovell has contributed to numerous papers for the Smart Card Alliance organization; magazines, including Card Manufacturing Magazine; and is the author of two books, Online Identity Theft Protection for Dummies® and Making Passwords Secure: How to Fix the Weakest Link in Cybersecurity. Dovell is a frequent speaker and sought-after consultant on the topic of passwords, cybersecurity, and building secure, affordable and appropriate computer authentication infrastructures.

 

hosted by Jean Eaton of Information Managers Ltd.

Your Practice Management Mentor and Practical Privacy Coach

cyber security, Dovell Bonnett, Multi-Factor Authentication, PAI, Password Authentication Infrastruture, password management, Practice Management Mentor, privacy, Report this, security

Making Passwords Secure in Your Healthcare Practice

Posted on April 14, 2016 by Jean Eaton in Archive

In this FREE 30-minute Practice Management Nugget Webinar with Dovell Bonnett you will learn how to fix the weakest cybersecurity link  in your healthcare practice.

 

Dovell Bonnett, “The Password Guy”, corrects the errors, misconceptions and lies about passwords

3dTransparent

Dovell will explain why password management is the key component of managing the cybersecurity of your healthcare practice.

You need to understand how to properly implement reasonable cyber safeguards to:

  • protect your businesses from cyber-attacks
  • free individual computer users from cumbersome security policies, and
  • put IT administrators back in control of their networks

Have you seen this?

  • post-it notes on computer monitors with the password written on it
  • computer users sharing the same credentials
  • passwords that are easy to guess

 

“Expensive backend cybersecurity products are worthless when the virtual front door has a lousy lock!”

Dovell Bonnett

The management of passwords is the real security nightmare.

User authentication is the most ignored risk to enterprise cybersecurity. When end users are allowed to generate, know, remember, type and manage their own passwords, IT has inadvertently surrendered the job title Network Security Manager to employees – the weakest link in the cybersecurity chain.

Dovell Bonnett reveals the truth about the elephant in the room that no one wants to mention: Expensive backend security is worthless when the virtual front door has a lousy lock! Making Passwords Secure breaks down THE SIMPLE TRUTH about Multi-Factor Authentication (and how to make MFA fast, easy and affordable)!

Dovell proves that making passwords secure is not only possible, passwords can actually become an effective, cost efficient and user friendly feature of robust cybersecurity. After examining how encryption keys are secured, this book introduces a new strategy called Password Authentication Infrastructure (PAI) that rivals digital certificates.

Passwords are not going away.
What needs to be fixed is how passwords are managed.

Register here for the FREE Webinar with Dovell Bonnett.

Email Address




Dovell - smallDovell Bonnett has been creating computer security solutions for over 20 years. His passionate belief that technology should work for humans, and not the other way around, has lead him to create innovative solutions that protect businesses from cyber-attacks, free individual computer users from cumbersome security policies, and put IT administrators back in control of their networks.

He has spent most of his career designing solutions to solve business security needs, incorporating multiple applications onto single credentials using both contact and contactless smartcards. The most famous example of his work is the ID badge currently used by all Microsoft employees.

Dovell has contributed to numerous papers for the Smart Card Alliance organization; magazines, including Card Manufacturing Magazine; and is the author of two books, Online Identity Theft Protection for Dummies® and Making Passwords Secure: How to Fix the Weakest Link in Cybersecurity. Dovell is a frequent speaker and sought-after consultant on the topic of passwords, cybersecurity, and building secure, affordable and appropriate computer authentication infrastructures.

 

Thursday, April 21, 2016

 Join us for Practice Management Nugget Webinar

Making Passwords Secure with

Dovell Bonnett

Email Address



hosted by Jean Eaton of Information Managers Ltd.

Your Practice Management Mentor and Practical Privacy Coach

cyber security, Dovell Bonnett, Multi-Factor Authentication, password management, Practice Management Mentor, privacy, Report this, security

7x Your Professional Education – for Members of Information Managers Network

Posted on April 7, 2016 by Jean Eaton in Practice Management Nugget Interview

In this FREE 30-minute Practice Management Nugget Webinar with Dustin Rivers you will get a behind-the-scenes peak at the upcoming 2016 Saskatchewan Connections conference.

The Connections events are each regionally based conferences designed for Access, Privacy, Security and Information / Records Management professionals working for public agencies.

