Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data



Similar documents
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

How to stay safe online

Malware & Botnets. Botnets

October Is National Cyber Security Awareness Month!

NATIONAL CYBER SECURITY AWARENESS MONTH

PC Security and Maintenance

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

BE SAFE ONLINE: Lesson Plan

Infocomm Sec rity is incomplete without U Be aware,

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Practical guide for secure Christmas shopping. Navid

Protect Yourself. Who is asking? What information are they asking for? Why do they need it?

Internet basics 2.3 Protecting your computer

C&G FLUX MARKET Internet Safety

Fighting spam in Australia. A consumer guide

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

TMCEC CYBER SECURITY TRAINING

Internet threats: steps to security for your small business

What you can do prevent virus infections on your computer

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

General Security Best Practices

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

What you need to know to keep your computer safe on the Internet

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

FILTERING FAQ

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Is your data secure?

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Protecting your business from spam

Practical tips for a. Safe Christmas

Top tips for improved network security

BUSINESS COMPUTER SECURITY. aaa BUSINESS SECURITY SECURITY FOR LIFE

Cyber Security. Maintaining Your Identity on the Net

Open an attachment and bring down your network?

INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account

Learn to protect yourself from Identity Theft. First National Bank can help.

AVG AntiVirus. How does this benefit you?

What Spammers Don t Want You To Know About Permanently Blocking Their Vicious s

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

eprism Security Suite

F-Secure Anti-Virus for Mac 2015

Digital Safety and Privacy

IT Security DO s and DON Ts

eprism Security Suite

Computer Viruses: How to Avoid Infection

Computer Security Maintenance Information and Self-Check Activities

Security Consultant Scenario INFO Term Project. Brad S. Brady. Drexel University

Norton 360. Benefits. Our ultimate protection, now even more so. Introducing the new Norton 360.

Your security is our priority

ANDRA ZAHARIA MARCOM MANAGER

Business ebanking Fraud Prevention Best Practices

Contents. McAfee Internet Security 3

Tahoe Tech Group serves as your technology partner with a focus on providing cost effective and long term solutions.

Protect yourself online

STOP. THINK. CONNECT. Online Safety Quiz

Safety precautions for Internet banking or shopping How to avoid identity theft online

About junk protection

Remote Deposit Quick Start Guide

Protecting your business from fraud

Your Guide to Security

Cybersecurity Best Practices

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Business Identity Fraud Prevention Checklist

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

National Cyber Security Month 2015: Daily Security Awareness Tips

and Security. U3A Radlett Computer Group Meeting 6-Oct-2014 V1.1

Introduction: 1. Daily 360 Website Scanning for Malware

Paul Nguyen CSG Interna0onal

Information Security Training on Malware

Are You A Sitting Duck?

Computer Security Self-Test: Questions & Scenarios

Online Security Information. Tips for staying safe online

10 Quick Tips to Mobile Security

BULLGUARD SPAMFILTER

Security Fort Mac

WEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES

Network Security. Demo: Web browser

Cyber Essentials Questionnaire

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Life after Microsoft Outlook Google Apps

Reliance Bank Fraud Prevention Best Practices

Trust the Innovator to Simplify Cloud Security

Desktop and Laptop Security Policy

Expanded Header: Viewing in Microsoft Outlook

Online Cash Manager Security Guide

Visa CREDIT Card General Guidelines

IRM NEWS CYBER SECURITY AWARENESS FIREWALLS THE GUARDIAN AT THE GATE FLORIDA ATLANTIC UNIVERSITY

Spam Filter Message Center. User Guide

How to Use Windows Firewall With User Account Control (UAC)

Protection from Fraud and Identity Theft

AVeS Cloud Security powered by SYMANTEC TM

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

U.S. Cellular Mobile Data Security. User Guide Version 00.01

WEB ATTACKS AND COUNTERMEASURES

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

Transcription:

Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer systems and in particular, your patients data from viruses and malware. Following the best practices in this ebook can reduce the risk of malicious software ruining your data, your reputation and your practice. How Does Your System Get Infected? Hackers may send unsolicited email with embedded malware links or attachments that contain viruses. Opening suspicious emails and clicking on links or attachments can infect your computer network. Someone on your team may accidentally click on an Internet advertisement that downloads malware in the background. A memory stick with an embedded virus can infect your system when someone plugs it into a USB port. Data thieves and hackers create hundreds of new ways to infect your system each month. To help you foil the fraudsters and protect your practice, here are ten defensive strategies you can use. Strategy 1: Keep Your Business Email Address Private Yes, you can share your business email address with patients, partners and colleagues. Just don t use it on public websites. Spammers first need to know your email address in order to send you malicious emails. It s best not to use your business email address to order services, enter contests, sign petitions and so forth. Only use it on websites you know and trust. Unfortunately, even legitimate websites will share your email address with third parties. If the option is available, opt out of email advertisements and special offers from our partners when you sign up for something on a website. The more you can reduce exposing your business email address, the safer your practice will be. On your practice s Ransomware Nightmare Ransomware, a type of malware that infects and disables computers and demands payment from victims to restore data access, is a growing threat to dental practices. Ransomware recently infected a California dental practice, encrypting its electronic patient information, scheduling software and digital X-rays. The hackers demanded $500 to restore the files. The dentist s cloud backup and hard-drive backup were also encrypted, essentially closing the practice for several days. To fix the problem, the dental practice had to install a new server. Security experts advise victims not to pay the ransom because: It can make you a target for more malware. It perpetuates the threat by funding cybercriminals. It doesn t guarantee your encrypted files will be released. Source: http://www.cda.org/newsevents/ Details/tabid/146/ArticleID/2917/Actions-to- Help-Avoid-Ransomware-Nightmare.aspx 2 SECURITY RISK ASSESSMENTS

website, use a secure comment form that requires human verification, such as a CAPTCHA code. Your email address can be extracted from public websites by harvesting bots, software that gathers lists of email addresses for sending junk email and spreading malware. Make sure your business email address doesn t automatically show up with your signature on web forums or as a link in online guest books. Never use your business email address to sign up for contests, discounts, promotions or other online marketing schemes. Strategy 2: Use a Filter for Junk Email If you host your own Microsoft Exchange server, implement a junk mail filter or spam firewall service such as Barracuda. This type of service helps reduce junk emails in your inbox. Without a junk email filter, your Exchange email is vulnerable to being flooded by spambots. If you use web-based email for your dental practice, make sure to use a reputable service such as Outlook.com or Gmail. These email services have built-in security measures to help prevent unsolicited email and viruses. Consider removing an email account that receives excessive junk mail and creating a more private email address for your practice. Starting over with a new email address may require updating your business cards and marketing materials, but it s worth the security it adds to your practice. Strategy 3: Delete Don t Open Suspicious Email When checking your email, don t click on unfamiliar or suspicious emails or attachments. Instead, immediately delete them. Some suspicious emails can add your email address to a list or even install malware or a virus when opened. Tips from TDIC The Dentists Insurance Company (TDIC) recommends these tips to keep malware from infecting your dental office: Always run an up-to-date antivirus program. Add malware detection software to your system. Keep software and browserrelated components updated. Turn on computer firewalls on all devices. Be wary of email attachments, even if they appear to be from someone you know. Regularly back up your data. Store backups in a separate location. Download software only from websites you can trust. Limit user privileges on your system through user account controls. Alert your team of ransomware risks. Source: http://www.cda.org/newsevents/ Details/tabid/146/ArticleID/2917/Actions-to- Help-Avoid-Ransomware-Nightmare.aspx Before opening an email attachment, verify that you recognize the sender, the name of the attachment, and the body of the email. If anything seems out of place, do not open the attachment. Be careful with unsubscribe links in your email. Although many unsubscribe links are legitimate, some contain links to malware. SECURITY RISK ASSESSMENTS 3

