SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
1
PLUS, ONE FAST WAY TO FIND THEM
©2013 Gordon Flesch Company, Inc.	 www.gflesch.com	 GWP03
YOUR PRACTICE DEPENDS ON INTELLIGENCE.
BUT CAN
YOU COUNT ON YOUR TECHNOLOGY?
You may not be in the intelligence technology business, but it’s
probably impossible to imagine your practice without IT. Today,
computing technology plays a vital role in the way you serve,
work with, and communicate to your patients and clients. Thanks
to advances that have made technology more powerful yet less
expensive, even the smallest operation can enjoy capabilities—in
everything from marketing and sales to delivery and fulfillment—that
were once the sole domain of large enterprises.
But today’s big IT advantages come with major risks. Your networks
and systems serve as your silent partner in operations. Should they
fail—and when they do, it’s usually without warning—you’re exposed
not just to an IT problem, but to a potentially large business problem.
This brief paper exposes 10 silent threats that might be quietly
undermining your operations now—and proposes one quick, easy and
FREE way to bring these threats under control, fast.
RISK #10: WRONG KEYS IN THE WRONG HANDS
It’s just common sense: you restrict crucial information, such as bank
accounts and inventory access, to carefully designated employees.
Yet many companies have lost control of their network’s user level
access privileges, exposing vital company data to people without
authorization. Patient data is precious: under the audit provisions of
the 2009 Health Information Technology for Economic and Clinical
Health Act (HITECH), the maximum penalty for breach of HIPAA
compliance is up to $1.5 million. One of the first steps toward
security is to be sure the right people have the right level of access to
appropriate applications and data.
TEN HIDDEN IT RISKS THAT THREATEN
YOUR HEALTHCARE PRACTICE
Have you assigned
appropriate access levels
and authority to restrict
data and applications to
the right people?
Healthcare Services Briefing Report sponsored by the Gordon Flesch Company.
2
TEN HIDDEN IT RISKS THAT THREATEN YOUR HEALTHCARE PRACTICE
©2013 Gordon Flesch Company, Inc.	 www.gflesch.com	 GWP03
RISK #9: BRING YOUR OWN HEADACHE
On the one hand, new devices such as smart phones and tablets
can increase employee productivity—and when employees use their
own devices, it saves the practice money. But this new “bring your
own device” (BYOD) environment brings new headaches, too. These
devices are easily lost and stolen. When they are, any information
available to the device—including confidential business and patient
data—may be vulnerable to illicit access. Yet fewer than 50% of
businesses report the ability to use data encryption and/or remote
data wiping to protect their assets. Take stock of your data inventory:
you need to share permissions reports that reveal which devices and
users have access to which files and applications.
RISK #8: WHO’S KNOCKING AT YOUR BACKDOOR?
Your practice isn’t limited to your own systems. Thanks to access
to outside servers and systems, you can leverage potent tools like
Gmail and Dropbox to manage customer communications, share
files and more. While these cloud services increase your capabilities
without busting your IT budget, it’s important to remember that
every connection that reaches out from your network may open an
opportunity for someone else to reach in. Protect your portals: run an
external vulnerability scan that reveals every “backdoor” through which
an intruder might break into your network.
RISK #7: “WET PAPER BAG” PASSWORDS
Your password protections are only as strong as the passwords
themselves. Having no passwords—or using obvious passwords such
as “12345”—undermines the very protection you seek. Yet employees
often fail to establish passwords or, when they do, frequently use
ineffective ones. Review your passwords’ strength to identify weak
spots any unauthorized user could punch through.
RISK #6: WHOA, BACK UP
If you lost a significant chunk of your data right now, how much
business would you lose as well? Too many businesses run without
sufficient policies, plans and procedures for backing up critical data
essential to their ability to operate. If your practice depends on
Can you create and
review permission
reports that tell you
which devices and
personnel have access
to which data and
applications?
Are the connections
you use to access
online services
protected against
backdoor invasions
by unauthorized
intruders?
3
TEN HIDDEN IT RISKS THAT THREATEN YOUR HEALTHCARE PRACTICE
©2013 Gordon Flesch Company, Inc.	 www.gflesch.com	 GWP03
manual procedures that are executed inconsistently, you’re exposed to
unnecessary losses; it’s time to look for automated backup solutions
that are always at work—even when employees might be forgetful.