Through a series of plenary, breakout and workshop sessions, delegates will gain a clearer understanding of access to information, protection of privacy, information security, and records management issues that arise in organizations subject to FOIP, LAFOIP, and HIPA. More importantly, discussion focuses on the connections between these disciplines.

25+ sessions and 35+ speakers over 2 days

Regina SK May 10-11, 2016

Learn how you can 7x your professional education starting with listening to this interview with Dustin Rivers, Executive Director, Verney Conference Management right now!

The 2016 Saskatchewan Connections: Access, Privacy, Security, Records Management & Health IM Conference, is also part of a series of regionally based conferences, all based on similar themes. They are the only multi-disciplinary, cross-jurisdictional, and community-based developed events for the greater public service across Canada. As a value-added bonus, participants of this event also receive access to the presentations from these Connections events in the same calendar year!

Verney Conference Management

Verney Conference Management

www.ontarioconnections.ca

www.manitobaconnections.ca

www.maritimeconnections.ca

www.nlconnections.ca

www.skconnections.ca

 

Whether you are a new attendee, have attended many times in the past, are new to the field or are a seasoned veteran…this event will offer something for everyone.

Recorded Thursday, April 7, 2016

7x Your Professional Education

This conference is for you if you are an

  • Access & Privacy Professional
  • Information Technology and Information Security Expert
  • Academic
  • Lawyer
  • Human Resources Professional
  • FOIP/LAFOIP Officer
  • Federal Public Servant
  • Communications Manager
  • Information / Records Manager
  • Municipal Employee
  • Service Delivery Personnel
  • Chief Privacy Officer
  • Chief Counsel
  • Security Officer

You should also attend if: 

  • You are a member of your organization's library community and are concerned with how information is categorized and retrieved
  • You are an archivist and are responsible for managing legal and historically significant information
  • You are a manager responsible for program and/or client records of all kinds, including personal, secure and classified information
  • You are a knowledge manager responsible for designing and leveraging the information management practices of your organization
  • You are interested in managing information for the purposes of:
    • Service Improvement
    • Service Transformation
    • Management Accountability Framework response
    • Departmental Audit
    • Program Management
    • Information Technology Deployment and Optimization

 

 

Dustin_Rivers_Verney

Dustin Rivers Executive Director Verney Conference Management

 Dustin Rivers

Dustin Rivers is the Executive Director of Verney Conference Management.

Since 2002, Dustin and Verney have been providing Conference Management Solutions across Canada.

hosted by Jean Eaton of Information Managers Ltd.

Your Practice Management Mentor and Practical Privacy Coach

 

Register for the 2016 Saskatchewan Connections event

 

access, access and privacy confernce, Health IM, privacy, Records Management, Regina, Saskatchewan, security, Verney Conference Management

7x Your Professional Education

Posted on April 5, 2016 by Jean Eaton in PMN Replay

In this FREE 30-minute Practice Management Nugget Webinar with Dustin Rivers you will get a behind-the-scenes peak at the upcoming 2016 Saskatchewan Connections conference.

The Connections events are each regionally based conferences designed for Access, Privacy, Security and Information / Records Management professionals working for public agencies.

Through a series of plenary, breakout and workshop sessions, delegates will gain a clearer understanding of access to information, protection of privacy, information security, and records management issues that arise in organizations subject to FOIP, LAFOIP, and HIPA. More importantly, discussion focuses on the connections between these disciplines.

25+ sessions and 35+ speakers over 2 days

Regina SK May 10-11, 2016

Learn how you can 7x your professional education starting with listening to this interview with Dustin Rivers, Executive Director, Verney Conference Management right now!

The 2016 Saskatchewan Connections: Access, Privacy, Security, Records Management & Health IM Conference, is also part of a series of regionally based conferences, all based on similar themes. They are the only multi-disciplinary, cross-jurisdictional, and community-based developed events for the greater public service across Canada. As a value-added bonus, participants of this event also receive access to the presentations from these Connections events in the same calendar year!

Verney Conference Management

Verney Conference Management

www.ontarioconnections.ca

www.manitobaconnections.ca

www.maritimeconnections.ca

www.nlconnections.ca

www.skconnections.ca

 

Whether you are a new attendee, have attended many times in the past, are new to the field or are a seasoned veteran…this event will offer something for everyone.

