September 24, 2014
Brian Solomon
 Keep a clean computer
 Data/ePHI Security at the Workstation
 Passwords
 Summary
 References
Brian Solomon 2
 Never open email attachments from unknown senders.
 Never re-send “chain-mail.”
 Keep your operating system software up to date.
 Install anti-spyware software and keep it updated.
 Install anti-virus software and keep it updated.
 Make sure your firewall is enabled.
 Use strong passwords (See Password section).
 Remove unnecessary software.
 Use secure system configuration settings (browser, email, etc…).
Brian Solomon 3
 Never provide passwords or other personal information via email.
 Log off your computer when you leave your workstation.
 Use a strong screen saver with password. Password-protected
screensavers should be enabled on workstation/laptops with a time-
out interval deemed appropriate.
 All sensitive information such as ePHI must be encrypted.
 Periodically backup your data.
 If external data drives are used (CDs, flash drives, etc..), secure them
before leaving your workstation.
 Have your IT department evaluate any shareware or free software
before downloading.
Brian Solomon 4
 Passwords ought to have a minimum of six alphanumeric characters
in length.
 A “Strong” password contains a combination of upper and lower case
letters, numbers, and special characters (&, #, !, @, etc…).
 Passwords should not contain a word found in the dictionary, in any
language, slang, jargon nor represent a name.
 Passwords should expire, be changed, every 90 to 180 days.
 If passwords need to be written down or stored on-line, they should
be stored in a secure place separate from the application or system
that is being protected by the password.
Brian Solomon 5
 Employees should not use the “Remember Password” feature of their
computer or installed applications.
 Employee passwords and account information should never be
shared.
 In rare cases where password sharing is unavoidable, restricted
account access should be established by the IT staff.
 Password audits should be performed on a periodic basis by the IT
staff.
Brian Solomon 6
 Never open email attachments from unknown senders.
 Never re-send “chain-mail.”
 Use strong passwords.
 Never provide passwords or other personal information via email.
 Log off your computer when you leave your workstation.
 If external data drives are used (CDs, flash drives, etc..), secure them
before leaving your workstation.
 Do not use the “Remember Password” feature of the computer or
installed applications.
Brian Solomon 7
 Reference to HIPAA Standard: Security Management Process
(161.308(a)(1));
 Information Access Management (161.308(a)(4));
 Security Awareness and Training (161.308(a)(5));
 Access Control (161.312(a));
 Person or Entity Authentication (164.312(d)),
 Workstation Use 164.310(b);
 Workstation Security 164.310(c).
Brian Solomon 8

More Related Content

PPTX
Safe computing (Tips & Tricks)
PPT
Lecture 1
PPTX
How to Improve Computer Security - Wikki Verma
PPTX
System security by Amin Pathan
PPTX
Ethical hacking (Hackingmantra)
PPTX
Managing i.t security
PPT
Ch # 10 computer security risks and safe guards
PPTX
Poicy 121
Safe computing (Tips & Tricks)
Lecture 1
How to Improve Computer Security - Wikki Verma
System security by Amin Pathan
Ethical hacking (Hackingmantra)
Managing i.t security
Ch # 10 computer security risks and safe guards
Poicy 121

What's hot (19)

PDF
Operating systems security 2007 vulnerability report
PDF
Epas - Enterprise Password Assessment Solution
PPTX
Operating system security
ODP
Trojan
PDF
Trojan
ODT
Trojan
PPTX
Presentation
DOCX
Security Plan for Small Networks/Offices
PDF
Poicy 121
PPTX
Why do you need the advanced protection of the Internet Security Product / Ma...
PPTX
Computer Security
PPTX
PPTX
Computer Viruses
PPTX
Website security
PPTX
Security in Windows operating system
PPT
PPTX
Remove S.ytimg.com
PPTX
System tThreats
PPTX
Safeguarding Your Data
Operating systems security 2007 vulnerability report
Epas - Enterprise Password Assessment Solution
Operating system security
Trojan
Trojan
Trojan
Presentation
Security Plan for Small Networks/Offices
Poicy 121
Why do you need the advanced protection of the Internet Security Product / Ma...
Computer Security
Computer Viruses
Website security
Security in Windows operating system
Remove S.ytimg.com
System tThreats
Safeguarding Your Data
Ad