RISK #5: SHOW ME THE COMPLIANCE
Patient data demands special attention. In fact, when you’re in
the healthcare industry, the law obliges you to preserve client
confidentiality—and demonstrate that you have processes in place
to ensure compliance with numerous regulatory standards, including
HIPAA, HITECH, Federal Information Security Management
Act (FISMA), Sarbanes-Oxley (SOX), and Federal Rules of Civil
Procedure (FRCP). The best way to prepare for a regulatory audit is
to run regular compliance audits of your own that allow you to take
corrective actions before your operation is called into account.
RISK #4: PRINTING (LOST) MONEY
Despite high hopes for the “paperless” office, the reality is that
businesses spend lots of money printing, faxing, copying and
scanning paper documents. Consider the math: paper plus toner plus
maintenance plus employee time, etc. It’s possible to bring these
printing costs under control, but the first step is to discover who prints
what, how often, and why. By monitoring your multifunction printers,
you can limit access to authorized users, discourage unnecessary or
wasteful usage, and encourage less-expensive options—such as scan
to email or scan to file directories—that save time and money.
RISK #3: “GHOSTS” IN THE MACHINES
There may be “ghosts” haunting your networks—inactive users or
inactive computers that remain part of your system, even if they are
no longer contributing to your productivity. While the threat may not
be immediately obvious, defunct computers represent an expense you
don’t need to carry. Worse, inactive users may reflect open accounts
(perhaps of people who are no longer employed by your practice) that
could present security holes for unauthorized access. Run audits that
show you what’s active or not, then clean house—and close security
loopholes—by burying the “dead” devices and accounts.
Are your data and
applications password
protected, and are
your employees using
sufficiently strong
passwords to ensure
security?
Do you use automated
backup programs
for data protection,
rather than random
and irregular manual
backups?
4
TEN HIDDEN IT RISKS THAT THREATEN YOUR HEALTHCARE PRACTICE
©2013 Gordon Flesch Company, Inc.	 www.gflesch.com	 GWP03
RISK #2: WHEN IT CAN’T KEEP UP, YOUR BUSINESS GOES DOWN
Smart businesses and wise managers protect their critical networks with
redundancy: backup servers and routers that are designed to kick in should
the main system go down. But the contingency plan is only as good as the
processes and practices behind them; should these be inoperative, your
practice will not maintain continuity in an emergency. To safeguard your
operations, analyze your network before disaster strikes to be sure that
your contingency technologies—such as your backup designated router
or alternate domain control—are online and ready for action.
RISK #1: HIDING IN THE DARK
You want to run your practice, not an IT department. While IT may
not be top of mind, it should never be out of sight. Lack of vision into
the true status of your technology, and the quality of your defenses
against attack or failure, may leave your practice vulnerable to
disruption, legal consequences and loss of revenue. By implementing
regular monitoring and review procedures, however, you can anticipate
challenges before they become problems, and take adequate
measures to ensure the smooth conduct of your practice.
HAVE YOU INOCULATED YOUR PRACTICE?
According to a Forrester Consulting report, 89% of healthcare
organizations have some percentage of their staff working off-site
at least one day a week; more than 10% have experienced more than one
security breach in any given year. Given the ethical demands of patient
confidentiality and the legal requirements imposed by numerous regulatory
bodies, every healthcare practice needs safe, simple and secure ways to:
•	 Maintain consistent security policies across ALL devices,
including computers, laptops, tablets, smart phones and more—
any place where data may be exposed
•	 Remove sensitive data remotely from lost
or stolen devices
•	 Block unauthorized access to data, devices
and applications
•	 Distribute and enforce password protection, encryption
and security updates
If the regulators arrived
at your door, are you
confident you comply
with legal and regulatory
mandates for your data?
5
TEN HIDDEN IT RISKS THAT THREATEN YOUR HEALTHCARE PRACTICE
©2013 Gordon Flesch Company, Inc.	 www.gflesch.com	 GWP03
ARE YOU SURE YOUR IT IS A SURE THING?
We all depend on IT. Given the stakes, it’s important our confidence is
well placed. Are you sure the technology you rely upon is adequately
protected? In our experience, nine out of ten companies have
undetected vulnerabilities that could lead to data disaster.
Take a moment to complete this quick self-analysis. If you cannot
answer yes to every question, request our FREE network assessment
to give yourself—and your practice—the confidence you deserve.
•	 Is your system cleared of ghosts users and
computers that waste resources and expose your
network to unauthorized access?
•	 Can you verify that your data recovery and
network restoration plans are operative and ready
to work in an emergency?
•	 Do you have timely and actionable visibility into
your IT status, so that you can intercept problems
before they interrupt your practice?
Give yourself, and your business, a “yes” vote of confidence by
requesting our FREE network assessment, a $1,500 value! Your
network assessment will give you insight into the true status of your IT
system, and point the way to appropriate corrective actions you can
make to secure your business effectively and efficiently.
