SlideShare a Scribd company logo
1 of 27
Download to read offline
COVID-19 Healthcare:
Cybersecurity Best Practices
for a Remote Workforce
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
COVID-19 Healthcare Cybersecurity
Measures to stem the COVID-19
pandemic are driving more of the U.S.
workforce to remote, or teleworking,
arrangements, including healthcare
industry personnel who can operate
from home (e.g., financial, administra-
tive, healthcare IT teams, and other
non-patient-facing roles).
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
COVID-19 Healthcare Cybersecurity
In keeping with state- and community
wide shelter-in-place orders and bans
on nonessential travel, work-from-home
practices reduce person-to-person
contact in an effort control the
transmission of the novel coronavirus
within populations and families.
The well-intentioned transition to
remote work, however, carries an
underlying risk: increased exposure
to cybersecurity threats.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
The State of Cybersecurity Amid COVID-19
The simple equation of more users accessing
and relying on the internet from more places
exposes cybersecurity vulnerabilities, as does
the possibility of using home internet connect-
ions and personal devices that don’t have the
same level of security as corporate IT-
managed resources.
Additionally, collective rising anxiety, fear,
and curiosity make internet users more
vulnerable to malicious cyberattacks through
false communications and information
sources that appear legitimate.
RISK = Likelihood x Impact
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
The State of Cybersecurity Amid COVID-19
Add to the above factors an upward trend in
remote work overall before COVID-19-driven
changes (a 159 percent increase in remote
work between 2005 and 2017) and—for
healthcare providers, specifically—an
increased incidence of ransomware
attacks of 350 percent in Q4, 2019.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
The State of Cybersecurity Amid COVID-19
In addition, amid the COVID-19 pandemic,
the frequency of reported social engineering
attacks across the globe has increased.
For example, confirmed threat vectors have
used fake COVID-19 impact maps to spread
malware that steals passwords.
These threats have mocked a legitimate and
trusted source—John Hopkins Medicine.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
The State of Cybersecurity Amid COVID-19
Awareness of rising cybersecurity risks
during the COVID-19 pandemic as well
as cyber-hygiene best practices will help
keep an increasingly remote healthcare
workforce and their organizations safe.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Remote workers can increase their online safety by refreshing and ramping
up cyber-hygiene best practices:
Recognize and Report Suspicious Emails Protect Home Internet Connections
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Scams during the COVID-19 pandemic
may appear to be from reputable public
health authorities (e.g., Health and
Human Services, the World Health
Organization, or the Centers for
Disease Control and Prevention) and
reference COVID-19, coronavirus, and
related topics to exploit a sense of trust
in what may seem a known source.
Suspicious email patterns to watch for
include these events:
Recognize and Report Suspicious Emails (Phishing)
Alerts about suspicious
activity or log-in attempts.
Alerts about problems
with accounts or
payment information.
Requests to confirm
personal information.
Fake invoices.
Requests to click on a link
to make a payment or
update payment details.
Alerts regarding eligibility
to register for a
government refund.
An email impersonating
a known and trusted
company.
An alert that an
account is on hold due
to a billing problem.
An email with a generic
greeting (e.g., “Hi, Dear.”).
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Follow organizational guidance on
how to report suspicious emails.
Many organizations will have an
anti-phishing program with utilities
for reporting built into their
corporate email clients.
Recognize and Report Suspicious Emails (Phishing)
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Protect Home Internet Connections
Corporate IT and infrastructure
engineering teams often have a
number of controls in place that
protect internet connections within
the office environment.
When connecting from home,
however, certain practices will
ensure security and quality:
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Protect Home Internet Connections
Bandwidth
As COVID-19 drives more of the global workforce
home, bandwidth demands increase.
Remote workers should ensure they’re getting
the bandwidth they’re contracted for with their
internet services provider (ISP).
Tools including speedtest.net or fast.com
can measure home bandwidth.
Some ISPs have been known to place
data caps, or limits, on their services,
but in light of the pandemic, many ISPs
are removing caps voluntarily.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Protect Home Internet Connections
Connectivity
Individuals using Wi-Fi or a hotspot at home,
need to ensure they’re using a modern
encryption tool, such as Wi-Fi Protected
Access II (WPA2), with a strong preshared key
(PSK), that’s equivalent to a password, to
establish a connection to the home network.
Never connect over public Wi-Fi, such as
airports, coffee shops, libraries, community
wireless access points, or other connections
that aren’t verifiably secure. To access the
internet away from home, tethering to a mobile
hotspot (smartphone) is the safer option.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Protect Home Internet Connections
Virtual private network (VPN) with multifactor authentication (MFA)
A VPN encrypts information to tunnel it
from its source to its destination.
Many organizations’ corporate IT and
infrastructure engineering teams maintain
a VPN infrastructure to keep team
members secure.
With MFA, a device user must successfully
present two or more pieces of evidence
(e.g., codes smartphone apps generate)
to an authentication mechanism to gain
access to a network.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Protect Home Internet Connections
Corporate-issued devices
Remote workers connecting to their
corporate network or partner-hosted
environments should only use corporate-
issued devices—versus personal devices.
These devices likely have the necessary
safeguards to work securely and are
managed and updated regularly by the
corporate IT team.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Protect Home Internet Connections
Web Browsing
Internet users need to be cautious about the
sites they visit.
As mentioned earlier, there are confirmed
malicious websites related to coronavirus that
may appear legitimate but are engineered to
infect devices through a web browser.
While conducting sensitive transactions, verify
the sites used are secure and implement
secure socket layer protocols (SSL) with the
website to secure the traffic between the
originating device and the destination site.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Protect Home Internet Connections
Phishing (email), vishing (voice calls), and smishing (SMS)
Increased social engineering attacks like
these demand extra diligence.
If a remote worker identifies suspicious
activity, they need to report it to their
organization, such as with a reporting email
utility built into their corporate email or to the
organization’s information security team.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Protect Home Internet Connections
Video Conferencing
Virtual conference room users need
to inventory their meeting attendees.
Increasingly, known cyberattacks
may attempt to allow eavesdroppers
by randomly identifying links to
meetings.
Virtual conference hosts should
require a password to join the
meeting and ask anyone unfamiliar
to identify themselves.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Protect Home Internet Connections
Passwords
Many corporate IT and infrastructure
engineering teams set requirements
on minimum password lengths,
composition, and complexity.
Strong passwords and long pass-
phrases are more secure than
shorter passwords, and users need
to rotate passwords at least every
90 days.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Protect Home Internet Connections
Passwords
Enabling MFA, as applications and
systems allow, supplements passwords
security; two-factor authentication
(one factor the user knows, such as a
password, combined with another they
have been provided or receive digitally,
such as a one-time password token) is
an effective authentication practice.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Protect Home Internet Connections
Stay patched
A corporate-issued device is likely managed
centrally and receives updates via a systems
management and deployment solutions (e.g.,
Quest KACE, Microsoft System Center
Configuration Manager, SolarWinds Patch
Manager, etc.); remote workers should keep up
with these updates as they reach their device.
Users are responsible for patching (downloading
and applying the latest firmware update from
the vendor) home infrastructure, such as routers
and firewalls.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
A Time for Extra Vigilant Cyber-Safe Best Practices
Protect Home Internet Connections
Other
For additional advice on avoiding phishing and social
engineering attacks, see the Department of Homeland Security.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Steadfast Safeguards for Uncertain Times
In a time marked by global uncertainty,
the growing remote workforce can protect
their personal and organizational internet
security by relying on a known entity—
cyber-hygiene best practices.
Despite unprecedented change and
adaptation, individuals working from
home who follow proven cybersecurity
guidelines, with some added awareness
of COVID-19-specific threats, will keep
themselves and their organizations cyber-
safe through the pandemic and beyond.
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
For more information:
“This book is a fantastic piece of work”
– Robert Lindeman MD, FAAP, Chief Physician Quality Officer
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
More about this topic
Link to original article for a more in-depth discussion.
COVID-19 Healthcare Cybersecurity: Best Practices for a Remote Workforce
Health Catalyst Plans to Support Health System Clients’ COVID-19 Response with Three Initial
Solutions Focused on Patient Tracking, Public Health Surveillance and Staff Augmentation Support
Health Catalyst News
Health Catalyst unveils two systems and a service for COVID-19 response (Healthcare IT News)
Health Catalyst News
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Other Clinical Quality Improvement Resources
Click to read additional information at www.healthcatalyst.com
Kevin is the Chief Information Security Officer at Health Catalyst. Prior to joining with Health Catalyst,
he worked for Blue Cross of Idaho in Boise, Idaho as a Service Oriented Architecture (SOA)
Development Manager and worked there for five years. Before Blue Cross of Idaho, Kevin worked in
the Hi-Tech sector within e-commerce developing enabling technologies for Micron, a Semiconductor
Manufacturer to sell and distribute their product portfolio to consumers. Kevin has an Associates in
Political Science from BYI-Idaho, a Bachelor’s in Business Administration in Computer Information
Systems from Boise State University and a Master’s of Science in Medical Informatics from
Northwestern University. He continues to teach as an Instructor at Northwestern in the Masters of
Medical Informatics Program and also Computer Science at a local community college.
Kevin Scharnhorst
© 2020 Health Catalyst
Proprietary. Feel free to share but we would appreciate a Health Catalyst citation.
Other Clinical Quality Improvement Resources
Click to read additional information at www.healthcatalyst.com
Health Catalyst is a mission-driven data warehousing, analytics and outcomes-improvement
company that helps healthcare organizations of all sizes improve clinical, financial, and operational
outcomes needed to improve population health and accountable care. Our proven enterprise data
warehouse (EDW) and analytics platform helps improve quality, add efficiency and lower costs in
support of more than 65 million patients for organizations ranging from the largest US health system
to forward-thinking physician practices.
Health Catalyst was recently named as the leader in the enterprise healthcare BI market in
improvement by KLAS, and has received numerous best-place-to work awards including Modern
Healthcare in 2013, 2014, and 2015, as well as other recognitions such as “Best Place to work for
Millenials, and a “Best Perks for Women.”