Thursday, April 7, 2016

(replay available for a limited time)

 Join us for Practice Management Nugget Webinar

7x Your Professional Education

This conference is for you if you are a an

  • Access & Privacy Professional
  • Information Technology and Information Security Expert
  • Academic
  • Lawyer
  • Human Resources Professional
  • FOIP/LAFOIP Officer
  • Federal Public Servant
  • Communications Manager
  • Information / Records Manager
  • Municipal Employee
  • Service Delivery Personnel
  • Chief Privacy Officer
  • Chief Counsel
  • Security Officer

You should also attend if: 

  • You are a member of your organization's library community and are concerned with how information is categorized and retrieved
  • You are an archivist and are responsible for managing legal and historically significant information
  • You are a manager responsible for program and/or client records of all kinds, including personal, secure and classified information
  • You are a knowledge manager responsible for designing and leveraging the information management practices of your organization
  • You are interested in managing information for the purposes of:
    • Service Improvement
    • Service Transformation
    • Management Accountability Framework response
    • Departmental Audit
    • Program Management
    • Information Technology Deployment and Optimization

 

 

Dustin_Rivers_Verney

Dustin Rivers Executive Director Verney Conference Management

 Dustin Rivers

Dustin Rivers is the Executive Director of Verney Conference Management.

Since 2002, Dustin and Verney have been providing Conference Management Solutions across Canada.

hosted by Jean Eaton of Information Managers Ltd.

Your Practice Management Mentor and Practical Privacy Coach

 

Register for the 2016 Saskatchewan Connections event

 

access, access and privacy confernce, Health IM, privacy, Records Management, Regina, Saskatchewan, security, Verney Conference Management

Business are Victims of Economic Crime and Fraud

Posted on March 14, 2016 by Jean Eaton in Blog

March is Fraud Prevention Month

40% of Canadian organizations reported that they were victims of fraud in the last two years. This includes asset mis-appropriation, procurement, and cyber fraud, as reported on CanadaAM on March 9, 2016 interview with Lori-Ann Beausoleil, PWC Canada.

Ophthalmology Business article, ‘6 Ways To Curb Employee Theft‘  includes tips that physicians and administrators can do to curb the risk of theft.

  1. Vet your employees
  2. Track inventory
  3. Let employees know that you are concerned about fraud
  4. Separate financial-related duties
  5. Out of sight, out of mind
  6. Use electronic health records (EHR) to your advantage

Read ‘6 Ways To Curb Employee Theft‘ to see all the suggestions by Jean L. Eaton, Steve Dawson, Jodie Boxe in this article by Vanessa Caceres.

For more suggestions on how to manage risks especially when your staff work alone, see my interview with Dave Rodwell, ‘Do Your Staff Work Alone?'

There are many things that you can do to prevent fraud in your healthcare practice. Being aware of the risk is your first step.

corporate security, Dave Rodwell, fraud prevention, health care, healthcare, incident plan, Jodie Boxe, ophthalmology, Practice Management Mentor, Practice Management Nugget, risk management, security, Steve Dawson, Vanessa Caceres, work alone

Are They Watching You?

Posted on January 30, 2016 by Jean Eaton in Blog

Smart appliances may be too smart for our own good. Take smart TVs, for instance. As this article illustrates, some of these new appliances are particularly vulnerable to hackers. Once compromised, the TVs allow access to account information, including login credentials (which owners may use for access to more than just their smart-TV account).

Even scarier, hackers could gain access to front-facing cameras to see everything happening in the room where the TV is connected. Instead of you watching your favorite program, criminals may be watching you!   This may also apply to Skype webcams, X-box and other games with webcams (Kinect, Wii, PS, etc), laptops and security cameras.

Once the machine is compromised, hackers can stealthily activate its front-facing camera (available on higher-end smart TVs), hijack a Samsung account, steal credentials by presenting fake login pages and infect other applications on the TV with malware.

Your App is Watching

When you download an app, it tells you it can work better or give you personalized offers or other things you might like if you switch Location Services on. For example, a dining recommendations app might offer you a coupon when you walk past a restaurant. Are there other types of apps that might want your location? What types of offers would make it a worthwhile exchange for you? Do you think this is useful or Creepy? For more examples, see “Helpful or Creepy? The Creep-O-Meter Could Help You Find Out” and try the ‘Creep-o-Meter’ activity.

