Have you ever received an email from somebody who you know and trust, only to find that the email did not come from your friend?
Have you ever received ‘bounce’ emails related to emails you never sent?
How does a hacker find an email address and then get access to an email account?
Just a few days ago Cybernews reported the largest compilation of emails and passwords were leaked on a public forum.
“More than 3.2 billion unique pairs of cleartext emails and passwords have just been leaked on a popular hacking forum, aggregating past leaks from Netflix, LinkedIn, Exploit.in, Bitcoin and more.” (https://cybernews.com/news/largest-compilation-of-emails-and-passwords-leaked-free)
Is your email address and password in the list of emails that have been breached? Cybernews has a checker that will tell you. Their checker can be found at https://cybernews.com/personal-data-leak-check/
If your email is in that list, then hackers may have access to your email account. Now is the time to take steps to protect yourself and those you share email with. The key to email security is passwords.
Password Management and Password Security are just on part of a good HIPAA Security Plan.
You should have a policy at your practice (and in your personal life) that passwords should be changed on a regular basis. Once a year at minimum, Once every three months is much better.
Using Strong Passwords:
A strong password is a password that is at least 8 characters long, has upper case letters, lower case letters, numbers and special characters (numbers shifted).
Do Not Reuse Passwords:
If you have multiple accounts, make sure that you have a different password for each account. If you use the same password for all of your accounts, then if a hacker has one of your passwords, the hacker has all of your passwords. Having different passwords for different accounts can be a daunting task, but password managers can help with that. A password manager is a secure program that creates a unique password for each website you access. This way is one website is breached, only that one complex and unique password is breached and your entire identity is not at risk.
Use 2 Factor Authentication
Two factor authentications is a process by which you need more than just your password to log into a system. If you are participating in the MIPS program and have an account at qpp.cms.gov you ae already familiar with 2 factor authentications. One type of 2 factor authentication involves text messages. After you enter you correct username and password, you get a screen asking you for your authentication code. The service you are trying to log onto sends a code via text to your smart phone and you must type that code into the web browser to log onto your account.
Now is a good time to look at all of your accounts and determine if they support 2 Factor Authentication (also referred to as 2FA). If that is available, it is in your best interest to turn it on. If a service, you utilize does not offer 2FA now is a good time to ask why.
Many security breaches are related to weak passwords and passwords that are re-used. Following the simple steps in this article can help to improve security at both your practice and in your personal life.
For more information on Password Security and implementation of a HIPAA Security Plan at your office, please contact TLD Systems at http://www.tldsystems.com, firstname.lastname@example.org or call (631) 403 6687