To get your FREE network assessment, visit gflesch.com.

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Kürzlich hochgeladen (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Empfohlen

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

Empfohlen (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Ten Hidden Risks That Threaten Your Healthcare Practice

  • 1. 1 PLUS, ONE FAST WAY TO FIND THEM ©2013 Gordon Flesch Company, Inc. www.gflesch.com GWP03 YOUR PRACTICE DEPENDS ON INTELLIGENCE.
BUT CAN YOU COUNT ON YOUR TECHNOLOGY? You may not be in the intelligence technology business, but it’s probably impossible to imagine your practice without IT. Today, computing technology plays a vital role in the way you serve, work with, and communicate to your patients and clients. Thanks to advances that have made technology more powerful yet less expensive, even the smallest operation can enjoy capabilities—in everything from marketing and sales to delivery and fulfillment—that were once the sole domain of large enterprises. But today’s big IT advantages come with major risks. Your networks and systems serve as your silent partner in operations. Should they fail—and when they do, it’s usually without warning—you’re exposed not just to an IT problem, but to a potentially large business problem. This brief paper exposes 10 silent threats that might be quietly undermining your operations now—and proposes one quick, easy and FREE way to bring these threats under control, fast. RISK #10: WRONG KEYS IN THE WRONG HANDS It’s just common sense: you restrict crucial information, such as bank accounts and inventory access, to carefully designated employees. Yet many companies have lost control of their network’s user level access privileges, exposing vital company data to people without authorization. Patient data is precious: under the audit provisions of the 2009 Health Information Technology for Economic and Clinical Health Act (HITECH), the maximum penalty for breach of HIPAA compliance is up to $1.5 million. One of the first steps toward security is to be sure the right people have the right level of access to appropriate applications and data. TEN HIDDEN IT RISKS THAT THREATEN YOUR HEALTHCARE PRACTICE Have you assigned appropriate access levels and authority to restrict data and applications to the right people? Healthcare Services Briefing Report sponsored by the Gordon Flesch Company.
  • 2. 2 TEN HIDDEN IT RISKS THAT THREATEN YOUR HEALTHCARE PRACTICE ©2013 Gordon Flesch Company, Inc. www.gflesch.com GWP03 RISK #9: BRING YOUR OWN HEADACHE On the one hand, new devices such as smart phones and tablets can increase employee productivity—and when employees use their own devices, it saves the practice money. But this new “bring your own device” (BYOD) environment brings new headaches, too. These devices are easily lost and stolen. When they are, any information available to the device—including confidential business and patient data—may be vulnerable to illicit access. Yet fewer than 50% of businesses report the ability to use data encryption and/or remote data wiping to protect their assets. Take stock of your data inventory: you need to share permissions reports that reveal which devices and users have access to which files and applications. RISK #8: WHO’S KNOCKING AT YOUR BACKDOOR? Your practice isn’t limited to your own systems. Thanks to access to outside servers and systems, you can leverage potent tools like Gmail and Dropbox to manage customer communications, share files and more. While these cloud services increase your capabilities without busting your IT budget, it’s important to remember that every connection that reaches out from your network may open an opportunity for someone else to reach in. Protect your portals: run an external vulnerability scan that reveals every “backdoor” through which an intruder might break into your network. RISK #7: “WET PAPER BAG” PASSWORDS Your password protections are only as strong as the passwords themselves. Having no passwords—or using obvious passwords such as “12345”—undermines the very protection you seek. Yet employees often fail to establish passwords or, when they do, frequently use ineffective ones. Review your passwords’ strength to identify weak spots any unauthorized user could punch through. RISK #6: WHOA, BACK UP If you lost a significant chunk of your data right now, how much business would you lose as well? Too many businesses run without sufficient policies, plans and procedures for backing up critical data essential to their ability to operate. If your practice depends on Can you create and review permission reports that tell you which devices and personnel have access to which data and applications? Are the connections you use to access online services protected against backdoor invasions by unauthorized intruders?
