{"id":7196,"date":"2024-04-29T11:09:09","date_gmt":"2024-04-29T15:09:09","guid":{"rendered":"https:\/\/medent.com\/news\/?p=7196"},"modified":"2024-07-26T10:43:00","modified_gmt":"2024-07-26T14:43:00","slug":"cyber-hygiene-best-practices-for-securing-healthcare-data","status":"publish","type":"post","link":"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/","title":{"rendered":"Cyber Hygiene: Best Practices for Securing Healthcare Data"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7196\" class=\"elementor elementor-7196\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0a741ad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0a741ad\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0d92414\" data-id=\"0d92414\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-22d7870 elementor-widget elementor-widget-heading\" data-id=\"22d7870\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Minimizing Risks for Cyber Attacks on Your Practice<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-17357f8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"17357f8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3d5cd60\" data-id=\"3d5cd60\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f9e0bf4 elementor-widget elementor-widget-text-editor\" data-id=\"f9e0bf4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\">April 29, 2024<\/p>\n<p>Just as personal hygiene habits like hand washing can prevent illness, good cyber hygiene can reduce susceptibility to cyber attacks and protect sensitive information. Here&#8217;s a list of healthy cyber habits and tools MEDENT recommends to prevent data breaches and safeguard patient information:&nbsp;<\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d8d4e77 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3d8d4e77\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-77e799ee\" data-id=\"77e799ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3145860 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3145860\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4177fcab\" data-id=\"4177fcab\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7bf686ab elementor-widget elementor-widget-heading\" data-id=\"7bf686ab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Security Plan<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-375fb4d5 elementor-widget elementor-widget-text-editor\" data-id=\"375fb4d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Develop a comprehensive security plan for your network and devices, including firewalls, email spam, and virus and ransomware protections. Review this annually with your IT security vendor to identify vulnerabilities, assess threats and evaluate the effectiveness of existing security controls.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8504617 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"8504617\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5337212e elementor-widget elementor-widget-heading\" data-id=\"5337212e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Cyber Insurance<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50f62b97 elementor-widget elementor-widget-text-editor\" data-id=\"50f62b97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Practices should consider investing in cyber insurance, a specialty insurance product intended to protect businesses from Internet-based risks.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-feeaefa elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"feeaefa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff182ee elementor-widget elementor-widget-heading\" data-id=\"ff182ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Regular Staff Training<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc49c90 elementor-widget elementor-widget-text-editor\" data-id=\"dc49c90\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Did you know all MEDENT employees participate in annual security training in addition to HIPAA training? We also send frequent\u00a0 reminders to our staff to help them recognize and avoid phishing emails and malicious links.<\/p><p>In addition to annual security training with your IT company, you can review MEDENT&#8217;s <a href=\"https:\/\/www.medent.com\/tutorials_mp4\/RansomwareClientVersion.mp4\">video on ransomware<\/a> with employees and learn how you can protect yourself from a security breach.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a98b46e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a98b46e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-553e8f1 elementor-widget elementor-widget-heading\" data-id=\"553e8f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Multi-Factor Authentication (MFA)<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3e2563 elementor-widget elementor-widget-text-editor\" data-id=\"b3e2563\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Consider implementing multi-factor authentication (MFA) to add an extra layer of security to accounts.\u00a0<\/p><p>MEDENT offers <a href=\"https:\/\/www.medent.com\/tutorials_mp4\/TwoStepVerificationSetup.mp4\">Two-Step Verification<\/a> for individual users, select users or all users at your practice when logging into MEDENT.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-4c86dd76\" data-id=\"4c86dd76\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-423c5c85 elementor-widget elementor-widget-heading\" data-id=\"423c5c85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">IT Company<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5896fcc8 elementor-widget elementor-widget-text-editor\" data-id=\"5896fcc8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>MEDENT is your EHR system, not your IT company. It is important to have experienced staff outside of MEDENT assigned to the development, execution and monitoring of your Security Plan.