SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Information Security  Awareness Employee Training XYZ Medical Center Gene Hubbard, FISO
Purpose of this training The objective of this training is to prepare you to comply with the HIPAA Security Rule and other government regulations.  Our goal is to ensure the  confidentiality ,  integrity , and  availability  of all electronic protected health information (EPHI) that our facility creates, receives, maintains, or transmits.
Why Does XYZ Need Information Security? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Doing Your Part ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Keeping Passwords Private ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Case of the Busy Doctor… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating Quality Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protecting Against Email Viruses ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Case of the Mysterious Email Attachment… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Safe Internet Use ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Case of the Downloaded Screensaver… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Engineering: Recognizing Con Artists ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Engineering: Outwitting Them! ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Case of the Helpful Computer Technician… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Media Controls ,[object Object],[object Object],[object Object],[object Object]
What Else Can We Do? Be Aware! ,[object Object],[object Object],[object Object],[object Object]
What Else Can We Do? Be Aware! (Continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Auditing! ,[object Object],[object Object],[object Object],[object Object],[object Object]
Sanctions for violations ,[object Object],[object Object],[object Object],[object Object]
Examples of violations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Question and Answer
In Closing ,[object Object],[object Object],[object Object]
Additional Reference Material You should each have a pocket sized copy of our information Security Guide.  This is for your reference.
What if… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
It Would Never Happen Here… Impacts of viruses and worms on operations ,[object Object],[object Object],[object Object],[object Object]
Appropriate Access: What Should We See? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating Passphrases ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Passwords and User IDs:  Additional Protection ,[object Object],[object Object],[object Object],[object Object]
Best Practices for Working From Home ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protecting Laptops and PDAs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
HIPAA Security Rule ,[object Object],Confidentiality Data or information must not be available or disclosed to unauthorized persons. Integrity Data or information cannot be altered or destroyed in an unauthorized manner. Availability Data or information is accessible and usable upon demand by an authorized person.

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness TrainingBuy Custom Papers
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 

Was ist angesagt? (20)

Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 

Andere mochten auch

End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaAtlantic Training, LLC.
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutMarc Vael
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013Nidhi Gupta
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Companydanielblander
 
Employee security awareness communication
Employee security awareness communicationEmployee security awareness communication
Employee security awareness communicationSnapComms
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011darichardson
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 

Andere mochten auch (15)

End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by Pedraza
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Bpo Risk Management
Bpo Risk ManagementBpo Risk Management
Bpo Risk Management
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Security awareness training
Security awareness trainingSecurity awareness training
Security awareness training
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Malicious Software
Malicious SoftwareMalicious Software
Malicious Software
 
Bpo risk management 2013
Bpo risk management 2013Bpo risk management 2013
Bpo risk management 2013
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Company
 
Employee security awareness communication
Employee security awareness communicationEmployee security awareness communication
Employee security awareness communication
 
HIPAA Training - 2011
HIPAA Training - 2011HIPAA Training - 2011
HIPAA Training - 2011
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 

Ähnlich wie New Hire Information Security Awareness

New Hire Orientation Ppt
New Hire Orientation PptNew Hire Orientation Ppt
New Hire Orientation PptHALLEHUDSON
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Networkthowell
 
C:\Fakepath\Secprimodule
C:\Fakepath\SecprimoduleC:\Fakepath\Secprimodule
C:\Fakepath\SecprimoduleBrenda Kershaw
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School WorkshopRahul Nayan
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextBrian Pichman
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service DeskNorthCoastHDI
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Insurance Technologies Corporation (ITC)
 
Security Awareness Program
Security Awareness ProgramSecurity Awareness Program
Security Awareness ProgramDavid Wigton
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfVarinder K
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSlick Cyber Systems
 
Internet Security for Non-Techies
Internet Security for Non-TechiesInternet Security for Non-Techies
Internet Security for Non-TechiesRichard Bush
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptJOHN BABATUNDE LEE
 

Ähnlich wie New Hire Information Security Awareness (20)

New Hire Orientation Ppt
New Hire Orientation PptNew Hire Orientation Ppt
New Hire Orientation Ppt
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
C:\Fakepath\Secprimodule
C:\Fakepath\SecprimoduleC:\Fakepath\Secprimodule
C:\Fakepath\Secprimodule
 
Cyber Security School Workshop
Cyber Security School WorkshopCyber Security School Workshop
Cyber Security School Workshop
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
I’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take NextI’ve Been Hacked  The Essential Steps to Take Next
I’ve Been Hacked  The Essential Steps to Take Next
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
Security Features and Securing Your Data in TurboRater and InsurancePro - Kel...
 
Security Awareness Program
Security Awareness ProgramSecurity Awareness Program
Security Awareness Program
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 
Security in the enterprise - Why You Need It
Security in the enterprise - Why You Need ItSecurity in the enterprise - Why You Need It
Security in the enterprise - Why You Need It
 
Internet Security for Non-Techies
Internet Security for Non-TechiesInternet Security for Non-Techies
Internet Security for Non-Techies
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.pptCYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
 

New Hire Information Security Awareness

  • 1. Information Security Awareness Employee Training XYZ Medical Center Gene Hubbard, FISO
  • 2. Purpose of this training The objective of this training is to prepare you to comply with the HIPAA Security Rule and other government regulations. Our goal is to ensure the confidentiality , integrity , and availability of all electronic protected health information (EPHI) that our facility creates, receives, maintains, or transmits.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 22.
  • 23. Additional Reference Material You should each have a pocket sized copy of our information Security Guide. This is for your reference.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.