More Related Content

What's hot

COVID-19 Data and Analytics: Survey Reveals Long- and Short-Term Healthcare I...
COVID-19 Data and Analytics: Survey Reveals Long- and Short-Term Healthcare I...COVID-19 Data and Analytics: Survey Reveals Long- and Short-Term Healthcare I...
COVID-19 Data and Analytics: Survey Reveals Long- and Short-Term Healthcare I...Health Catalyst
 
Interoperability in Healthcare: Making the Most of FHIR
Interoperability in Healthcare: Making the Most of FHIRInteroperability in Healthcare: Making the Most of FHIR
Interoperability in Healthcare: Making the Most of FHIRHealth Catalyst
 
Telehealth: A Top Organizational Performance Solution During COVID-19 and Beyond
Telehealth: A Top Organizational Performance Solution During COVID-19 and BeyondTelehealth: A Top Organizational Performance Solution During COVID-19 and Beyond
Telehealth: A Top Organizational Performance Solution During COVID-19 and BeyondHealth Catalyst
 
Healthcare it services2016 mid year review
Healthcare it services2016 mid year reviewHealthcare it services2016 mid year review
Healthcare it services2016 mid year reviewDamo Consulting Inc.
 
Five Action Items to Improve HCC Coding Accuracy and Risk Adjustment With Ana...
Five Action Items to Improve HCC Coding Accuracy and Risk Adjustment With Ana...Five Action Items to Improve HCC Coding Accuracy and Risk Adjustment With Ana...
Five Action Items to Improve HCC Coding Accuracy and Risk Adjustment With Ana...Health Catalyst
 
Top 10 canada health innovations 2011
Top 10 canada health innovations 2011Top 10 canada health innovations 2011
Top 10 canada health innovations 2011hosnah
 
The Healthcare Analytics Ecosystem: A Must-Have in Today’s Transformation
 The Healthcare Analytics Ecosystem: A Must-Have in Today’s Transformation The Healthcare Analytics Ecosystem: A Must-Have in Today’s Transformation
The Healthcare Analytics Ecosystem: A Must-Have in Today’s TransformationHealth Catalyst
 