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2909215 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2909215\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-23d6ca14 elementor-widget elementor-widget-heading\" data-id=\"23d6ca14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Disaster Recovery Plan\/Incident Response Plan<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f05b156 elementor-widget elementor-widget-text-editor\" data-id=\"f05b156\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unfortunately, hackers are getting more and more sophisticated, and sometimes breaches happen. We suggest working with your IT company on a plan to make sure your business can continue operating with minimal losses in the event of a cyber threat or breach. Clearly establish and communicate procedures for detecting, reporting, containing and recovering from data breaches and other security incidents.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e3ced1 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7e3ced1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f90a32 elementor-widget elementor-widget-heading\" data-id=\"6f90a32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Strong Password Policies<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-527ce35 elementor-widget elementor-widget-text-editor\" data-id=\"527ce35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In addition to <a href=\"https:\/\/medent.com\/news\/wp-content\/uploads\/2022\/03\/Password-Rules.pdf\" data-lf-fd-inspected-kn9eq4rmmxx7rlvp=\"true\">MEDENT&#8217;s Password Rules<\/a>, practices should enforce strong password policies that require employees to create and update complex passwords. You may also want to have a <a href=\"https:\/\/medent.com\/news\/wp-content\/uploads\/2022\/03\/Password-Recovery-Setup-1.pdf\" data-lf-fd-inspected-kn9eq4rmmxx7rlvp=\"true\">password recovery<\/a> policy in place.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-200a99f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"200a99f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7157a97\" data-id=\"7157a97\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-571e2f7 elementor-widget elementor-widget-text-editor\" data-id=\"571e2f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><span style=\"font-size: 14pt;\"><strong>MEDENT: A Reliable EHR and Practice Management System<\/strong><\/span><\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b1b1bfd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b1b1bfd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-661ba30\" data-id=\"661ba30\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-952864b elementor-widget elementor-widget-text-editor\" data-id=\"952864b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As a reminder, MEDENT is an EHR and Practice Management system, not an IT security vendor. As such, we are responsible for maintaining secure MEDENT software and HIPAA-compliant connections with external MEDENT interfaces as well as performing server operating system patches, some basic firewall and antivirus protections and backup monitoring. We are not responsible for helping practices develop, execute or maintain their own security policies and procedures.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9bb9b9 elementor-widget elementor-widget-text-editor\" data-id=\"b9bb9b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-size: 12pt;\">Check out Episode 5 of MEDENT Minutes to hear from our own cybersecurity experts:<\/span><\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-054871b elementor-widget elementor-widget-video\" data-id=\"054871b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/VY8X9LCGZio?si=jaNMUkKraylwG0eo&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Minimizing Risks for Cyber Attacks on Your Practice April 29, 2024 Just as personal hygiene habits like hand washing can prevent illness, good cyber hygiene can reduce susceptibility to cyber attacks and protect sensitive information. Here&#8217;s a list of healthy cyber habits and tools MEDENT recommends to prevent data breaches and safeguard patient information:&nbsp; Security [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":7197,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[],"class_list":["post-7196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-features"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Best Practices for Securing Healthcare Data | MEDENT<\/title>\n<meta name=\"description\" content=\"Good cyber hygiene can reduce susceptibility to cyber-attacks and protect sensitive information. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best Practices for Securing Healthcare Data | MEDENT\" \/>\n<meta property=\"og:description\" content=\"Good cyber hygiene can reduce susceptibility to cyber-attacks and protect sensitive information. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/\" \/>\n<meta property=\"og:site_name\" content=\"medent\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-29T15:09:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-26T14:43:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/medent.com\/connect\/wp-content\/uploads\/2024\/04\/MEDENT-Mindset-10.