Tools and programs like the Creep-o-Meter can help digital citizens be more privacy aware and own their online presence. Remember these STOP. THINK. CONNECT. tips when you use social media, play online games and engage with other technology platforms and tools.

  • Share with care: what you post can last a lifetime: Before posting online think about how it might be perceived now and in the future and who might see it.
  • Learn about and use privacy and security settings on your favorite online games, apps and platforms.
  • Be aware of what’s being shared: Be aware that when you share a post, picture or video online, you may also be revealing information about others. Be thoughtful about when and how you share information about others.
  • Personal information is like money. Value it. Protect it. Be thoughtful about who gets your personal information and how it’s collected through apps and websites.

Tip:  When you are not using the webcam, unplug it!

How many times a day are you handing over your information?

How many times a day are you handing over your information?

Instructions

  • Use a hard wired LAN connection from PC to Smart TV – often more secure than using wireless networking (as wireless is often not installed securely, either).
  • Unplug the Ethernet cable and/or delete the wireless network connection settings.
  • Put tape over the camera and inbuilt mic if included, and put a blank 3.5″ plug into any mic input sockets.
  • Don't allow your Smart TV access to any other devices on your network (laptops, PCs, smartphones, tablets).
  • Don't log in from your TV to any websites that have sensitive information
  • DON'T re-use passwords on any other sites, especially not high-value sites like banking or email.

Resource

Privacy for Everyone: Closing the Gap Between the Privacy-Have's and the Privacy Have-Nots  Address by Patricia Kosseim, Senior General Counsel and Director General, Legal Services, Policy and Research Branch, (June 2014)

Rebecca Herold (a.k.a. The Privacy Professor) for more tips.

‘Technocreep' author says new technologies have been invading our privacy like never before , CBC interview, The Current with Anna Maria Tremonti and Tom Keenan

WeLiveSecurity. ESET 10 Steps to Staying Secure on Public Wi-Fi. 2015-Sep-02

#PrivacyAware, Data Privacy Day, Internet of Things, IOT, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security, smart appliances

Is Your Email Secure?

Posted on January 29, 2016 by Jean Eaton in Blog

Is your email secure? Backed up? If you suddenly lose your email, calendar, or contact list, this could either be a speed bump in your busy day, or a nightmare that may take days or weeks and a lot of money to recover.

If you use email as temporary communications or your primary method of business, it needs to be managed securely. When you or your staff use email from multiple devices – such as your desktop computer, smart phone, or website – you have additional privacy and security requirements.

Whether you use your email as temporary communications or your primary method of business, it needs to be managed securely. Many small businesses have purchased an email software system like Outlook as part of their desktop software.

If you use free email accounts – like gmail or yahoo – emails, calendars, and contact information are on the public cloud where it is accessible from any internet connection. Of course, it then becomes difficult to back up to a local device that you can control.

If you are an employee or business owner, if you use email for business –  employee records, business contacts, company newsletters, subscriptions, financial or consumer purchases, or personally identifying messaging –  you need to meet privacy and security requirements. Make sure that you keep separate email accounts for your business emails and your personal emails.

Having sensitive information in your emails makes it vulnerable to attack, and it could leave you, your clients, and your employees, open to identity fraud.

Tip: Consider using a hosted email service, where your emails would be backed up, protected, and accessible.

Instructions:

  • Make sure that you have an email account for your business and a separate email account for your personal life.
  • Confirm your backup plan for your email accounts. If you don't have one, create a plan.
  • Do a test restore of your email account – did it include everything that you need – including your calendar, contacts, and all of your folders?

 

Resources:

There are many features offered with a hosted email service. See our blog post Is a Hosted Email Solution For You? for additional details including things to look for in a hosted email solution vendor.

 

DPD Champ badgeWe are proud to be a Data Privacy Day Champ!
You can be one too! #PrivacyAware

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

 

Register Here – Don’t miss out on this free E-course!

#PrivacyAware, Data Privacy Day, Email security, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security

Is a Hosted Email Solution For You?

Posted on January 29, 2016 by Jean Eaton in Blog

Is your email secure? Backed up? If you suddenly lose your email, calendar, or contact list, this could either be a speed bump in your busy day, or a nightmare that may take days or weeks and a lot of money to recover.

If you use email as temporary communications or your primary method of business, it needs to be managed securely. When you or your staff use email from multiple devices – such as your desktop computer, smart phone, or website – you have additional privacy and security requirements.

