{"id":8380,"date":"2017-06-14T10:27:35","date_gmt":"2017-06-14T17:27:35","guid":{"rendered":"http:\/\/www.coachingwebsites.com\/blog\/?p=8380"},"modified":"2017-11-15T10:33:15","modified_gmt":"2017-11-15T18:33:15","slug":"three-basic-steps-to-secure-your-business","status":"publish","type":"post","link":"https:\/\/www.coachingwebsites.com\/blog\/three-basic-steps-to-secure-your-business\/","title":{"rendered":"Three Basic Steps to Secure Your Business"},"content":{"rendered":"<p><strong>Cybersecurity: Three Basic Steps to Secure Your Business<\/strong><\/p>\n<p>With the dawn of the Internet, it\u2019s more important than ever to keep your therapy practice safe from cyberattacks. Implement these three basic steps to help you keep your information safe from prying eyes.<!--more--><span id=\"more-15917\"><\/span><\/p>\n<p><strong>1. Know Your Data<\/strong><br \/>\nKnowing what kind of data you\u2019re dealing with is the first step to securing your practice from cyberattacks. Know what\u2019s included in your data, where it\u2019s stored and who should have access to it to keep it safe. Sensitive forms of data to keep in consideration are:<\/p>\n<p>-Client credit card transactions<\/p>\n<p>-Client mailing and email lists<\/p>\n<p>-Client health or medical records<\/p>\n<p>-Employee payroll records<\/p>\n<p>-Employee email lists<\/p>\n<p>-Business and personal financial records<\/p>\n<p>-Marketing plans<\/p>\n<p>-Legal, tax and financial correspondence<\/p>\n<p>If your data stayed in one place, it would be easy to secure. But most breaches occur when data moves, so consider where data is legitimately shared to help keep it safe. Some examples would be:<\/p>\n<p>-Financial institutions<br \/>\n-Other providers<br \/>\n-Insurance companies<br \/>\n-Government entities<br \/>\n-Outsourced services or contractors<\/p>\n<p>Even if you have few or no employees, know who has access to sensitive data. Assign rights to specific people for specific data and keep those rights as relevant as possible. The fewer people with access to information, the more secure your practice\u2019s information will be. Keep your data organized by recording its location, so you and your employees will know if something looks out of place.<\/p>\n<p>Health care businesses are especially vulnerable to attacks because they don\u2019t just deal with client information, but also with personal health information and many forms of personally identifiable information.<\/p>\n<p><strong>2. Learn to Recognize Online Fraud<\/strong><br \/>\nOnline fraud is any fraudulent request via an online platform for personal information. This often occurs through email, social media or online messaging. These requests may look like they are initiated by a legitimate business when, in fact, they are not. Let your patients know how you will and won\u2019t ask for personal information so they can recognize fraudulent requests. Here are a few common online fraud tactics you may encounter.<\/p>\n<p>Social Engineering<br \/>\nThis tactic involves taking personal or business information posted to social networks, websites and blogs, and using that information to trick you into compromising your data. Those \u201cLearn 30 Things About Your Friends\u201d Facebook posts that ask you to answer silly questions and then share with friends are a perfect example of how easy it is for scammers to gain otherwise sensitive information and then use it to deceive you.<\/p>\n<p>Phishing<br \/>\nPhishing involves dangling a \u2018lure\u2019 to gain usernames, and passwords, and other personal identifiers that can be used to access confidential information. Phishing is generally conducted through email, but can take other forms like texting and social media messaging. A common phishing tactic is taking advantage of natural disasters, economic concerns and health scares to gain access to online credentials and financial accounts. Common phishing scams include emails that claim to be from prominent authorities such as the IRS, the police, or even your computer manufacturer.<\/p>\n<p>Malware<br \/>\nMalware is usually downloaded unknowingly when you open email attachments or download items. To protect your practice from malware, don\u2019t download anything from a sender you do not know, and keep firewalls and antivirus software updated on your computers, smartphones and connected devices.<\/p>\n<p><strong>3. Review and Change Passwords Often<\/strong><br \/>\nYour sensitive data should be protected by password-protected apps, pages and software. Review your password usage and change passwords often. Here are a few ways to keep passwords secure:<\/p>\n<p>Do not use any words at all. Any passwords that consist of words, phrases, or personal information (birthdays or phone numbers) are by far the easiest to crack, and amount to handing your personal information out. Whenever possible, always use a password that contains a string of random numbers and characters.<br \/>\nStore your passwords securely. Online services such as LastPass can be great for this \u2013 they can generate secure, random passwords, and then store them for you, so there\u2019s no need to memorize them.<br \/>\nChange your passwords monthly.<br \/>\nKeeping your therapist practice safe takes a little planning, but it doesn\u2019t have to be difficult. With a little extra attention and hard work, you can keep your patient and practice information safe and secure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity: Three Basic Steps to Secure Your Business With the dawn of the Internet, it\u2019s more important than ever to keep your therapy practice safe from cyberattacks. Implement these three basic steps to help you keep your information safe from prying eyes.<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[62,61],"tags":[],"class_list":["post-8380","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-website"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.coachingwebsites.com\/blog\/wp-json\/wp\/v2\/posts\/8380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.coachingwebsites.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.coachingwebsites.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.coachingwebsites.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.coachingwebsites.com\/blog\/wp-json\/wp\/v2\/comments?post=8380"}],"version-history":[{"count":2,"href":"https:\/\/www.coachingwebsites.com\/blog\/wp-json\/wp\/v2\/posts\/8380\/revisions"}],"predecessor-version":[{"id":8384,"href":"https:\/\/www.coachingwebsites.com\/blog\/wp-json\/wp\/v2\/posts\/8380\/revisions\/8384"}],"wp:attachment":[{"href":"https:\/\/www.coachingwebsites.com\/blog\/wp-json\/wp\/v2\/media?parent=8380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.coachingwebsites.com\/blog\/wp-json\/wp\/v2\/categories?post=8380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.coachingwebsites.com\/blog\/wp-json\/wp\/v2\/tags?post=8380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}