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1875\" \/>\n\t<meta property=\"og:image:height\" content=\"625\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Megan Chapman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/2024\\\/04\\\/29\\\/cyber-hygiene-best-practices-for-securing-healthcare-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/2024\\\/04\\\/29\\\/cyber-hygiene-best-practices-for-securing-healthcare-data\\\/\"},\"author\":{\"name\":\"Megan Chapman\",\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/#\\\/schema\\\/person\\\/1f7c7c969dd98a6b5aeeb355e0c408f0\"},\"headline\":\"Cyber Hygiene: Best Practices for Securing Healthcare Data\",\"datePublished\":\"2024-04-29T15:09:09+00:00\",\"dateModified\":\"2024-07-26T14:43:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/2024\\\/04\\\/29\\\/cyber-hygiene-best-practices-for-securing-healthcare-data\\\/\"},\"wordCount\":461,\"publisher\":{\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/2024\\\/04\\\/29\\\/cyber-hygiene-best-practices-for-securing-healthcare-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/medent.com\\\/connect\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/MEDENT-Mindset-10.png\",\"articleSection\":[\"Features\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/2024\\\/04\\\/29\\\/cyber-hygiene-best-practices-for-securing-healthcare-data\\\/\",\"url\":\"https:\\\/\\\/medent.com\\\/connect\\\/2024\\\/04\\\/29\\\/cyber-hygiene-best-practices-for-securing-healthcare-data\\\/\",\"name\":\"Best Practices for Securing Healthcare Data | MEDENT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/2024\\\/04\\\/29\\\/cyber-hygiene-best-practices-for-securing-healthcare-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/2024\\\/04\\\/29\\\/cyber-hygiene-best-practices-for-securing-healthcare-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/medent.com\\\/connect\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/MEDENT-Mindset-10.png\",\"datePublished\":\"2024-04-29T15:09:09+00:00\",\"dateModified\":\"2024-07-26T14:43:00+00:00\",\"description\":\"Good cyber hygiene can reduce susceptibility to cyber-attacks and protect sensitive information. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/2024\\\/04\\\/29\\\/cyber-hygiene-best-practices-for-securing-healthcare-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/medent.com\\\/connect\\\/2024\\\/04\\\/29\\\/cyber-hygiene-best-practices-for-securing-healthcare-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/2024\\\/04\\\/29\\\/cyber-hygiene-best-practices-for-securing-healthcare-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/medent.com\\\/connect\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/MEDENT-Mindset-10.png\",\"contentUrl\":\"https:\\\/\\\/medent.com\\\/connect\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/MEDENT-Mindset-10.png\",\"width\":1875,\"height\":625,\"caption\":\"Best Practices for Securing Healthcare Data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/2024\\\/04\\\/29\\\/cyber-hygiene-best-practices-for-securing-healthcare-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/medent.com\\\/connect\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Hygiene: Best Practices for Securing Healthcare Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/#website\",\"url\":\"https:\\\/\\\/medent.com\\\/connect\\\/\",\"name\":\"medent\",\"description\":\"EHR, Practice Management, Patient Engagement Solution\",\"publisher\":{\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/medent.com\\\/connect\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/#organization\",\"name\":\"MEDENT EMR\\\/EHR\",\"alternateName\":\"MEDENT\",\"url\":\"https:\\\/\\\/medent.com\\\/connect\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/medent.com\\\/connect\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/login_banner.png\",\"contentUrl\":\"https:\\\/\\\/medent.com\\\/connect\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/login_banner.png\",\"width\":440,\"height\":112,\"caption\":\"MEDENT EMR\\\/EHR\"},\"image\":{\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/#\\\/schema\\\/person\\\/1f7c7c969dd98a6b5aeeb355e0c408f0\",\"name\":\"Megan Chapman\",\"pronouns\":\"She\\\/Her\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/medent.com\\\/connect\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cropped-Megan_Chapman-e1774364208116-96x96.png\",\"url\":\"https:\\\/\\\/medent.com\\\/connect\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cropped-Megan_Chapman-e1774364208116-96x96.png\",\"contentUrl\":\"https:\\\/\\\/medent.com\\\/connect\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/cropped-Megan_Chapman-e1774364208116-96x96.png\",\"caption\":\"Megan Chapman\"},\"description\":\"Megan Chapman is the Director of Marketing &amp; Communications at medent. A former producer for NBC, TODAY, and MSNBC, she brings award-winning journalism experience to storytelling in healthcare technology, EHR software, and practice management. Megan has been with medent since 2018 and is passionate about helping clients simplify and understand EHR workflows so their practices can thrive.\",\"url\":\"https:\\\/\\\/medent.com\\\/connect\\\/author\\\/meganc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Best Practices for Securing Healthcare Data | MEDENT","description":"Good cyber hygiene can reduce susceptibility to cyber-attacks and protect sensitive information. