A Business Continuity Plan (BCP) defines the who, what, when, and where for how your medical practice personnel are to respond to a disruption of their normal operations. More specifically, the BCP includes a predetermined set of procedures and documentation that defines the resources, actions, tasks, data, and processing priorities required to manage business … [Read more...] about Why is a Business Continuity Plan Important?
Cybersecurity for Medical Practices
Why Does Cybersecurity Matter? So why should medical practices be worried about cyberattacks? Patient Data! Healthcare organizations are prime targets of cyber attackers because of the importance and value of patient data. Even a small practice with several physicians will have accumulated tens of thousands of patient records over several years of operation. These records … [Read more...] about Cybersecurity for Medical Practices
My Practice will Never be Hit by Ransomware
One of the biggest mistakes physicians and practice managers can make is to assume they will not be a target of cyberattacks. Unfortunately, this is absolutely untrue. Recently, a two-physician practice in West Michigan was the victim of a ransomware attack. The practice lost access to all medical records, billing, scheduling, and other critical data after ransomware … [Read more...] about My Practice will Never be Hit by Ransomware
Guide for Choosing Passwords
Why Do I Have to Change my Password Again? Medical practices can be hectic environments, with everyone having seemingly one million things to do. Coming up with a new password can feel like just one more thing no one has time to do. The first thing you think of is your anniversary or your pet’s name; great—you’re done. Wrong! By choosing a weak password, … [Read more...] about Guide for Choosing Passwords
The Perils of Phishing—Hook, Line, and Sinker
Phishing is a type of cyberattack using email to trick someone into divulging personal information, including passwords. Health care phishing is growing because of the value of health care data coupled with the fact that everyone in a medical practice has an email and can be a target. In a phish, the attacker masquerades as a reputable entity or person, via email or … [Read more...] about The Perils of Phishing—Hook, Line, and Sinker