The Future of Employer Health Insurance
The Future of Employer Health InsuranceThe Future of Employer Health Insurance
The Future of Employer Health InsuranceHealth Catalyst
 
A New Era of Personalized Medicine: The Power of Analytics and AI
A New Era of Personalized Medicine: The Power of Analytics and AIA New Era of Personalized Medicine: The Power of Analytics and AI
A New Era of Personalized Medicine: The Power of Analytics and AIHealth Catalyst
 
Why Data-Driven Healthcare Is the Best Defense Against COVID-19
Why Data-Driven Healthcare Is the Best Defense Against COVID-19Why Data-Driven Healthcare Is the Best Defense Against COVID-19
Why Data-Driven Healthcare Is the Best Defense Against COVID-19Health Catalyst
 
The Epicenter Of The Pandemic: Driving Transformation At Northwell Health
The Epicenter Of The Pandemic: Driving Transformation At Northwell HealthThe Epicenter Of The Pandemic: Driving Transformation At Northwell Health
The Epicenter Of The Pandemic: Driving Transformation At Northwell HealthHealth Catalyst
 
Interoperability in Healthcare Data: A Life-Saving Advantage
Interoperability in Healthcare Data: A Life-Saving AdvantageInteroperability in Healthcare Data: A Life-Saving Advantage
Interoperability in Healthcare Data: A Life-Saving AdvantageHealth Catalyst
 
Creating a Data-Driven Research Ecosystem with Patients at the Center
Creating a Data-Driven Research Ecosystem with Patients at the CenterCreating a Data-Driven Research Ecosystem with Patients at the Center
Creating a Data-Driven Research Ecosystem with Patients at the CenterHealth Catalyst
 
Lean Healthcare: 6 Methodologies for Improvement from Dr. Brent James
Lean Healthcare: 6 Methodologies for Improvement from Dr. Brent JamesLean Healthcare: 6 Methodologies for Improvement from Dr. Brent James
Lean Healthcare: 6 Methodologies for Improvement from Dr. Brent JamesHealth Catalyst
 
The Work Ahead in Healthcare: Digital Delivers at the Frontlines of Care
The Work Ahead in Healthcare: Digital Delivers at the Frontlines of CareThe Work Ahead in Healthcare: Digital Delivers at the Frontlines of Care
The Work Ahead in Healthcare: Digital Delivers at the Frontlines of CareCognizant
 
Using Data to Ensure a Safe Return to School During COVID-19
Using Data to Ensure a Safe Return to School During COVID-19Using Data to Ensure a Safe Return to School During COVID-19
Using Data to Ensure a Safe Return to School During COVID-19Health Catalyst
 
How a U.S. COVID-19 Data Registry Fuels Global Research
How a U.S. COVID-19 Data Registry Fuels Global ResearchHow a U.S. COVID-19 Data Registry Fuels Global Research
How a U.S. COVID-19 Data Registry Fuels Global ResearchHealth Catalyst
 
Artificial Intelligence and Machine Learning in Healthcare: Four Real-World I...
Artificial Intelligence and Machine Learning in Healthcare: Four Real-World I...Artificial Intelligence and Machine Learning in Healthcare: Four Real-World I...
Artificial Intelligence and Machine Learning in Healthcare: Four Real-World I...Health Catalyst
 
How to Build a Healthcare Analytics Team and Solve Strategic Problems
How to Build a Healthcare Analytics Team and Solve Strategic ProblemsHow to Build a Healthcare Analytics Team and Solve Strategic Problems
How to Build a Healthcare Analytics Team and Solve Strategic ProblemsHealth Catalyst
 
The Missing Ingredient in Healthcare Analytics: The Executive Sponsor
The Missing Ingredient in Healthcare Analytics: The Executive SponsorThe Missing Ingredient in Healthcare Analytics: The Executive Sponsor
The Missing Ingredient in Healthcare Analytics: The Executive SponsorHealth Catalyst
 

What's hot (20)

COVID-19 Data and Analytics: Survey Reveals Long- and Short-Term Healthcare I...
COVID-19 Data and Analytics: Survey Reveals Long- and Short-Term Healthcare I...COVID-19 Data and Analytics: Survey Reveals Long- and Short-Term Healthcare I...
COVID-19 Data and Analytics: Survey Reveals Long- and Short-Term Healthcare I...
 
Interoperability in Healthcare: Making the Most of FHIR
Interoperability in Healthcare: Making the Most of FHIRInteroperability in Healthcare: Making the Most of FHIR
Interoperability in Healthcare: Making the Most of FHIR
 
Telehealth: A Top Organizational Performance Solution During COVID-19 and Beyond
Telehealth: A Top Organizational Performance Solution During COVID-19 and BeyondTelehealth: A Top Organizational Performance Solution During COVID-19 and Beyond
Telehealth: A Top Organizational Performance Solution During COVID-19 and Beyond
 
Healthcare it services2016 mid year review
Healthcare it services2016 mid year reviewHealthcare it services2016 mid year review
Healthcare it services2016 mid year review
 
Five Action Items to Improve HCC Coding Accuracy and Risk Adjustment With Ana...
Five Action Items to Improve HCC Coding Accuracy and Risk Adjustment With Ana...Five Action Items to Improve HCC Coding Accuracy and Risk Adjustment With Ana...
Five Action Items to Improve HCC Coding Accuracy and Risk Adjustment With Ana...
 