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/","og_locale":"en_US","og_type":"article","og_title":"Best Practices for Securing Healthcare Data | MEDENT","og_description":"Good cyber hygiene can reduce susceptibility to cyber-attacks and protect sensitive information. Learn more.","og_url":"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/","og_site_name":"medent","article_published_time":"2024-04-29T15:09:09+00:00","article_modified_time":"2024-07-26T14:43:00+00:00","og_image":[{"width":1875,"height":625,"url":"https:\/\/medent.com\/connect\/wp-content\/uploads\/2024\/04\/MEDENT-Mindset-10.png","type":"image\/png"}],"author":"Megan Chapman","twitter_card":"summary_large_image","twitter_misc":{"Written by":false,"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/#article","isPartOf":{"@id":"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/"},"author":{"name":"Megan Chapman","@id":"https:\/\/medent.com\/connect\/#\/schema\/person\/1f7c7c969dd98a6b5aeeb355e0c408f0"},"headline":"Cyber Hygiene: Best Practices for Securing Healthcare Data","datePublished":"2024-04-29T15:09:09+00:00","dateModified":"2024-07-26T14:43:00+00:00","mainEntityOfPage":{"@id":"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/"},"wordCount":461,"publisher":{"@id":"https:\/\/medent.com\/connect\/#organization"},"image":{"@id":"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/#primaryimage"},"thumbnailUrl":"https:\/\/medent.com\/connect\/wp-content\/uploads\/2024\/04\/MEDENT-Mindset-10.png","articleSection":["Features"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/","url":"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/","name":"Best Practices for Securing Healthcare Data | MEDENT","isPartOf":{"@id":"https:\/\/medent.com\/connect\/#website"},"primaryImageOfPage":{"@id":"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/#primaryimage"},"image":{"@id":"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/#primaryimage"},"thumbnailUrl":"https:\/\/medent.com\/connect\/wp-content\/uploads\/2024\/04\/MEDENT-Mindset-10.png","datePublished":"2024-04-29T15:09:09+00:00","dateModified":"2024-07-26T14:43:00+00:00","description":"Good cyber hygiene can reduce susceptibility to cyber-attacks and protect sensitive information. Learn more.","breadcrumb":{"@id":"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/#primaryimage","url":"https:\/\/medent.com\/connect\/wp-content\/uploads\/2024\/04\/MEDENT-Mindset-10.png","contentUrl":"https:\/\/medent.com\/connect\/wp-content\/uploads\/2024\/04\/MEDENT-Mindset-10.png","width":1875,"height":625,"caption":"Best Practices for Securing Healthcare Data"},{"@type":"BreadcrumbList","@id":"https:\/\/medent.com\/connect\/2024\/04\/29\/cyber-hygiene-best-practices-for-securing-healthcare-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/medent.com\/connect\/"},{"@type":"ListItem","position":2,"name":"Cyber Hygiene: Best Practices for Securing Healthcare Data"}]},{"@type":"WebSite","@id":"https:\/\/medent.com\/connect\/#website","url":"https:\/\/medent.com\/connect\/","name":"medent","description":"EHR, Practice Management, Patient Engagement Solution","publisher":{"@id":"https:\/\/medent.com\/connect\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/medent.com\/connect\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/medent.com\/connect\/#organization","name":"MEDENT EMR\/EHR","alternateName":"MEDENT","url":"https:\/\/medent.com\/connect\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/medent.com\/connect\/#\/schema\/logo\/image\/","url":"https:\/\/medent.com\/connect\/wp-content\/uploads\/2020\/06\/login_banner.png","contentUrl":"https:\/\/medent.com\/connect\/wp-content\/uploads\/2020\/06\/login_banner.png","width":440,"height":112,"caption":"MEDENT EMR\/EHR"},"image":{"@id":"https:\/\/medent.com\/connect\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/medent.com\/connect\/#\/schema\/person\/1f7c7c969dd98a6b5aeeb355e0c408f0","name":"Megan Chapman","pronouns":"She\/Her","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/medent.com\/connect\/wp-content\/uploads\/2026\/03\/cropped-Megan_Chapman-e1774364208116-96x96.png","url":"https:\/\/medent.com\/connect\/wp-content\/uploads\/2026\/03\/cropped-Megan_Chapman-e1774364208116-96x96.png","contentUrl":"https:\/\/medent.com\/connect\/wp-content\/uploads\/2026\/03\/cropped-Megan_Chapman-e1774364208116-96x96.png","caption":"Megan Chapman"},"description":"Megan Chapman is the Director of Marketing &amp; Communications at medent. A former producer for NBC, TODAY, and MSNBC, she brings award-winning journalism experience to storytelling in healthcare technology, EHR software, and practice management. Megan has been with medent since 2018 and is passionate about helping clients simplify and understand EHR workflows so their practices can thrive.","url":"https:\/\/medent.com\/connect\/author\/meganc\/"}]}},"_links":{"self":[{"href":"https:\/\/medent.com\/connect\/wp-json\/wp\/v2\/posts\/7196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/medent.com\/connect\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/medent.com\/connect\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/medent.com\/connect\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/medent.com\/connect\/wp-json\/wp\/v2\/comments?post=7196"}],"version-history":[{"count":29,"href":"https:\/\/medent.com\/connect\/wp-json\/wp\/v2\/posts\/7196\/revisions"}],"predecessor-version":[{"id":7649,"href":"https:\/\/medent.com\/connect\/wp-json\/wp\/v2\/posts\/7196\/revisions\/7649"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/medent.com\/connect\/wp-json\/wp\/v2\/media\/7197"}],"wp:attachment":[{"href":"https:\/\/medent.com\/connect\/wp-json\/wp\/v2\/media?parent=7196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/medent.com\/connect\/wp-json\/wp\/v2\/categories?post=7196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/medent.com\/connect\/wp-json\/wp\/v2\/tags?post=7196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}