Cyber Best Practices for Healthcare Organizations

Why is cyber security so important for healthcare businesses?

As an employee at a healthcare organization, you likely have numerous duties related to maintaining the confidentiality of sensitive data. This includes handling medical history, personally identifiable information, and financial information. This highly confidential data is valuable to cyber criminals.
View Options Again

The importance of data security

What is NOT a way to secure a healthcare institution against cyber attacks?

A unique password is essential for all your accounts. Whilst password sharing may be appealing because it's quick and easy, this greatly increases the likelihood that the account is accessed by an unauthorized user. All other listed options are valid ways to secure healthcare institutions against cyber attacks.
View Options Again

Staying cyber safe

What is an example of a strong password?

Strong passwords are long passwords and ones that a human or computer would not easily guess. It is best to use special characters, upper and lower case, plus numbers and letters. Avoid using obvious passwords like sequential numbers or lazy passwords such as "password" or "qwerty". These are common passwords that are easily cracked or guessed.
View Options Again

What is an example of using caution online?

The correct answer is to be wary of suspicious emails; this is a textbook example of using caution online. You should always be on the lookout for potential phishing scams designed to masquerade as a company or someone you know. They could have the intent to steal your personal information or infect your device with malware.
View Options Again

From a security standpoint, why should you always keep your devices up to date?

Whilst keeping your devices and software up-to-date will give you the added bonus of new features, from a security standpoint, the key reason to update is to ensure you have the latest security patches applied. By staying up-to-date, known vulnerabilities will be fixed, and your devices will be safer to use.
View Options Again

Learn how to spot the phish

Begin the Guided Tour Look out for urgency in email subjects, fraudulent sender addresses or requests to perform an action.

What are some indicators that an email is malicious?

Cyber criminals will often use spoofed sender addresses and urgency to try and bypass critical thinking and make an email seem trustworthy. They will then also commonly request personal information or request you to perform an adverse action.
View Options Again

Goals of cyber security

Why is Multi-Factor Authentication important?

What is an example of Multi-Factor Authentication?

One-time passwords can be generated and sent to the user's cellular device via SMS. The correct user must be in possession of the device that receives/ generates the one-time password to access the system.
View Options Again

Wrapping up