Viewers also liked (11)

PPT
Desktop Pc Computer Security
PPT
Desktop Security 8 9 07
PPT
Security Training 2008
PPTX
Security Basics
PPT
Iker Power Point
PPTX
See the Future
PPT
Keeping Your Computer Secure
PPT
Current Emerging Threats
PDF
Emerging Threats - The State of Cyber Security
PPT
ITE v5.0 - Chapter 7
PDF
Computer Security Threats
Desktop Pc Computer Security
Desktop Security 8 9 07
Security Training 2008
Security Basics
Iker Power Point
See the Future
Keeping Your Computer Secure
Current Emerging Threats
Emerging Threats - The State of Cyber Security
ITE v5.0 - Chapter 7
Computer Security Threats
Ad

Similar to Tips for Securing Your Workstation (20)

PPT
PowerPoint-2b.-HIPAA-Security-Awareness-Training.ppt
PPT
Module2_General_Security
PPT
electinfor safesecurityfor safety24july .ppt
PDF
CyberSecurity Cyber24x7.pdf
PPT
Intro to Information Security.ppt
PDF
Penntech IT Solutions and cyber security
PDF
Information Security
PPTX
DTI_Information Security Trainig_07-12-2020.pptx
PDF
Information security awareness, middle management
PPTX
Team black
PPTX
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
PPTX
IT_Security_Awareness_Detailed_PPT1.pptx
PDF
Information security for health practitioners
PPTX
Awareness Training on Information Security
PPTX
CYBER SECURITY AWARENESS POWERPOINT.pptx
PDF
Building a culture of security
PPTX
Cyber Security School Workshop
PPTX
Information Security - Privacy and Security.pptx
PPTX
Security Awareness 101
PPTX
Information security
PowerPoint-2b.-HIPAA-Security-Awareness-Training.ppt
Module2_General_Security
electinfor safesecurityfor safety24july .ppt
CyberSecurity Cyber24x7.pdf
Intro to Information Security.ppt
Penntech IT Solutions and cyber security
Information Security
DTI_Information Security Trainig_07-12-2020.pptx
Information security awareness, middle management
Team black
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
IT_Security_Awareness_Detailed_PPT1.pptx
Information security for health practitioners
Awareness Training on Information Security
CYBER SECURITY AWARENESS POWERPOINT.pptx
Building a culture of security
Cyber Security School Workshop
Information Security - Privacy and Security.pptx
Security Awareness 101
Information security

Recently uploaded (20)

PPTX
Fever and skin rash - Approach.pptxBy Dr Gururaja R , Paediatrician. An usef...
PPTX
ANALGESIC AND ANTI-INFLAMMssssssATORY DRUGS.pptx
PPTX
ACUTE CALCULAR CHOLECYSTITIS: A CASE STUDY
PPTX
osteoporosis in menopause...............
PPTX
Acute renal failure.pptx for BNs 2nd year
PPTX
Full Slide Deck - SY CF Talk Adelaide 10June.pptx
PPTX
Nancy Caroline Emergency Paramedic Chapter 14
PPTX
Nancy Caroline Emergency Paramedic Chapter 17
PDF
Fundamentals Final Review Questions.docx.pdf
PDF
mycobacterial infection tuberculosis (TB)
PPT
12.08.2025 Dr. Amrita Ghosh_Stocks Standards_ Smart_Inventory Management_GCLP...
DOCX
PT10 continues to explose your mind right after reading
PPT
Perioperative Nursing Care 1st bsc nursing.ppt
PPTX
Carcinoma of the breastfgdvfgbddbdtr.pptx
PDF
Medical_Biology_and_Genetics_Current_Studies_I.pdf
PPTX
case study of ischemic stroke for nursing
PDF
Back node with known primary managementt
PPT
heartap-240428112119-ec76d6fb.pp for studentt
PPTX
A med nursing, GRP 4-SIKLE CELL DISEASE IN MEDICAL NURSING
PDF
Zuri Health Pan-African Digital Health Innovator.pdf
Fever and skin rash - Approach.pptxBy Dr Gururaja R , Paediatrician. An usef...
ANALGESIC AND ANTI-INFLAMMssssssATORY DRUGS.pptx
ACUTE CALCULAR CHOLECYSTITIS: A CASE STUDY
osteoporosis in menopause...............
Acute renal failure.pptx for BNs 2nd year
Full Slide Deck - SY CF Talk Adelaide 10June.pptx
Nancy Caroline Emergency Paramedic Chapter 14
Nancy Caroline Emergency Paramedic Chapter 17
Fundamentals Final Review Questions.docx.pdf
mycobacterial infection tuberculosis (TB)
12.08.2025 Dr. Amrita Ghosh_Stocks Standards_ Smart_Inventory Management_GCLP...
PT10 continues to explose your mind right after reading
Perioperative Nursing Care 1st bsc nursing.ppt
Carcinoma of the breastfgdvfgbddbdtr.pptx
Medical_Biology_and_Genetics_Current_Studies_I.pdf
case study of ischemic stroke for nursing
Back node with known primary managementt
heartap-240428112119-ec76d6fb.pp for studentt
A med nursing, GRP 4-SIKLE CELL DISEASE IN MEDICAL NURSING
Zuri Health Pan-African Digital Health Innovator.pdf

