OPHTHALMOLOGY BUSINESS
68
May 2015
could also serve as a useful backup
to your primary connection, if need-
ed. This separate public network
(usually wireless) with eased restric-
tions for use by patients/visitors and
staff at appropriate times eliminates
the threat of any cross-contamina-
tion.
Consider this added expense
cheap insurance and a cost effective
alternative to an expensive data
breach.
Wait—isn't that what security
software is for? Yes, but even the
best security software packages do
not catch every piece of malware
every time, and a single mistake
can be costly. The average cost of
a single record lost is $201.
1
Most
data breaches involve thousands of
records.
Digital hand washing training
Technology can provide the tools,
but that is not where real security
starts. As with infection control in
the operating room, security starts
with staff training. Staff should be
educated about good passwords and
basic security procedures, and how
to recognize and report any suspi-
cious activity.
Digital security, like hand wash-
ing, can and should become part of
the practice's culture. Technology
security can be a rapidly moving
target, but sticking to the policies,
procedures, and protocols for data
infection control can make the tar-
get much easier to hit. It is possible
to protect your patients—and their
data—from infection. EW
References
1. 2014 Cost of Data Breach Study: United
States Ponemon Institute, May 2014. www.
Digital infection continued from page 67
As Medical Consulting
Group's information
technology and web
services consultant, Mr.
Gallagher plans and
implements digital
strategy. He can be
contacted at bgallagher@medcgroup.com.
About the author
"
As with infection control in the
operating room, security starts with
staff training. Staff should be
educated about good passwords
and basic security procedures,
and how to recognize and report
any suspicious activity.
"
accudatasystems.com/assets/2014-cost-of-a-
data-breach-study.pdf
2. splashdata.com/press/worst-passwords-
of-2014.htm
Leaky passwords
H
ere are the top 10 most abused
passwords in 2014 according
to SplashData's study compiled
from 3.3 million leaked passwords.
2
If you have one of these
passwords please go change it now.
1. 123456
2. password
3. 12345
4. 12345678
5. qwerty
6. 123456789
7. 1234
8. baseball
9. dragon
10. football
2013's popular "iloveyou" is missing
from the most recent list.