Top 10 canada health innovations 2011
Top 10 canada health innovations 2011Top 10 canada health innovations 2011
Top 10 canada health innovations 2011
 
The Healthcare Analytics Ecosystem: A Must-Have in Today’s Transformation
 The Healthcare Analytics Ecosystem: A Must-Have in Today’s Transformation The Healthcare Analytics Ecosystem: A Must-Have in Today’s Transformation
The Healthcare Analytics Ecosystem: A Must-Have in Today’s Transformation
 
The Future of Employer Health Insurance
The Future of Employer Health InsuranceThe Future of Employer Health Insurance
The Future of Employer Health Insurance
 
A New Era of Personalized Medicine: The Power of Analytics and AI
A New Era of Personalized Medicine: The Power of Analytics and AIA New Era of Personalized Medicine: The Power of Analytics and AI
A New Era of Personalized Medicine: The Power of Analytics and AI
 
Why Data-Driven Healthcare Is the Best Defense Against COVID-19
Why Data-Driven Healthcare Is the Best Defense Against COVID-19Why Data-Driven Healthcare Is the Best Defense Against COVID-19
Why Data-Driven Healthcare Is the Best Defense Against COVID-19
 
The Epicenter Of The Pandemic: Driving Transformation At Northwell Health
The Epicenter Of The Pandemic: Driving Transformation At Northwell HealthThe Epicenter Of The Pandemic: Driving Transformation At Northwell Health
The Epicenter Of The Pandemic: Driving Transformation At Northwell Health
 
Interoperability in Healthcare Data: A Life-Saving Advantage
Interoperability in Healthcare Data: A Life-Saving AdvantageInteroperability in Healthcare Data: A Life-Saving Advantage
Interoperability in Healthcare Data: A Life-Saving Advantage
 
Creating a Data-Driven Research Ecosystem with Patients at the Center
Creating a Data-Driven Research Ecosystem with Patients at the CenterCreating a Data-Driven Research Ecosystem with Patients at the Center
Creating a Data-Driven Research Ecosystem with Patients at the Center
 
Lean Healthcare: 6 Methodologies for Improvement from Dr. Brent James
Lean Healthcare: 6 Methodologies for Improvement from Dr. Brent JamesLean Healthcare: 6 Methodologies for Improvement from Dr. Brent James
Lean Healthcare: 6 Methodologies for Improvement from Dr. Brent James
 
The Work Ahead in Healthcare: Digital Delivers at the Frontlines of Care
The Work Ahead in Healthcare: Digital Delivers at the Frontlines of CareThe Work Ahead in Healthcare: Digital Delivers at the Frontlines of Care
The Work Ahead in Healthcare: Digital Delivers at the Frontlines of Care
 
Using Data to Ensure a Safe Return to School During COVID-19
Using Data to Ensure a Safe Return to School During COVID-19Using Data to Ensure a Safe Return to School During COVID-19
Using Data to Ensure a Safe Return to School During COVID-19
 
How a U.S. COVID-19 Data Registry Fuels Global Research
How a U.S. COVID-19 Data Registry Fuels Global ResearchHow a U.S. COVID-19 Data Registry Fuels Global Research
How a U.S. COVID-19 Data Registry Fuels Global Research
 
Artificial Intelligence and Machine Learning in Healthcare: Four Real-World I...
Artificial Intelligence and Machine Learning in Healthcare: Four Real-World I...Artificial Intelligence and Machine Learning in Healthcare: Four Real-World I...
Artificial Intelligence and Machine Learning in Healthcare: Four Real-World I...
 
How to Build a Healthcare Analytics Team and Solve Strategic Problems
How to Build a Healthcare Analytics Team and Solve Strategic ProblemsHow to Build a Healthcare Analytics Team and Solve Strategic Problems
How to Build a Healthcare Analytics Team and Solve Strategic Problems
 
The Missing Ingredient in Healthcare Analytics: The Executive Sponsor
The Missing Ingredient in Healthcare Analytics: The Executive SponsorThe Missing Ingredient in Healthcare Analytics: The Executive Sponsor
The Missing Ingredient in Healthcare Analytics: The Executive Sponsor
 

Similar to COVID-19 Healthcare Cybersecurity: Best Practices for a Remote Workforce

The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityCOVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityOptiv Security
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security Wee Tang
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxmeghanivkwserie
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docxpriestmanmable
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? XNSPY
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfYamuna5
 
Cyber security courses in Dhaka.docx
Cyber security courses in Dhaka.docxCyber security courses in Dhaka.docx
Cyber security courses in Dhaka.docxArindamGhosal6
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesBryTech INC
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfTuring.com
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsLiberteks
 
Top Cybersecurity Threats Impacting Your Business in 2023
Top Cybersecurity Threats Impacting Your Business in 2023Top Cybersecurity Threats Impacting Your Business in 2023
Top Cybersecurity Threats Impacting Your Business in 2023basilmph
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022Bernard Marr
 

Similar to COVID-19 Healthcare Cybersecurity: Best Practices for a Remote Workforce (20)

The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business ContinuityCOVID-19: Strategies to Stay Secure and Ensure Business Continuity
COVID-19: Strategies to Stay Secure and Ensure Business Continuity
 
What is Importance of Cyber Security
What is Importance of Cyber Security What is Importance of Cyber Security
What is Importance of Cyber Security
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
8Network Security April 2020FEATUREAre your IT staf.docx
8Network Security  April 2020FEATUREAre your IT staf.docx8Network Security  April 2020FEATUREAre your IT staf.docx
8Network Security April 2020FEATUREAre your IT staf.docx
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
 
Cyber security courses in Dhaka.docx
Cyber security courses in Dhaka.docxCyber security courses in Dhaka.docx
Cyber security courses in Dhaka.docx
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling Enterprises
 
Enhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdfEnhancing Cybersecurity in Remote Work-3.pdf
Enhancing Cybersecurity in Remote Work-3.pdf
 
InfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security TipsInfraGard Albany Member Alliance Monthly Security Tips
InfraGard Albany Member Alliance Monthly Security Tips
 
Top Cybersecurity Threats Impacting Your Business in 2023
Top Cybersecurity Threats Impacting Your Business in 2023Top Cybersecurity Threats Impacting Your Business in 2023
Top Cybersecurity Threats Impacting Your Business in 2023
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022
 

More from Health Catalyst

Three Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborThree Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborHealth Catalyst
 
2024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 32024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 3Health Catalyst
 
2024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 22024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 2Health Catalyst
 
2024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 12024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 1Health Catalyst
 
What’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and BeyondWhat’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and BeyondHealth Catalyst
 
Automated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee ReplacementAutomated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee ReplacementHealth Catalyst
 
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule UpdatesHealth Catalyst
 
What's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final RuleWhat's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final RuleHealth Catalyst
 
Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2Health Catalyst
 
Vitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdfVitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdfHealth Catalyst
 
Driving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS SolutionsDriving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS SolutionsHealth Catalyst
 
Tech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average OutsourcingTech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average OutsourcingHealth Catalyst
 
