Error
Print this page
Thursday, 21 March 2013 07:45

Lazy Hackers: A threat to dental practices Featured

Written by 
Rate this item
(0 votes)

cybersecurityHackers aren’t going to go after my dental practice; they’ll spend their time trying to break into a bank or major retailer’s systems, right? 

According to David Kennedy, a security consultant at TrustedSec, healthcare is the most breached industry in the U.S. 

He was speaking at this year’s HIMSS conference in a presentation, entitled “Hacking Your Life”.  

Hackers are lazy.  If given the choice between a bank with layers of firewalls and a security staff dedicated to keeping them out versus a dental practice with none of those assets, they will choose the dental practice. 

And make no mistake, you have what they are after:  names, birthdates, addresses, social security numbers, ids and perhaps banking information.  

So, it is with that in mind that I offer eight tips on how you might keep your office from being part of Mr. Kennedy’s statistics on breached healthcare organizations.

•    User names and passwords – Do not use generic or default user names and passwords.  Passwords should be at least six characters long and incorporate numbers, letters (upper and lower case) and special characters.  They should be changed periodically, I’d suggest quarterly. 

Here is a link to a site that lists the 100 most common passwords.  If your password is on this list, change it.

•    Anti-Virus software – You should have anti-virus software installed on every one of the computers in your office.  See my post entitled “Combating Computer Viruses in the Dental Office” for more details.  The product you use should include anti-spyware and anti-adware features.

•    Encrypt your files – If your software vendors do not encrypt their data files, look into a product that will provide full disk encryption.

•    Keep your operating system up to date with the most recent security patches – When a weakness is found in an operating system the manufacturer will swiftly remedy the problem with a software patch.  News of the weakness will also spread quickly through the hacker community.  Don’t let the hackers win the race to your computer.

•    Install a firewall between your office network and the Internet.  A firewall will filter the traffic between your systems and the rest of the world.  This is likely to be included in your network router.  Check with whoever set up your office network to see if they have configured a firewall and review this every time you make a change to your network to be sure a vulnerability has not been created.

•    Don’t click on unrecognized links sent to you in email.  A favorite trick of hackers is to link you to a familiar looking sign-on page.  It is not the sign-on page but a cleverly created copy.  When you attempt to sign on, they have collected your user id and password.

•    Use only trusted Wi-Fi hot spots to access your office data.  Many practices use tools like LogMeIn or GoToMyPC to remotely access their information.  Don’t do this on just any network that appears as an available Wi-Fi access point.

•    Buy a shredder.  Not all hacking is done electronically.  Remember hackers are lazy and nosing through your trash may be much easier than trying to guess your password.

Following the above tips may not make your systems hack-proof but will throw up enough barriers to encourage our lazy hacker to find an easier target, and there are plenty of them out there.  Being the easy target would be a wrong click.

.

Read 9884 times Last modified on Thursday, 21 March 2013 08:22
Bill Hockett

Latest from Bill Hockett

Related items

1 comment

Login to post comments