  • 3. 3 TEN HIDDEN IT RISKS THAT THREATEN YOUR HEALTHCARE PRACTICE ©2013 Gordon Flesch Company, Inc. www.gflesch.com GWP03 manual procedures that are executed inconsistently, you’re exposed to unnecessary losses; it’s time to look for automated backup solutions that are always at work—even when employees might be forgetful. RISK #5: SHOW ME THE COMPLIANCE Patient data demands special attention. In fact, when you’re in the healthcare industry, the law obliges you to preserve client confidentiality—and demonstrate that you have processes in place to ensure compliance with numerous regulatory standards, including HIPAA, HITECH, Federal Information Security Management Act (FISMA), Sarbanes-Oxley (SOX), and Federal Rules of Civil Procedure (FRCP). The best way to prepare for a regulatory audit is to run regular compliance audits of your own that allow you to take corrective actions before your operation is called into account. RISK #4: PRINTING (LOST) MONEY Despite high hopes for the “paperless” office, the reality is that businesses spend lots of money printing, faxing, copying and scanning paper documents. Consider the math: paper plus toner plus maintenance plus employee time, etc. It’s possible to bring these printing costs under control, but the first step is to discover who prints what, how often, and why. By monitoring your multifunction printers, you can limit access to authorized users, discourage unnecessary or wasteful usage, and encourage less-expensive options—such as scan to email or scan to file directories—that save time and money. RISK #3: “GHOSTS” IN THE MACHINES There may be “ghosts” haunting your networks—inactive users or inactive computers that remain part of your system, even if they are no longer contributing to your productivity. While the threat may not be immediately obvious, defunct computers represent an expense you don’t need to carry. Worse, inactive users may reflect open accounts (perhaps of people who are no longer employed by your practice) that could present security holes for unauthorized access. Run audits that show you what’s active or not, then clean house—and close security loopholes—by burying the “dead” devices and accounts. Are your data and applications password protected, and are your employees using sufficiently strong passwords to ensure security? Do you use automated backup programs for data protection, rather than random and irregular manual backups?
  • 4. 4 TEN HIDDEN IT RISKS THAT THREATEN YOUR HEALTHCARE PRACTICE ©2013 Gordon Flesch Company, Inc. www.gflesch.com GWP03 RISK #2: WHEN IT CAN’T KEEP UP, YOUR BUSINESS GOES DOWN Smart businesses and wise managers protect their critical networks with redundancy: backup servers and routers that are designed to kick in should the main system go down. But the contingency plan is only as good as the processes and practices behind them; should these be inoperative, your practice will not maintain continuity in an emergency. To safeguard your operations, analyze your network before disaster strikes to be sure that your contingency technologies—such as your backup designated router or alternate domain control—are online and ready for action. RISK #1: HIDING IN THE DARK You want to run your practice, not an IT department. While IT may not be top of mind, it should never be out of sight. Lack of vision into the true status of your technology, and the quality of your defenses against attack or failure, may leave your practice vulnerable to disruption, legal consequences and loss of revenue. By implementing regular monitoring and review procedures, however, you can anticipate challenges before they become problems, and take adequate measures to ensure the smooth conduct of your practice. HAVE YOU INOCULATED YOUR PRACTICE? According to a Forrester Consulting report, 89% of healthcare organizations have some percentage of their staff working off-site at least one day a week; more than 10% have experienced more than one security breach in any given year. Given the ethical demands of patient confidentiality and the legal requirements imposed by numerous regulatory bodies, every healthcare practice needs safe, simple and secure ways to: • Maintain consistent security policies across ALL devices, including computers, laptops, tablets, smart phones and more— any place where data may be exposed • Remove sensitive data remotely from lost or stolen devices • Block unauthorized access to data, devices and applications • Distribute and enforce password protection, encryption and security updates If the regulators arrived at your door, are you confident you comply with legal and regulatory mandates for your data?
  • 5. 5 TEN HIDDEN IT RISKS THAT THREATEN YOUR HEALTHCARE PRACTICE ©2013 Gordon Flesch Company, Inc. www.gflesch.com GWP03 ARE YOU SURE YOUR IT IS A SURE THING? We all depend on IT. Given the stakes, it’s important our confidence is well placed. Are you sure the technology you rely upon is adequately protected? In our experience, nine out of ten companies have undetected vulnerabilities that could lead to data disaster. Take a moment to complete this quick self-analysis. If you cannot answer yes to every question, request our FREE network assessment to give yourself—and your practice—the confidence you deserve. • Is your system cleared of ghosts users and computers that waste resources and expose your network to unauthorized access? • Can you verify that your data recovery and network restoration plans are operative and ready to work in an emergency? • Do you have timely and actionable visibility into your IT status, so that you can intercept problems before they interrupt your practice? Give yourself, and your business, a “yes” vote of confidence by requesting our FREE network assessment, a $1,500 value! Your network assessment will give you insight into the true status of your IT system, and point the way to appropriate corrective actions you can make to secure your business effectively and efficiently. To get your FREE network assessment, visit gflesch.com.