2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set Updates2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set UpdatesHealth Catalyst
 
How Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital TechnologyHow Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital TechnologyHealth Catalyst
 
COVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency EndsCOVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency EndsHealth Catalyst
 
Automated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and PatientAutomated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and PatientHealth Catalyst
 
A Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptxA Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptxHealth Catalyst
 
Self-Service Analytics: How to Use Healthcare Business Intelligence
Self-Service Analytics: How to Use Healthcare Business IntelligenceSelf-Service Analytics: How to Use Healthcare Business Intelligence
Self-Service Analytics: How to Use Healthcare Business IntelligenceHealth Catalyst
 
Optimize Your Labor Management with Health Catalyst PowerLabor™
Optimize Your Labor Management with Health Catalyst PowerLabor™Optimize Your Labor Management with Health Catalyst PowerLabor™
Optimize Your Labor Management with Health Catalyst PowerLabor™Health Catalyst
 
Three Steps to Prioritize Clinical Quality Improvement in Healthcare
Three Steps to Prioritize Clinical Quality Improvement in HealthcareThree Steps to Prioritize Clinical Quality Improvement in Healthcare
Three Steps to Prioritize Clinical Quality Improvement in HealthcareHealth Catalyst
 

More from Health Catalyst (20)

Three Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and LaborThree Keys to a Successful Margin: Charges, Costs, and Labor
Three Keys to a Successful Margin: Charges, Costs, and Labor
 
2024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 32024 CPT® Updates (Professional Services Focused) - Part 3
2024 CPT® Updates (Professional Services Focused) - Part 3
 
2024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 22024 CPT® Code Updates (HIM Focused) - Part 2
2024 CPT® Code Updates (HIM Focused) - Part 2
 
2024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 12024 CPT® Code Updates (CDM Focused) - Part 1
2024 CPT® Code Updates (CDM Focused) - Part 1
 
What’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and BeyondWhat’s Next for Hospital Price Transparency in 2024 and Beyond
What’s Next for Hospital Price Transparency in 2024 and Beyond
 
Automated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee ReplacementAutomated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
Automated Patient Reported Outcomes (PROs) for Hip & Knee Replacement
 
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
2024 Medicare Physician Fee Schedule (MPFS) Final Rule Updates
 
What's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final RuleWhat's Next for OPPS: A Look at the 2024 Final Rule
What's Next for OPPS: A Look at the 2024 Final Rule
 
Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2Insight into the 2024 ICD-10 PCS Updates - Part 2
Insight into the 2024 ICD-10 PCS Updates - Part 2
 
Vitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdfVitalware Insight Into the 2024 ICD10 CM Updates.pdf
Vitalware Insight Into the 2024 ICD10 CM Updates.pdf
 
Driving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS SolutionsDriving Value: Boosting Clinical Registry Value Using ARMUS Solutions
Driving Value: Boosting Clinical Registry Value Using ARMUS Solutions
 
Tech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average OutsourcingTech-Enabled Managed Services: Not Your Average Outsourcing
Tech-Enabled Managed Services: Not Your Average Outsourcing
 
2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set Updates2023 Mid-Year CPT/HCPCS Code Set Updates
2023 Mid-Year CPT/HCPCS Code Set Updates
 
How Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital TechnologyHow Managing Chronic Conditions Is Streamlined with Digital Technology
How Managing Chronic Conditions Is Streamlined with Digital Technology
 
COVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency EndsCOVID-19: After the Public Health Emergency Ends
COVID-19: After the Public Health Emergency Ends
 
Automated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and PatientAutomated Medication Compliance Tools for the Provider and Patient
Automated Medication Compliance Tools for the Provider and Patient
 
A Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptxA Facility-Focused Guide to Applying Modifiers Corectly.pptx
A Facility-Focused Guide to Applying Modifiers Corectly.pptx
 
Self-Service Analytics: How to Use Healthcare Business Intelligence
Self-Service Analytics: How to Use Healthcare Business IntelligenceSelf-Service Analytics: How to Use Healthcare Business Intelligence
Self-Service Analytics: How to Use Healthcare Business Intelligence
 
Optimize Your Labor Management with Health Catalyst PowerLabor™
Optimize Your Labor Management with Health Catalyst PowerLabor™Optimize Your Labor Management with Health Catalyst PowerLabor™
Optimize Your Labor Management with Health Catalyst PowerLabor™
 
Three Steps to Prioritize Clinical Quality Improvement in Healthcare
Three Steps to Prioritize Clinical Quality Improvement in HealthcareThree Steps to Prioritize Clinical Quality Improvement in Healthcare
Three Steps to Prioritize Clinical Quality Improvement in Healthcare
 

Recently uploaded

AI in Pediatrics: Taking Baby Steps in the Big World of Data
AI in Pediatrics: Taking Baby Steps in the Big World of DataAI in Pediatrics: Taking Baby Steps in the Big World of Data
AI in Pediatrics: Taking Baby Steps in the Big World of DataIris Thiele Isip-Tan
 
Subconjunctival Haemorrhage,causes,treatment..pptx
Subconjunctival Haemorrhage,causes,treatment..pptxSubconjunctival Haemorrhage,causes,treatment..pptx
Subconjunctival Haemorrhage,causes,treatment..pptxvideosfildr
 
The future of change - strategic translation
The future of change - strategic translationThe future of change - strategic translation
The future of change - strategic translationHelenBevan4
 
Weighing the Risks and Benefits: Angioplasty at Gokuldas Hospitals
Weighing the Risks and Benefits: Angioplasty at Gokuldas HospitalsWeighing the Risks and Benefits: Angioplasty at Gokuldas Hospitals
Weighing the Risks and Benefits: Angioplasty at Gokuldas HospitalsGokuldas Hospital
 
Speedy patient rehabilitation by Panchmukhi Train Ambulance Services in Patna...
Speedy patient rehabilitation by Panchmukhi Train Ambulance Services in Patna...Speedy patient rehabilitation by Panchmukhi Train Ambulance Services in Patna...
Speedy patient rehabilitation by Panchmukhi Train Ambulance Services in Patna...Panchmukhi Air& Train Ambulance Services
 