Many small businesses have purchased an email software system like Outlook as part of their desktop software. Unfortunately, recent software updates from Microsoft do not include Outlook; you are encouraged instead to purchase MS Office 365 software where all of your email is stored on the MS Cloud.

Some businesses use free email accounts – like gmail or yahoo – where emails, calendars, and contact information is on the public cloud. It is accessible from any internet connection but is difficult to back up to a local device that you can control.
If you use email to transact business – employee records, business contacts, company newsletters, subscriptions, financial or consumer purchases, or personally identifying messaging – you need to meet privacy and security requirements.

Previous versions of Windows Server Small Business Server (SBS) edition included Microsoft Exchange so small businesses could create their own in-house email server. This is not included in Windows Server 2012 Essential (SBS replacement). But small businesses still have a few options:

  • Buy the Microsoft Exchange Server full licenses, although it can be quite expensive
  • Sign up to Office 365 which is a hosted / cloud based Microsoft Exchange service from Microsoft with email hosted in the USA. Offices will need to determine their level of risk using personally identifiable information in emails – including sensitive information like credit card, payroll, health information, and other sensitive content – which will be stored out of Canada and subject to US legislation and uses.
  • Contract with a Canadian hosted Microsoft Exchange service with a Canadian based cloud service provider. This might be a cost effective solution and permit full access to email in an environment which is backed up and more easily accessible.

Features offered with a hosted email service

There are many features offered with a hosted email service:

  • Collaboration is easy as you have access to group calendaring and scheduling, shared contacts, folders and calendars, tasks and task delegation, as well as public email folders.
  • Fully functional email software.
  • Sync capabilities to your smart phone without worrying about viruses, spam, or malware, and mail archiving is automatic. Store as much or as little email as you need and do so without dealing with annoying ads.
  • Anti-phishing, anti-virus, and malware software are attached to each email connection.
  • No data ‘left behind' on the device – all data is securely maintained in the hosted email. If a mobile device is lost or stolen, business email is not compromised.
  • You can apply business rules – for example, emails can be prevented from being forwarded to an employee's home gmail account. Employees can securely work from home.
  • All business data is maintained by the business. So if your employee wins the lottery and doesn't come back to work, all business emails have been maintained in the hosted email and not on an employee's home computer.
  • Data is encrypted during the internet transmission.

To get a Hosted Email, you will need internet access with a data plan. You can continue to use your desktop computer and its cable internet access. When you use mobile devices, you can use your mobile provider data plan (Rogers, Bell, Telus, etc), or connect to a trusted WiFi connection.

You are still responsible for good security practices at your location including:

  • Unique user ID and password on your computer network – including mobile devices – and
  • Good password management – complex passwords that are changed regularly
  • Physical safeguards to ensure that your work locations – including mobile locations – are secure from theft
  • Common sense awareness – don't open suspicious phishing or spam emails

Business-class Microsoft Exchange email hosting services mean you're always in touch and up-to-date, in the office or on the road accessing your mobile email.

3 Things to look for in a hosted email solution vendor

  • Canadian provider with data centres only in Canada (Alberta preferable)
  • Reputable company with proven track record
  • Contract including:
    Termination clause – when the contract terminates, the vendor will:
    Notify you in advance of termination
    Allow local back up of your data or data transfer
    Validate that your data has been completely and securely deleted from the data centre
    Encrypted at the data centre – no one at the data centre can read your information and it is secure from someone else hacking into the data centre to steal your data

Confirm your backup plan for your email accounts.  If you don't have one, create a plan.

business associate, BYOD, good security practices, hosted email service, mobile devices, MS Cloud, privacy, SBS, security, Windows Server 2012 Essential

Own Your Online Presence This Data Privacy Day

Posted on January 29, 2016 by Jean Eaton in Blog

“Johnny Smith: Epic night! Arrested for being drunk by a cop on a horse!”

“Bill likes this”

Boy, that sounds like a fun night. Except, of course, when Johnny's boss sees this in the morning after Johnny didn't come into work. Uh oh.

Social media can be great – we can connect with long lost friends and relatives, share photos and ideas, and learn about news and events. But what we post can have serious ramifications, for ourselves and others, and can remain on the internet indefinitely. What we think is funny at the moment may prove embarrassing in time to come.

