Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Securing your patient information

Securing your patient information

Webinar for Osteopathy Australia members

Joel Friedlaender

May 12, 2015
Tweet

More Decks by Joel Friedlaender

Other Decks in Technology

Transcript

  1. 1) 123456 2) password 3) 12345 4) 12345678 5) qwerty

    6) 1234567890 7) 1234 8) baseball 9) dragon 10) football 11) 1234567 12) monkey 13) letmein 14) abc123 15) 111111 16) mustang 17) access 18) shadow 19) master 20) michael 21) superman 22) 696969 23) 123123 24) batman 25) trustno1 Most  common  passwords  2014  
  2. bT5&io!    (???)     or     i  love

     osteo  (???)     Source:  https://howsecureismypassword.net/  
  3. bT5&io!    (1  hour)     or     i

     love  osteo  (???)     Source:  https://howsecureismypassword.net/  
  4. bT5&io!    (1  hour)     or     i

     love  osteo  (546  years)     Source:  https://howsecureismypassword.net/  
  5. Places  to  use  2  factor   authentication     Internet

     Banking   Email  (eg.  Gmail)   Facebook   Dropbox   Many  more!    
  6. In cryptography, encryption is the process of encoding messages or

    information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor. Encryption  
  7. If someone steals your computer, they can still access everything

    if it’s not encrypted (even without your password). Encrypting your computer is easy. Encryption  
  8. 1.  Go to System preferences 2.  Choose Security & Privacy

    3.  Choose Filevault 4.  Turn it on 5.  Sleep better How  to  encrypt  -­‐  Mac  
  9. 1.  Search 2.  Type “BitLocker” 3.  Choose Settings 4.  Choose

    BitLocker Drive Encryption 5.  Choose Turn on BitLocker How  to  encrypt  -­‐  Windows  
  10. “When you upload, submit, store, send or receive content to

    or through our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content.” Google   Source: http://www.google.com/intl/en/policies/terms/
  11. •  Secure passwords •  Anti virus software •  Firewalls • 

    Secure any external access (eg. HTTPS/VPN) •  Install security updates •  Ensure physical security Precautions  
  12. •  Secure passwords •  Anti virus software •  Firewalls • 

    Secure any external access (eg. HTTPS/VPN) •  Security updates •  Physical security Precautions  for   installed  software  
  13. •  Designed for medical records •  Runs completely under HTTPS

    •  Secure authentication (username/password scheme) •  Security information available •  Able to export patient information •  Encryption (in transfer and at rest) Trusted  vendor?  
  14. Poll:  Do  you  backup  your  data?     •  Yes

      •  No   •  Not  applicable  
  15. Poll:  Have  you  tested  your  backup?     •  Yes

      •  No   •  Not  applicable  
  16. Use  Hosted   Practice   Management   Software   Disclaimer:

    I have bias here, but it’s not why I recommend this.
  17. Osteopathy Australia will upload 1.5hrs of CPD on your behalf

    to your online CPD record. However it is your responsibility to record your level of commitment, relevance and duration undertaken for the pre-reading.