Tips for Securing Your Workstation

  • 2.  Keep a clean computer  Data/ePHI Security at the Workstation  Passwords  Summary  References Brian Solomon 2
  • 3.  Never open email attachments from unknown senders.  Never re-send “chain-mail.”  Keep your operating system software up to date.  Install anti-spyware software and keep it updated.  Install anti-virus software and keep it updated.  Make sure your firewall is enabled.  Use strong passwords (See Password section).  Remove unnecessary software.  Use secure system configuration settings (browser, email, etc…). Brian Solomon 3
  • 4.  Never provide passwords or other personal information via email.  Log off your computer when you leave your workstation.  Use a strong screen saver with password. Password-protected screensavers should be enabled on workstation/laptops with a time- out interval deemed appropriate.  All sensitive information such as ePHI must be encrypted.  Periodically backup your data.  If external data drives are used (CDs, flash drives, etc..), secure them before leaving your workstation.  Have your IT department evaluate any shareware or free software before downloading. Brian Solomon 4
  • 5.  Passwords ought to have a minimum of six alphanumeric characters in length.  A “Strong” password contains a combination of upper and lower case letters, numbers, and special characters (&, #, !, @, etc…).  Passwords should not contain a word found in the dictionary, in any language, slang, jargon nor represent a name.  Passwords should expire, be changed, every 90 to 180 days.  If passwords need to be written down or stored on-line, they should be stored in a secure place separate from the application or system that is being protected by the password. Brian Solomon 5
  • 6.  Employees should not use the “Remember Password” feature of their computer or installed applications.  Employee passwords and account information should never be shared.  In rare cases where password sharing is unavoidable, restricted account access should be established by the IT staff.  Password audits should be performed on a periodic basis by the IT staff. Brian Solomon 6
  • 7.  Never open email attachments from unknown senders.  Never re-send “chain-mail.”  Use strong passwords.  Never provide passwords or other personal information via email.  Log off your computer when you leave your workstation.  If external data drives are used (CDs, flash drives, etc..), secure them before leaving your workstation.  Do not use the “Remember Password” feature of the computer or installed applications. Brian Solomon 7
  • 8.  Reference to HIPAA Standard: Security Management Process (161.308(a)(1));  Information Access Management (161.308(a)(4));  Security Awareness and Training (161.308(a)(5));  Access Control (161.312(a));  Person or Entity Authentication (164.312(d)),  Workstation Use 164.310(b);  Workstation Security 164.310(c). Brian Solomon 8

Editor's Notes

  • #3: Last year and a half, have worked 34 practices
  • #4: Last year and a half, have worked 34 practices
  • #5: Last year and a half, have worked 34 practices
  • #6: Last year and a half, have worked 34 practices
  • #7: Last year and a half, have worked 34 practices
  • #8: Last year and a half, have worked 34 practices
  • #9: Last year and a half, have worked 34 practices