Following the basic physician’s guide to COVID-19, health professionals are now facing a new kind of work environment because of the coronavirus pandemic. Now, many physicians are working from home and using technology to deliver medical health care. Fortunately, the current technology that we have allows every medical professional to do most of the things that they could do from their offices remotely at home.
With the use of telemedicine and the maximization of electronic health record (EHR) systems, it’s a huge step towards health care accessibility during the coronavirus pandemic. However, there are certain measures that physicians need to take to keep their work environment free from any potential cyber threats that would become a hindrance and disrupt your practice and negatively impact you and your patient’s well-being and safety.
The American Medical Association and the American Hospital Association have released reading resources to help physicians as the health care system transitions to telemedicine. Here are some of the key points when it comes to preventing and battling cybersecurity threats when it comes to health care:
Most likely, the main device that you’ll be using for your telemedicine is your personal computer (PC). It doesn’t matter what kind of device it is or what software it runs, you have to take into account the possible cyber threats that you might encounter especially with all the patient’s information and medical records on your PC.
Many medical organizations and institutions have been receiving reports of cybercriminals taking steps to infect computers and networks of physicians during the COVID-19 pandemic for the sake of stealing and holding medical records for ransom.
Here is a small checklist to keep your personal computer safe from viruses, malware, and hackers that pose a threat to information and confidentiality:
While your personal computer may have all the software it needs to prevent cybersecurity threats, it all boils down ultimately on how media literate you are. Being familiar with common cyber threats is helpful for you to determine what to do and not to do. Here are some of them:
Telemedicine requires having a strong, stable network for it to be effective in delivering health care. While most people would only concern themselves with the speed of their Internet, you might want to take note of overlooked nuances to keep your information safe.
Multiple devices are hooked onto your network. Your personal computer, cellphone, printers, and even your security network are all interlinked into your network. The more devices hooked into your Internet, the more risks that any device could be cyber-attacked which will lead to compromising your entire network.
If you don’t live alone and you share your network with your family or friends, brief them into taking extra care of their own digital footprints and activities. Certain weaknesses and breaches in your own network can be exploited by cybercriminals.
Keep in mind that as long as your device that contains sensitive information is connected, that means that it’s already potentially at risk. But, there are steps that you can take to lessen that risk.
If possible, have your IT department configure and set-up your computers. Make sure that you’re protected with a firewall and it’s already configured depending on the structure of your own network and its complexity.
The most basic thing that you can do is to make sure that your network is protected with a strong password. While your Internet Service Provider will already set-up a default password for your WiFi, the said password must be changed as soon as your router is installed. This is the same concept on why we change our ATM pins the moment we receive our card.
Be wary of giving your WiFi password as well. If you have a guest and they asked for it, it’s best that you personally input the information to their device and remind them to “forget” the network once they leave. Or, you could change the password again to keep your network safe. While this may seem extreme, think of the devices connected to your Internet as doors to your and your patients’ private information. If one door is unlocked for cybercriminals to access, then the safety of your whole network is compromised.