Learn Tips for Managing Chemobrain or Mental Fogginess
Learn Tips for Managing Chemobrain or Mental FogginessLearn Tips for Managing Chemobrain or Mental Fogginess
Learn Tips for Managing Chemobrain or Mental Fogginessbkling
 
Presentation for Alzheimers Disease.pptx
Presentation for Alzheimers Disease.pptxPresentation for Alzheimers Disease.pptx
Presentation for Alzheimers Disease.pptxravisutar1
 
Back care and back massage. powerpoint presentation
Back care and back massage. powerpoint presentationBack care and back massage. powerpoint presentation
Back care and back massage. powerpoint presentationpratiksha ghimire
 
Preventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdf
Preventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdfPreventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdf
Preventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdfAditiAlishetty
 
AMIKINHAL Presentation Journal Club (3).pptx
AMIKINHAL Presentation Journal Club (3).pptxAMIKINHAL Presentation Journal Club (3).pptx
AMIKINHAL Presentation Journal Club (3).pptxDileepRedemption
 
Enhancing Health Through Personalized Nutrition
Enhancing Health Through Personalized NutritionEnhancing Health Through Personalized Nutrition
Enhancing Health Through Personalized NutritionNeighborhood Trainer
 
Your Radiotherapy Destination Gokuldas Hospital.
Your Radiotherapy Destination Gokuldas Hospital.Your Radiotherapy Destination Gokuldas Hospital.
Your Radiotherapy Destination Gokuldas Hospital.Gokuldas Hospital
 
CASE STUDY ON CHRONIC KIDNEY DISEASE.pptx
CASE  STUDY ON CHRONIC KIDNEY DISEASE.pptxCASE  STUDY ON CHRONIC KIDNEY DISEASE.pptx
CASE STUDY ON CHRONIC KIDNEY DISEASE.pptxdrsriram2001
 
Unlocking the Mysteries of the Lymphatic System
Unlocking the Mysteries of the Lymphatic SystemUnlocking the Mysteries of the Lymphatic System
Unlocking the Mysteries of the Lymphatic SystemSasikiranMarri
 
Medisep insurance policy , new kerala government insurance policy for govrnm...
Medisep insurance policy , new  kerala government insurance policy for govrnm...Medisep insurance policy , new  kerala government insurance policy for govrnm...
Medisep insurance policy , new kerala government insurance policy for govrnm...LinshaLichu1
 
20 Benefits of Empathetic Listening in Mental Health Support
20 Benefits of Empathetic Listening in Mental Health Support20 Benefits of Empathetic Listening in Mental Health Support
20 Benefits of Empathetic Listening in Mental Health SupportSayhey
 
Family Adoption Programme first year mbbs.pptx
Family Adoption Programme first year mbbs.pptxFamily Adoption Programme first year mbbs.pptx
Family Adoption Programme first year mbbs.pptxKritikaMishra43
 
Emergency ambulance portal-PPT-3g2pqy.pptx
Emergency ambulance portal-PPT-3g2pqy.pptxEmergency ambulance portal-PPT-3g2pqy.pptx
Emergency ambulance portal-PPT-3g2pqy.pptxdragonaklevel7
 
Lipid Profile test & Cardiac Markers for MBBS, Lab. Med. and Nursing.pptx
Lipid Profile test & Cardiac Markers for MBBS, Lab. Med. and Nursing.pptxLipid Profile test & Cardiac Markers for MBBS, Lab. Med. and Nursing.pptx
Lipid Profile test & Cardiac Markers for MBBS, Lab. Med. and Nursing.pptxRajendra Dev Bhatt
 

Recently uploaded (20)

AI in Pediatrics: Taking Baby Steps in the Big World of Data
AI in Pediatrics: Taking Baby Steps in the Big World of DataAI in Pediatrics: Taking Baby Steps in the Big World of Data
AI in Pediatrics: Taking Baby Steps in the Big World of Data
 
Subconjunctival Haemorrhage,causes,treatment..pptx
Subconjunctival Haemorrhage,causes,treatment..pptxSubconjunctival Haemorrhage,causes,treatment..pptx
Subconjunctival Haemorrhage,causes,treatment..pptx
 
The future of change - strategic translation
The future of change - strategic translationThe future of change - strategic translation
The future of change - strategic translation
 
Weighing the Risks and Benefits: Angioplasty at Gokuldas Hospitals
Weighing the Risks and Benefits: Angioplasty at Gokuldas HospitalsWeighing the Risks and Benefits: Angioplasty at Gokuldas Hospitals
Weighing the Risks and Benefits: Angioplasty at Gokuldas Hospitals
 
Speedy patient rehabilitation by Panchmukhi Train Ambulance Services in Patna...
Speedy patient rehabilitation by Panchmukhi Train Ambulance Services in Patna...Speedy patient rehabilitation by Panchmukhi Train Ambulance Services in Patna...
Speedy patient rehabilitation by Panchmukhi Train Ambulance Services in Patna...
 
Learn Tips for Managing Chemobrain or Mental Fogginess
Learn Tips for Managing Chemobrain or Mental FogginessLearn Tips for Managing Chemobrain or Mental Fogginess
Learn Tips for Managing Chemobrain or Mental Fogginess
 
Presentation for Alzheimers Disease.pptx
Presentation for Alzheimers Disease.pptxPresentation for Alzheimers Disease.pptx
Presentation for Alzheimers Disease.pptx
 
Back care and back massage. powerpoint presentation
Back care and back massage. powerpoint presentationBack care and back massage. powerpoint presentation
Back care and back massage. powerpoint presentation
 
Preventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdf
Preventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdfPreventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdf
Preventing Common Nutritional Deficiencies In Poultry Flocks (PPT).pdf
 
AMIKINHAL Presentation Journal Club (3).pptx
AMIKINHAL Presentation Journal Club (3).pptxAMIKINHAL Presentation Journal Club (3).pptx
AMIKINHAL Presentation Journal Club (3).pptx
 
Enhancing Health Through Personalized Nutrition
Enhancing Health Through Personalized NutritionEnhancing Health Through Personalized Nutrition
Enhancing Health Through Personalized Nutrition
 
Your Radiotherapy Destination Gokuldas Hospital.
Your Radiotherapy Destination Gokuldas Hospital.Your Radiotherapy Destination Gokuldas Hospital.
Your Radiotherapy Destination Gokuldas Hospital.
 
