Home / Blog /5 Steps to Turn Your Staff into Security Gatekeepers Instead of Door Openers
Security Gatekeepers

5 Steps to Turn Your Staff into Security Gatekeepers Instead of Door Openers

by CompuTech City Admin Tuesday, 09 January 2018 CompuTech City Blog

The healthcare industry is a primary target for cybercriminals. Many medical facilities have outdated technology systems and are home to Private Health Information (PHI), personally identifying information and patient financial information. Protecting this data is an all-important responsibility for doctors, hospitals and other healthcare providers.

Because 60% of data breaches were caused by insiders, according to the IBM 2016 Cyber Security Intelligence Index, it makes sense to educate your employees so they become your practice’s first line of defense instead of opening the doors to hackers. End users – doctors, nurses, administrative employees – are your biggest threat to security and data loss. The first layer of prevention lies with your employees as they are regularly exposed to social engineering attempts such as phishing attacks and viruses. Ongoing security training teaches doctors, nurses and administrative employees to beware of suspicious emails, safeguard login information and protect data with secure protocols.

Here are 5 steps include in employee training to keep your practice more secure in 2018

1. Teach the characteristics of social engineering scams
The more aware employees are of cyberattacks, the more likely they will be able to avoid them. The 5 most common types of social engineering scams are phishing, baiting, quid pro quo, pretexting and tailgating.

2. Make sure attachments are from someone legitimate
Before clicking on an attachment you didn’t expect, confirm with the sender via text, separate email or phone that they actually sent the attachment and ask what the attachment is.

3. Password protection
Train all users to set up difficult-to-guess passwords so protected information is safe from unauthorized users. A solid password policy recommends using passwords with a mixture of letters, numbers and symbols; contains at least 15 characters; and is unique for each account the user owns.

4. Encrypt emails
Encrypted emails protect sensitive communications from unauthorized users. This is especially helpful when communicating via email with patients (and with HIPAA).

5. Log off the system
When employees step away from their desks or leave for lunch or the day, they need to log off the network.

End user training is not a one-time thing. Cybersecurity threats are constantly evolving so all employees need to be kept up to date at least twice a year. CompuTech City trains many medical workers in central Florida to be proactive about security. Contact us now to find out more about our end user training programs.

Find out more about CompuTech City’s – 800-641-CITY (2489) or www.computechcity.com. Check out our social media:
Copyright © 2016 l computechcity.com. All rights reserved.