Eyeworld

MAY 2015

EyeWorld is the official news magazine of the American Society of Cataract & Refractive Surgery.

Issue link: https://digital.eyeworld.org/i/511377

Contents of this Issue

Navigation

Page 70 of 106

OPHTHALMOLOGY BUSINESS 68 May 2015 could also serve as a useful backup to your primary connection, if need- ed. This separate public network (usually wireless) with eased restric- tions for use by patients/visitors and staff at appropriate times eliminates the threat of any cross-contamina- tion. Consider this added expense cheap insurance and a cost effective alternative to an expensive data breach. Wait—isn't that what security software is for? Yes, but even the best security software packages do not catch every piece of malware every time, and a single mistake can be costly. The average cost of a single record lost is $201. 1 Most data breaches involve thousands of records. Digital hand washing training Technology can provide the tools, but that is not where real security starts. As with infection control in the operating room, security starts with staff training. Staff should be educated about good passwords and basic security procedures, and how to recognize and report any suspi- cious activity. Digital security, like hand wash- ing, can and should become part of the practice's culture. Technology security can be a rapidly moving target, but sticking to the policies, procedures, and protocols for data infection control can make the tar- get much easier to hit. It is possible to protect your patients—and their data—from infection. EW References 1. 2014 Cost of Data Breach Study: United States Ponemon Institute, May 2014. www. Digital infection continued from page 67 As Medical Consulting Group's information technology and web services consultant, Mr. Gallagher plans and implements digital strategy. He can be contacted at bgallagher@medcgroup.com. About the author " As with infection control in the operating room, security starts with staff training. Staff should be educated about good passwords and basic security procedures, and how to recognize and report any suspicious activity. " accudatasystems.com/assets/2014-cost-of-a- data-breach-study.pdf 2. splashdata.com/press/worst-passwords- of-2014.htm Leaky passwords H ere are the top 10 most abused passwords in 2014 according to SplashData's study compiled from 3.3 million leaked passwords. 2 If you have one of these passwords please go change it now. 1. 123456 2. password 3. 12345 4. 12345678 5. qwerty 6. 123456789 7. 1234 8. baseball 9. dragon 10. football 2013's popular "iloveyou" is missing from the most recent list.

Articles in this issue

Links on this page

Archives of this issue

view archives of Eyeworld - MAY 2015