SECURITY Articles RSS Feed
Security: TIP 11 - 7 Tips
Added on Thu, Oct 29, 2015
7 Practices for Computer Security 1 Protect your personal information. It`s valuable. 2 Know who you`re dealing with. 3 Use security software that updates automatically. 4 Keep your operating system and Web browser up-to-date, and learn about... Read More
Security: TIP 8 - Phishing
Added on Thu, Oct 29, 2015
  How to spot a phishing email...   It could be a phishing email if... There are misspelled words in the e-mail or it contains poor grammar. The message is asking for personally identifiable information, such as credit card numbers, account numbers... Read More
Security: TIP 13 - Size Does matter
Added on Thu, Oct 29, 2015
Size Does matter: Often the smaller organizations are attacked more frequently and succeed more often then attacks on larger companies. Many small-enterprise owners assume that large enterprises are far more vulnerable to Internet security threats... Read More
Security: TIP 1 - Passwords
Added on Thu, Oct 29, 2015
  This is going to be the first in a series of security tips, of which i will try to post one per week. They are intended to help employee`s and clients gain a better understanding of how to keep unauthorized users out of sensative data.   The... Read More
Security: TIP 12 - Log Out Completely
Added on Thu, Oct 29, 2015
  When you log out, log out completely   Closing or minimizing your browser or typing in a new web address when you`re done using your online account may not be enough to prevent others from gaining access to your account information. Instead,... Read More
Policy - What can I do now to increase my Clinic’s Security?
Added on Thu, Oct 29, 2015
Show/Explain these documents to staff and/or send them to more computer and/or security training. Please note security tips at end of book. Do a complete analysis of users on my system (Mediplan, Computers, Servers, Remote Access, other?) Try to... Read More
Security: TIP 5 - Firewalls
Added on Thu, Oct 29, 2015
  It takes two to tango and two firewalls to secure your system   Contrary to the myth that hardware firewalls are better than software firewalls, both are equally necessary to secure your system because they provide different kinds of protection.... Read More
IMA
Added on Fri, Oct 16, 2015
  Telin Systems has reviewed the files, and we do not have a signed IMA on file with your clinic. This may have been missed when you started with us, we apologize for the oversight.   Each service provider must have an IMA (information managers... Read More
Security: Tip 4 - Authentication, Encryption and Passwords
Added on Thu, Oct 29, 2015
  Security Tips Authentication, Encryption and Passwords This weeks security tip will put together the last three tips and explain how they work together. For those who don`t remember the last three security tips were: Encryption, Authentication and... Read More
Security: TIP 14 - Wireless Hotspots
Added on Thu, Oct 29, 2015
Wireless Hotspots...limit activity to web surfing only A hotspot is an open wireless network that is available (open) to everyone. An example would be the wireless network at your favorite coffee shop. These networks hook computers into the public... Read More
Security: TIP 2 - Encryption
Added on Thu, Oct 29, 2015
This weeks security topic is encryption. Encryption is widely misunderstood in the IT community. Encryption alone will not secure your applications, in other words, if you encrypt an application`s traffic it doesn`t mean your security is any better.... Read More
Security: TIP 3 - Authentication
Added on Thu, Oct 29, 2015
Last week we talked about encryption of data, this is to prevent people from viewing data in transit on the network, now we will add authentication into the mix. Authentication is simply a way to verify someone`s identity. In most cases this is done... Read More
Security: TIP 15 - Observations
Added on Thu, Oct 29, 2015
  * Operating systems have fewer vulnerabilities that can lead to massive Internet worms. For instance, during 2002-2005, Microsoft Windows worms like Blaster, Nachi, Sasser and Zotob infected a large number of systems on the Internet. There have... Read More
Security: TIP 6 - Wireless
Added on Thu, Oct 29, 2015
  Wireless Hotspots...limit activity to web surfing only   A hotspot is an open wireless network that is available (open) to everyone. An example would be the wireless network at your favorite coffee shop. These networks hook computers into the... Read More
Security: TIP 10 - Incident
Added on Thu, Oct 29, 2015
If you`re not sure you`ve seen an incident, report it anyway Most security folks (and IT folks, for that matter) would rather hear about a problem from you than to figure it out afterwards while troubleshooting a system failure. If a phone call from... Read More
Security: TIP 7 - Trusted Computer
Added on Thu, Oct 29, 2015
  Don`t enter your password on an untrusted computer. A password is only as secure as the computer or network it is used on.   Bad Guys target public kiosk-type computers and wireless networks, such as those in Internet cafes, conference centers,... Read More
Security: TIP 9 - Data Theft
Added on Thu, Oct 29, 2015
Don`t leave thumb drives or other small devices lying around Laptops and handheld devices like Palms aren`t the only things that can be stolen from your workspace. When not in use, thumb drives and other small valuable devices (wireless cards,... Read More