A network diagram is a schematic or visual map that shows the electronic infrastructure in the network. This includes devices such as computers, routers, firewalls, telephones, thermostats, smart TV’s, or devices that connect to the network and how each is connected and interacts with the others.
A good network diagram uses symbols and lines to represent the devices aka “nodes” and the type of connections each has to the other “nodes”. You can create your own network diagram by manually drawing it out, your router may have tools to depict the current network diagram, or you can use programs that can automate the process and update your diagram in real time.
As a network administrator you will find it possible and much easier to troubleshoot if you have a network diagram. Without the basic information provided in a network diagram you are often just taking blind shots in the dark trying to discover and resolve issues that may arise. More importantly, having a network diagram helps you protect your practice against malicious cyber attacks.
Having an accurate diagram will provide you with knowledge of all possible vulnerable connections to your network. Should you have any sort of breach, a network diagram will not only help you identify that the breach happened more quickly, but also help you be able to secure your network against further attacks more quickly. In the case of a breach, time is one of the most valuable things to have, so the quicker you can identify a breach, the easier it will be to avoid costly penalties and fines. The quicker you can secure your network against further harm, the better you can protect your patients and practice.
Even though HIPAA regulations do not require that you have a network diagram, TLD Systems does recommend all our clients use a network diagram. By using a network diagram you will not only be able to identify issues or breaches, but also should you have a breach it is evidence that you are taking the steps to protect your practice and ePHI to the best of your ability. With this evidence you can reduce or even eliminate possible sanctions because of a breach.

Read Comments