CASE STUDY ON CHRONIC KIDNEY DISEASE.pptx
CASE  STUDY ON CHRONIC KIDNEY DISEASE.pptxCASE  STUDY ON CHRONIC KIDNEY DISEASE.pptx
CASE STUDY ON CHRONIC KIDNEY DISEASE.pptx
 
Unlocking the Mysteries of the Lymphatic System
Unlocking the Mysteries of the Lymphatic SystemUnlocking the Mysteries of the Lymphatic System
Unlocking the Mysteries of the Lymphatic System
 
Medisep insurance policy , new kerala government insurance policy for govrnm...
Medisep insurance policy , new  kerala government insurance policy for govrnm...Medisep insurance policy , new  kerala government insurance policy for govrnm...
Medisep insurance policy , new kerala government insurance policy for govrnm...
 
Dr Sujit Chatterjee Hiranandani Hospital Kidney.pdf
Dr Sujit Chatterjee Hiranandani Hospital Kidney.pdfDr Sujit Chatterjee Hiranandani Hospital Kidney.pdf
Dr Sujit Chatterjee Hiranandani Hospital Kidney.pdf
 
20 Benefits of Empathetic Listening in Mental Health Support
20 Benefits of Empathetic Listening in Mental Health Support20 Benefits of Empathetic Listening in Mental Health Support
20 Benefits of Empathetic Listening in Mental Health Support
 
Family Adoption Programme first year mbbs.pptx
Family Adoption Programme first year mbbs.pptxFamily Adoption Programme first year mbbs.pptx
Family Adoption Programme first year mbbs.pptx
 
Emergency ambulance portal-PPT-3g2pqy.pptx
Emergency ambulance portal-PPT-3g2pqy.pptxEmergency ambulance portal-PPT-3g2pqy.pptx
Emergency ambulance portal-PPT-3g2pqy.pptx
 
Lipid Profile test & Cardiac Markers for MBBS, Lab. Med. and Nursing.pptx
Lipid Profile test & Cardiac Markers for MBBS, Lab. Med. and Nursing.pptxLipid Profile test & Cardiac Markers for MBBS, Lab. Med. and Nursing.pptx
Lipid Profile test & Cardiac Markers for MBBS, Lab. Med. and Nursing.pptx
 

