fbpx

Cyber Security Tips for Your Health Data

Oct 4, 2016

In today’s digital world, most of our health information is readily available online.

Learn some practical ways to make sure your private information is protected from prying eyes.

1. Use Password Protection

Add a password or form of user identification to protect your private information. Consider setting a timer that will lock your account after an established amount of inactivity. Strong passwords are at least six characters in length, include a combination of upper and lower case letters, at least one number, and at least one keyboard character. Passwords should be changed often.


HAP-Cyber-Security-MI-01 (1)


2. Keep Your Guard—Even At a Distance

Install and activate remote wiping or disabling features, allowing you to delete your device’s data in the case of loss or theft.


HAP-Cyber-Security-MI-02 (1)


3. Do Your Research

Mobile applications have the potential to copy your address book or other private data without your knowledge or approval. Before downloading a new app on your mobile device, take time to verify that you’ll have control over its functions and that it has a trusted reputation.


HAP-Cyber-Security-MI-03 (2)


4. Stop Hitting the “Later” Button

Regularly install any updates on your device’s security software to keep maximum protection for all of your private information. Consider using automated update options instead of selecting “remind me later.” Additionally, make sure that you are running the most up-to-date version of your device’s operating system.


HAP-Cyber-Security-MI-04 (1)


5. Keep Your (Fire)walls Up

A firewall will guard your device against unauthorized connections, intercepting both incoming and outgoing connections, increasing the privacy of any health information stored or accessible through your device.


HAP-Cyber-Security-MI-05 (1)


6. Maintain physical control

Keep a handle on your device by keeping it in a secure location, locking your screen when not using it, and keeping your device with you whenever possible. Additionally, don’t let others use your mobile device.


HAP-Cyber-Security-MI-06 (1)


 

Share