Tuesday, April 3, 2012

Houston-Healthcare | Houston-EMR

http://citiscapeit.com


From a developers point of view, an I.T. system needs to provide sufficient tools to fine-tune security and system access, however, it remains the responsibility of those in charge of the health care environment to correctly implement these tools to protect PHI. This is our specialty at Citiscape IT.



http://citiscapeit.com/Houston-Information-Security.html






We would suggest the following as the bare minimum requirements for any health care I.T. system:

The system should be configurable to allow or deny access to any part of the system that may contain patient info. This access can be fine tuned to allow read/update/insert and delete permissions to prevent unauthorized viewing/changing/creation or deletion of patient info.


Complete audit trail of: WHO changed, created or deleted WHAT.It must also limit access to reports containing patient info. If you cannot view certain data, you should also not be able to generate any reports that allow you to do so. This is a common mistake made by I.T. Systems.


http://citiscapeit.com/Houston-IT-Audit.html


The ability tot distinguish between routine patient info and confidential patient info. Some lab tests are "more" confidential than others and may only be viewed and updated by a select few. Point 3 above is a common problem for this level of confidentiality.

If you email confidential data, it should be encrypted and password protected.

A system capable of distinguishing between confidential and routine data should also then be able to limit where this data may be printed. Some systems, for instance, does not allow the printing of confidential results directly to ward printers, instead we define a single "Confidential Printer" per site as the only printer that will allow users to print confidential results. This printer may be in a locked cupboard or supervisor office, or it may be a printer that automatically places all reports in sealed envelopes.



http://citiscapeit.com

We specialize in Houston-Healthcare IT Projects
Citiscape IT
281-733-2422
Call us for EMR Projects and Business Practice Needs


Monday, April 2, 2012

Houston-Healthcare | HIPAA Security

http://citiscapeit.com

How Safe Is Wi-Fi?

Society is increasingly moving from the Information Age to the Connected Age and so Wi-Fi has become very popular.  Case in point.  You’re on the move so much and need to stay connected to your office, your clients, your children and their schools, your friends and other events, and so you connect everywhere you go through smart phones and laptop computers.  You connect at local Wi-Fi coffee shops, bookstores, fast food restaurants, airports, hotels, grocery stores, shopping malls, and libraries.

But, how safe is this?  While you’re using a Wi-Fi connection, any other user within range could be monitoring your internet usage if your device is not protected.  Sending unencrypted information over any unfamiliar network can turn your computer into an “open book” with pages full of your “personal” information.

http://citiscapeit.com
Wi-Fi zones in airports, hotels, coffee shops, and the like are generally designed for ease of use and convenience, rather than security. The ability to get online quickly and freely often trumps network security protection.  So, what can you do to be safe?


Protect your connection device.  Busy Wi-Fi locations are target rich environments for the potential hacker.  A recent conference of internet professionals pointed out that by simply running a sniffer program (available free on the internet) on the local network they can easily obtain your private information such as login usernames and passwords, if your device is unprotected.

Install security software and keep it updated.  Just as with regular wired connections, personal firewalls can alert you if your computer's wireless connection is being invaded and can block the intrusion.  You might look for security software which provides not only antivirus, antispyware, and antimalware security, but also a software security firewall which will alert you if anyone is attempting access to your device.


http://citiscapeit.com/Houston-Information-Security.html



Secure login.  If you are accessing a page that requires a login and password, or if you are entering ANY personal data (credit card, SSN, etc) be sure that you are on a secure site. Simply check that the web address begins with https instead of the usual http and your information will be safely encrypted before transmission. As long as you're on a page with an address that begins with https, the data you send and receive is protected from sniffers and snoopers.
Web-based email.  Be on your guard, some web-based email providers have a secure login page and after you're logged in the access reverts to normal non-encrypted mode, so any email you send or receive while on a wireless connection is out in the clear.  Look for the link or checkbox for the secure login when accessing your web-based email. If your service doesn't offer one, consider switching or decide to live with the security exposure.
Shoulder Surfers.  Just like when you're entering your PIN code at an ATM, you need to keep an eye open for anyone who might be glancing over your shoulder while you hunt and peck in the airport or coffee shop.

Use strong passwords. Whether it's a virtual private network, a laptop, or your home computer you share with your family, the weakest point of security is the login. Using commonly guessable passwords or default passwords ("admin," "password," etc.) can render your computer open to anyone who wants a look at the contents. Use random combinations of letters and numbers for passwords and change them frequently. 

http://citiscapeit.com/Houston-IT-Audit.html


Don't automatically connect to open networks.  Many laptops have wireless connections set to pick up any open signal by default. While this may be convenient, it can also open you up to security risks. It's best to set your wireless connection to work manually, so that it only connects to networks when you instruct it to.

Disable P2P connections.  Many Wi-Fi hackers set up "ad hoc" networks disguised to look like verifiable networks in airports and the like. They'll usually have names like "Free Wifi", "Free Airport Wireless," etc., and many ad hoc culprits will camouflage their fake networks to look exactly like the real thing. Turn off your P2P connections for wireless unless you're certain you are connecting to a verified, trusted network.

Power down. If you're working offline for extended periods of time, shut down or disable your wireless connection. Every minute you're on someone else's wireless network is a minute you're exposing your device and your data to intruders.