The most minuscule, unintentional error can easily expose sensitive, valuable medical data to thieves. Clicking on a fraudulent email that appears to be legitimate can happen so innocently. Even something as silly as a social media quiz finds out in-depth information and cause major breeches.
Employee Security Training
We’re aware that hackers are becoming wiser and more advanced, so we’ve stepped up our training. Our employees are trained on how to handle all formats of data; this includes emails, PDFs, and paper documents. We provide them with detailed instruction on how to handle every step of the medical data process, all the way down to the destruction of media. Additionally, our employees are well-versed in tactics social media hackers employ to gain access to sensitive information.
This training is followed up with monitoring to ensure that these protocols are being followed, and can react quickly if it is not. We also only use the most secure third-party providers to protect your data.
Tips and Tricks to Keep You Safe
Oftentimes, data breaches stem from social engineering that seeks to trick employees into providing access to sensitive and confidential data. These tactics play on human nature and emotion to get a person to give access or to deviate from security protocol. These are some ways hackers may try to gain information from you:
Using your information available on social media. They may be aware of your name, birthday, workplace, and location, so be cautious of the information you provide on these sites.
Official-sounding emails from “authority figures”. You may get something from “HR” asking you to click a survey link, or a message that appears to be from a boss asking you to click a link for work. Prior to clicking anything, ask your higher ups if it is legitimate and verify who the sender is by hovering over the email address.
Password access through information you have provided elsewhere online. HIn order to protect yourself, make sure you’re implementing different passwords for different parts of life. One specifically for work, one for banking and one for personal activity. This helps protect you from having all of your personal info breached at once, and specifically protects your work information.