in Health Care
Protect mobile devices
They are easy to lose and vulnerable to attacks.
Establish a Security Culture
Education and training must be frequent and ongoing. Information security must be a core value.
Maintain good computer habits
Must be properly maintained to function properly and be reliable.
Use a firewall
Protect software and hardware against intrusions and threats.
Install and maintain anti-virus software
Don't let hackers take control.
Plan for the unexpected
Always be prepared: fire, tornado, hurricane, flood
Control access to protect PHI
Role-based access and the need to know
Use strong passwords and change them regularly
Never use personal information in passwords.
Limit network access
Secure log in to network. Approved devices only
Control physical access
Locked server rooms. Policies defining physical access.