 

DPD_NCSA_US_Consumer_Privacy_Index_2016_smallAccording to the research study “Consumer Privacy Index 2016” from TRUSTe and National Cyber Security Alliance, consumer privacy concern levels are rising quickly:

  • 68% of consumers listed not knowing how their personal information is collected online as a top concern
  • 45% of respondents are more worried about their online privacy than they were just one year ago
  • 74% have limited their online activity in the last year due to privacy concerns

Tip – Limit the amount of personally identifying information you share, and adjust your privacy settings.

Instructions

  • Set your privacy preferences to only friends to see your profile.
  • Regularly check on these settings, as some social network sites make changes without notifying you. Here are instructions for many of the popular products and services.
  • Do not use information that is often used as security identifiers, such as your full name, date or birth, or mother's maiden name.
  • Always ask yourself – “Is this information I wouldn't mind an employer seeing?”
  • Don't reveal your location online. It tells people where you are – but also where you're NOT, signifying that your home may be unoccupied and a potential robbery target.
  • Download, print, and discuss the Consumer Privacy Index 2016 Infographic from TRUSTe and National Cyber Security Alliance.
  • Watch this video from StaySafeOnline

Resources

Office of the Privacy Commissioner of Canada. Protecting your Privacy Online Frequently Asked Questions. 2011-May-06

STAYSAFEONLINE.org How to Own Your Online Presence infographic

See all the Data Privacy Day E-course resources posted each day on our website.

DPD Champ badgeWe are proud to be a Data Privacy Day Champ!
You can be one too! #PrivacyAware

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

 

Register Here – Don’t miss out on this free E-course!

#PrivacyAware, Data Privacy Day, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security, social media

How You Can Be a Password Pro

Posted on January 28, 2016 by Jean Eaton in Blog

Passwords. Can't live without 'em, can't even remember all of 'em.

Just about everything needs a password these days. From your email address to your social media accounts, to your online banking and to your smartphone.

But is your password uncrackable?

Hack-proofing your passwords is absolutely essential, especially if you run a business. Small businesses are major targets, with more than 80% being targets of opportunities.

A University of Cambridge study found that 90% of passwords are hackable. Try to make your passwords in the 10% of uncrackable passwords.

Your accounts are only as strong as your weakest link!

Easily improve your password with a password management tool like 1Password, LastPass, Dashlane, McAfee SafeKey and many more to choose from.

As a healthcare provide and /or business owner, you are responsible for not only your personal passwords but also ensuring that all your staff and vendors are also using strong (and really long!) passwords. Doing this for each application for all your internet devices can be nearly impossible. Instead of using the same password in many applications, writing down the logins and password or skip using passwords altogether – it is time for you to use a Password Manager tool.

Password Management_Information_ManagersUsing these tools will:

  • make it easy for you to create and use strong passwords
  • generate complex passwords for you
  • no problem to change your password regularly
  • some will even make it easier for you to create a secure sharing of login and password to an assistant
  • make it easier for your team to easily use good password management

Tip: Don't get frustrated whenever you forget your password. Instead, be proud that you change your password regularly using the “I forgot my password” re-set function!

  • Use your business passwords for work only. Don't reuse your work password on an external website, email, or bank account. Don't use the same password for all your social media accounts.
  • Avoid predictable and common passwords. Choose a phrase that you can remember, and add in the required characters – capital letters and numbers. You can try removing the vowels of easy to remember words (i.e. privacy = prvcy)
  • Use more characters. The longer the password, the harder it is to crack!

For more information see our blog post &Tgh2Crack! How tough is your password

Resources

Rubenking, Neil J. @neiljrubenking The Best Password Managers for 2016, PC Magazine. 2016-Jan-08

Davis, Gary. Password Safety in a Connected World,  McAfee Blog Central. 2013-May-06.

DPD Champ badgeWe are proud to be a Data Privacy Day Champ!
You can be one too! #PrivacyAware

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

Register Here – Don’t miss out on this free E-course!

#PrivacyAware, Data Privacy Day, password management, passwords, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security
1234

Search the site

What is the elephant in the room?

The Elephant in the Room Find out here...

Privacy Policy

"The 15 Day Privacy Challenge has made me aware of the policies that my facility needs to update/create!"

- Rachel Worthing, CHIM, Ontario Shores Centre for Mental Health Sciences

Register for Free On-line Privacy Breach Awareness Training!

Privacy Policy

Copyright 2022 Information Managers Ltd.

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}