Hinweis der Redaktion

  1. Presenter’s Talking Points: Stress the impact to patient safety and patient care.
  2. Presenter’s Talking Points: Be sure to point out that John may not know that he downloaded a virus. Some malicious software works in a way that is invisible to the person that downloaded it. A site may look reputable, but that’s no guarantee that the software is safe to download. It’s important to stick with company approved software.
  3. Presenter’s Talking Points: This is a difficult type of attack to guard against because it requires each of us to recognize when we are being conned. As much as we want to believe the best of people, we still need to verify that a person is legitimate. The only way to guard against social engineers is for everyone to stay aware. It is important to learn how to recognize these kinds of con artists, what to do if you suspect a con artist has contacted you, and how you can guard against being a victim of such a con. Other potential warning signs: Have you been contacted by someone claiming to be high up in the Company, or by someone outside of the Company who would normally not call you? If they are asking you for sensitive information, no matter how good their excuse for asking, verify they are who they say they are and that they are authorized to obtain such information from you. Someone higher up in the Company will appreciate that you are cautious with sensitive information, and someone outside the Company should expect such caution!
  4. Presenter’s Talking Points: More ways to guard against social engineers: Ask for the name of their manager. This gives you a point of reference. You can always call their manager to verify the legitimacy of the contact. Refer the person to your Company or facility help desk. If someone is asking you for Company-related information, such as a dial-up connection number or information about how your computer works, your I.S. or Customer Services department should be able to help them. If they are legitimate, they will gladly call the help desk. Make sure you know Company and facility policies and standards. The best way to combat con artists is to be informed. If you are familiar with Company and facility policies and standards, you will better recognize when you are being asked to do something potentially dangerous.
  5. Presenter’s Talking Points: Sometimes the caller will request information other than your user ID or password, and the information may seem harmless. Examples may include: The name of a supervisor. They could use that information to place a call to someone else within the facility, claiming to be the supervisor. They could use the appearance of authority to pressure the individual into supplying additional information. The phone number used to dial in to the facility’s network. They could claim to be an individual from another department, who’s trying to access the network for legitimate business purposes. Con artists may collect information from several different individuals. The information collected from one person may not be harmful, but the collective information may give the con artist the ability to access our computer systems.
  6. Presenter’s Talking Points: It is also good practice to lock up video tapes when they are not in use.
  7. Presenter’s Talking Points: Exiting applications and turning on password protected screensavers keep your workstation secure from passersby. Ask if everyone knows how to how to turn on the password protected screensaver when they leave their workstation. If they don’t, explain how. If someone else’s user ID appears on a computer that you should be the only user of, it could be an indication that someone has attempted to (or has successfully) accessed your computer. ( Note to Presenter: Make sure everyone understands this point. Training on this topic is a specific HIPAA Security requirement.) If you are locked out of a system and you haven’t had 3 or more unsuccessful login attempts, it could be an indication that someone has attempted to access a system using your user ID. ( Note to Presenter: Make sure everyone understands this point. Training on this topic is a specific HIPAA Security requirement.)
  8. Presenter’s Talking Points: Make sure they know how to contact the FISO, HDIS, and (if applicable) IT helpdesk staff. Add the contact numbers to this slide or provide participants with a handout containing the proper contact names and numbers.
  9. Presenter’s Talking Points: Be sure to stress that protected health information is more valuable to our patients than financial information. Whereas money can be replaced by your financial institution, a breach of patient privacy and safety cannot be undone.
  10. Presenter’s Talking Points: Although the financial impact of a virus or worm can be substantial, the important point to stress is the potential impact to our patients.
  11. Presenter’s Talking Points: Reference the Information Security Guide, pages 6-7, for more information about how to create quality passwords.
  12. Notes to Presenter: Make them aware of which systems/applications they use that do not automatically enforce these requirements. Once the Authentication Standard is updated to allow a password change interval of 180 days, change the password change interval on this slide from 90 days to 180 days. If you are using the password change interval as a mitigating control for the vulnerability, “Application account lockout is not enabled,” change the slide text above to reflect a more frequent password change interval. Presenter’s Talking Points: Instruct them regarding how to change their password(s) for the application(s)/system(s) in question. Explain the importance of individual user accounts for accessing sensitive or confidential data. Explain that they could potentially be blamed for someone else inappropriately accessing information using that same user ID.
  13. Presenter’s Talking Points: If the computer is used for Company purposes, including checking email, it is important to set up automatic updates to be certain all available security updates are applied. This helps guard the network from viruses and other attacks that could compromise the availability of key clinical systems, essentially affecting patient care in our hospitals. You can contact your facility IT staff for step-by-step instructions to properly secure your home PC in accordance with Company standards. Reference IS.SEC.001 Information Security – Program Requirements Policy, as well as the IT&S Mobile Computing and Virus Control Standards.