Strategy 4: Encrypt Your Email Messages Before sending an email to a patient or business partner especially if the message or attachments include protected healthcare data encrypt the email so it can t be read or captured by a hacker in transit. RecordLinc Secure-Mail is an encrypted email and marketing portal exclusively for dental professionals. It allows you to easily send secure messages to other dentists, labs and patients. Discuss other email encryption solutions with your IT provider to keep you and your business partners in compliance with healthcare regulations. Strategy 5: Restrict Email Use on Practice Computers Limit email use on your practice s computers and networked devices to official dental business only. Use secure email methods with proper filters and antivirus protection. Many small businesses get virus infections from personal email use by employees. Dental practices are no exception. Only employees who are trained in email security protocols should use your practice s email system. Personal email should be done on personal devices. Strategy 6: Minimize Web Browsing Minimize the number of employees allowed to browse the web on your practice s computers. These employees should use the web for business purposes and visit legitimate websites only. The more restrictions on web browsing, the safer your network will be. Web filtering services can prevent employees from visiting potentially dangerous sites. These services can also provide a regular report showing web use in your practice. Social media sites are one of the leading sources of malware infection. Therefore, personal web browsing by employees should not be allowed on practice computers. Make it a policy that employees must use their own devices for personal web browsing. Tips for Your Team Help your team avoid the tricks and traps hackers use to infect computers with malware. Review these tips with them: Never open email from someone you don t know or from anyone who isn t in your patient database. If you open an email from someone you know, never open/ download any attachments or click on any links without talking to the sender first. Stay away from social media sites as much as possible. If you must post something for marketing purposes, never click on ads in social media sites. If a warning message pops up that says something like, Your computer has a virus. Click here to remove, never click on the link. Create strong passwords at least eight characters long, including upper- and lowercase letters, numerals, punctuation marks and symbols. Never use your name, birthdate, pet s name or address. Keep your passwords secret. Never share your passwords with friends or colleagues. Source: www.microsoft.com/security/ 4 SECURITY RISK ASSESSMENTS

Strategy 7: Keep Personal Devices Off Your Network Unless you have a secure firewall in place with a guest network that s separate from your practice s network, do not allow personal devices including anything that plugs into a USB port to connect or upload data to your business network. Strategy 8: Run Software Updates Regularly Run Windows security updates on a regular basis. You can schedule them to run after hours so they won t disrupt your productivity. Once updates are installed, test your network, connected devices and your database to make sure they are in working condition before the next business day. Windows updates can t protect against all possible attacks, but they can help to make your systems more secure. Update your web browsers, media players and other frequently-used software as well. Consider outsourcing your IT maintenance to keep your systems safe and up-to-date. Strategy 9: Install Antivirus Software on All Systems All workstations and servers in your practice should have the latest antivirus software installed. Keep this software active and up-to-date. Most antivirus programs automatically check for updates and allow you to schedule regular scans for infection. While antivirus software can t protect against all possible attacks, it can keep your network safer by blocking viruses and malware. Strategy 10: Back Up Your Practice Data Frequently Each backup should be on separate, secure and encrypted media. You should have multiple backups for multiple restore dates. For example, one backup from yesterday, another backup from two days ago, another backup from three days ago, and a fourth backup from two weeks ago. VIMALWARE Symptoms The sooner you can detect and remove malware from your system, the safer your dental practice will be. The following symptoms may indicate a malware infection. Contact your IT provider immediately if you notice any of these conditions: Malware detection software will not run. Antivirus software is disabled. Browser home page has changed. Computer settings have changed. Desktop wallpaper has changed. Fake antivirus programs appear. Firewall is disabled. Files or programs are missing. Pop-up windows or warning messages appear for no reason. Programs you don't remember installing appear on your computer. Websites get redirected. Task manager is disabled. Source: http://library.uchc.edu/departm/cec/ laptop/lapsafe.html SECURITY RISK ASSESSMENTS 5

Multiple backups on multiple media become critical if you later need to restore your data from a backup. Be sure that your backup media is secure. For example, some USB hard drives have built-in encryption and password protection. By setting a password on the drive, you can help keep your data secure. Dentrix ebackup is a reliable and secure solution for ensuring the safety of your patient data. The automated process backs up the files you want protected, at a convenient time, to a secure remote location. Why Not Get Professional Help? Protecting your dental practice from computer viruses and malware can be complicated and timeconsuming. Henry Schein TechCentral can help. Their trained field technicians and certified technical support staff specialize in technology for dental and medical practices. TechCentral offers consulting services, maintenance and support programs to keep your critical business systems running. Local IT firms can solve isolated problems and offer limited general services, but they simply can t match TechCentral s comprehensive technology and dental industry expertise. To learn more about TechCentral support and maintenance options, call 877.483.0382, option 1, or visit www. henryscheintechcentral.com. 6 SECURITY RISK ASSESSMENTS

SECURITY RISK ASSESSMENTS 7

2015 Henry Schein TechCentral.