It goes without saying that it is vital to keep confidential information private and secure. Below are a few reminders about device sharing, public vs. private internet access, and additional access safeguards.
Public / Shared Devices (Computers, Tablets, Mobile Phones)
Scenario: The individual is away from their usual work device and is using someone else's to perform Solace responsibilities. They're at the library, a hotel business center, an internet cafe, or a similar place.
- These are INSECURE environments and should be avoided whenever possible.
- Please keep access via shared devices to an absolute minimum.
- Ensure device screens are locked whenever you step away. But as a rule, do not leave the device unattended while logged in to any Solace or patient-related material.
- Ensure immediate logging out of ALL Solace-related activities upon completion.
Public-Access WiFi Connections
Scenario: The individual is away from their usual secure internet connection and is signing onto a public-access version. They're at the airport, on a plane, in a coffee shop, a train or bus, or attempting to squeeze in a few ICD-10 code reviews during jury duty.
- These internet connections are often INSECURE. Content accessed on the public internet runs the risk of compromise.
- Instead, only use SECURE WiFi connections that require a unique password to access, such as:
- Your personal mobile phone hotspot
- Purchasing secure airline WiFi when traveling
- Or, waiting until you're connected to a secure network
Additional Safeguards
- Physical Access: Secure computers in locked rooms or cabinets, especially outside of work hours.
- Screen Security: Use privacy screens for monitors/screens in shared workspaces and always lock the screen when stepping away.
- This is especially important when performing work on trains and planes, when other passengers have visual access to the entirety of your screen's content.
- Passwords: Use strong passwords and implement multi-factor authentication.
- System Updates: Regularly update the OS (operating system) and all applications to patch security vulnerabilities.
Comments
Article is closed for comments.