COVID-19 Healthcare Cybersecurity: Best Practices for a Remote Workforce

  • 1. COVID-19 Healthcare: Cybersecurity Best Practices for a Remote Workforce
  • 2. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. COVID-19 Healthcare Cybersecurity Measures to stem the COVID-19 pandemic are driving more of the U.S. workforce to remote, or teleworking, arrangements, including healthcare industry personnel who can operate from home (e.g., financial, administra- tive, healthcare IT teams, and other non-patient-facing roles).
  • 3. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. COVID-19 Healthcare Cybersecurity In keeping with state- and community wide shelter-in-place orders and bans on nonessential travel, work-from-home practices reduce person-to-person contact in an effort control the transmission of the novel coronavirus within populations and families. The well-intentioned transition to remote work, however, carries an underlying risk: increased exposure to cybersecurity threats.
  • 4. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. The State of Cybersecurity Amid COVID-19 The simple equation of more users accessing and relying on the internet from more places exposes cybersecurity vulnerabilities, as does the possibility of using home internet connect- ions and personal devices that don’t have the same level of security as corporate IT- managed resources. Additionally, collective rising anxiety, fear, and curiosity make internet users more vulnerable to malicious cyberattacks through false communications and information sources that appear legitimate. RISK = Likelihood x Impact
  • 5. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. The State of Cybersecurity Amid COVID-19 Add to the above factors an upward trend in remote work overall before COVID-19-driven changes (a 159 percent increase in remote work between 2005 and 2017) and—for healthcare providers, specifically—an increased incidence of ransomware attacks of 350 percent in Q4, 2019.
  • 6. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. The State of Cybersecurity Amid COVID-19 In addition, amid the COVID-19 pandemic, the frequency of reported social engineering attacks across the globe has increased. For example, confirmed threat vectors have used fake COVID-19 impact maps to spread malware that steals passwords. These threats have mocked a legitimate and trusted source—John Hopkins Medicine.
  • 7. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. The State of Cybersecurity Amid COVID-19 Awareness of rising cybersecurity risks during the COVID-19 pandemic as well as cyber-hygiene best practices will help keep an increasingly remote healthcare workforce and their organizations safe.
  • 8. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Remote workers can increase their online safety by refreshing and ramping up cyber-hygiene best practices: Recognize and Report Suspicious Emails Protect Home Internet Connections
  • 9. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Scams during the COVID-19 pandemic may appear to be from reputable public health authorities (e.g., Health and Human Services, the World Health Organization, or the Centers for Disease Control and Prevention) and reference COVID-19, coronavirus, and related topics to exploit a sense of trust in what may seem a known source. Suspicious email patterns to watch for include these events: Recognize and Report Suspicious Emails (Phishing) Alerts about suspicious activity or log-in attempts. Alerts about problems with accounts or payment information. Requests to confirm personal information. Fake invoices. Requests to click on a link to make a payment or update payment details. Alerts regarding eligibility to register for a government refund. An email impersonating a known and trusted company. An alert that an account is on hold due to a billing problem. An email with a generic greeting (e.g., “Hi, Dear.”).
  • 10. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Follow organizational guidance on how to report suspicious emails. Many organizations will have an anti-phishing program with utilities for reporting built into their corporate email clients. Recognize and Report Suspicious Emails (Phishing)
  • 11. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Protect Home Internet Connections Corporate IT and infrastructure engineering teams often have a number of controls in place that protect internet connections within the office environment. When connecting from home, however, certain practices will ensure security and quality:
  • 12. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Protect Home Internet Connections Bandwidth As COVID-19 drives more of the global workforce home, bandwidth demands increase. Remote workers should ensure they’re getting the bandwidth they’re contracted for with their internet services provider (ISP). Tools including speedtest.net or fast.com can measure home bandwidth. Some ISPs have been known to place data caps, or limits, on their services, but in light of the pandemic, many ISPs are removing caps voluntarily.
  • 13. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Protect Home Internet Connections Connectivity Individuals using Wi-Fi or a hotspot at home, need to ensure they’re using a modern encryption tool, such as Wi-Fi Protected Access II (WPA2), with a strong preshared key (PSK), that’s equivalent to a password, to establish a connection to the home network. Never connect over public Wi-Fi, such as airports, coffee shops, libraries, community wireless access points, or other connections that aren’t verifiably secure. To access the internet away from home, tethering to a mobile hotspot (smartphone) is the safer option.
  • 14. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Protect Home Internet Connections Virtual private network (VPN) with multifactor authentication (MFA) A VPN encrypts information to tunnel it from its source to its destination. Many organizations’ corporate IT and infrastructure engineering teams maintain a VPN infrastructure to keep team members secure. With MFA, a device user must successfully present two or more pieces of evidence (e.g., codes smartphone apps generate) to an authentication mechanism to gain access to a network.
  • 15. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Protect Home Internet Connections Corporate-issued devices Remote workers connecting to their corporate network or partner-hosted environments should only use corporate- issued devices—versus personal devices. These devices likely have the necessary safeguards to work securely and are managed and updated regularly by the corporate IT team.
  • 16. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Protect Home Internet Connections Web Browsing Internet users need to be cautious about the sites they visit. As mentioned earlier, there are confirmed malicious websites related to coronavirus that may appear legitimate but are engineered to infect devices through a web browser. While conducting sensitive transactions, verify the sites used are secure and implement secure socket layer protocols (SSL) with the website to secure the traffic between the originating device and the destination site.
  • 17. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Protect Home Internet Connections Phishing (email), vishing (voice calls), and smishing (SMS) Increased social engineering attacks like these demand extra diligence. If a remote worker identifies suspicious activity, they need to report it to their organization, such as with a reporting email utility built into their corporate email or to the organization’s information security team.
  • 18. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Protect Home Internet Connections Video Conferencing Virtual conference room users need to inventory their meeting attendees. Increasingly, known cyberattacks may attempt to allow eavesdroppers by randomly identifying links to meetings. Virtual conference hosts should require a password to join the meeting and ask anyone unfamiliar to identify themselves.
  • 19. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Protect Home Internet Connections Passwords Many corporate IT and infrastructure engineering teams set requirements on minimum password lengths, composition, and complexity. Strong passwords and long pass- phrases are more secure than shorter passwords, and users need to rotate passwords at least every 90 days.
  • 20. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Protect Home Internet Connections Passwords Enabling MFA, as applications and systems allow, supplements passwords security; two-factor authentication (one factor the user knows, such as a password, combined with another they have been provided or receive digitally, such as a one-time password token) is an effective authentication practice.
  • 21. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Protect Home Internet Connections Stay patched A corporate-issued device is likely managed centrally and receives updates via a systems management and deployment solutions (e.g., Quest KACE, Microsoft System Center Configuration Manager, SolarWinds Patch Manager, etc.); remote workers should keep up with these updates as they reach their device. Users are responsible for patching (downloading and applying the latest firmware update from the vendor) home infrastructure, such as routers and firewalls.
  • 22. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. A Time for Extra Vigilant Cyber-Safe Best Practices Protect Home Internet Connections Other For additional advice on avoiding phishing and social engineering attacks, see the Department of Homeland Security.
  • 23. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Steadfast Safeguards for Uncertain Times In a time marked by global uncertainty, the growing remote workforce can protect their personal and organizational internet security by relying on a known entity— cyber-hygiene best practices. Despite unprecedented change and adaptation, individuals working from home who follow proven cybersecurity guidelines, with some added awareness of COVID-19-specific threats, will keep themselves and their organizations cyber- safe through the pandemic and beyond.
  • 24. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. For more information: “This book is a fantastic piece of work” – Robert Lindeman MD, FAAP, Chief Physician Quality Officer
  • 25. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. More about this topic Link to original article for a more in-depth discussion. COVID-19 Healthcare Cybersecurity: Best Practices for a Remote Workforce Health Catalyst Plans to Support Health System Clients’ COVID-19 Response with Three Initial Solutions Focused on Patient Tracking, Public Health Surveillance and Staff Augmentation Support Health Catalyst News Health Catalyst unveils two systems and a service for COVID-19 response (Healthcare IT News) Health Catalyst News
  • 26. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Other Clinical Quality Improvement Resources Click to read additional information at www.healthcatalyst.com Kevin is the Chief Information Security Officer at Health Catalyst. Prior to joining with Health Catalyst, he worked for Blue Cross of Idaho in Boise, Idaho as a Service Oriented Architecture (SOA) Development Manager and worked there for five years. Before Blue Cross of Idaho, Kevin worked in the Hi-Tech sector within e-commerce developing enabling technologies for Micron, a Semiconductor Manufacturer to sell and distribute their product portfolio to consumers. Kevin has an Associates in Political Science from BYI-Idaho, a Bachelor’s in Business Administration in Computer Information Systems from Boise State University and a Master’s of Science in Medical Informatics from Northwestern University. He continues to teach as an Instructor at Northwestern in the Masters of Medical Informatics Program and also Computer Science at a local community college. Kevin Scharnhorst
  • 27. © 2020 Health Catalyst Proprietary. Feel free to share but we would appreciate a Health Catalyst citation. Other Clinical Quality Improvement Resources Click to read additional information at www.healthcatalyst.com Health Catalyst is a mission-driven data warehousing, analytics and outcomes-improvement company that helps healthcare organizations of all sizes improve clinical, financial, and operational outcomes needed to improve population health and accountable care. Our proven enterprise data warehouse (EDW) and analytics platform helps improve quality, add efficiency and lower costs in support of more than 65 million patients for organizations ranging from the largest US health system to forward-thinking physician practices. Health Catalyst was recently named as the leader in the enterprise healthcare BI market in improvement by KLAS, and has received numerous best-place-to work awards including Modern Healthcare in 2013, 2014, and 2015, as well as other recognitions such as “Best Place to work for Millenials, and a “Best Perks for Women.”