7 Best Security Practices
Last Updated:
September 14, 2021

7 Best Security Practices

Odds are, when your best security practices and protocols are in place and functioning as they should, you’ll never even notice them. However, once those defenses are down, all of your data has suddenly become vulnerable. How many of these practices are you doing?

Security Practices  

Passwords and emails are not the only way to keep your security in check, here are some additional ways:  

  1. Keep your anti-virus software up to date - The software needs to be updated on a regular basis to find the newest threats
  2. Have a signed Business Associate Agreements (BAA) - This agreement needs to be signed by any third-party vendor handling your healthcare data. Even if a third party breached the information, the healthcare establishment could be at fault  
  3. Run Windows Professional with BitLocker all workstations - BitLocker is a Microsoft program used to encrypt and protect you from any unauthorized changes to your system
  4. Separate your Wi-Fi. A guest Wi-Fi network can be used for non-employees and personal devices. Any internal devices used for healthcare purposes should be managed by IT and connected to an internal Wi-Fi network.
  5. Annual Security Audit - That is required by the ADA and HIPAA regulations by your HIPAA liaison. Make sure you keep the logs on hand for a minimum of 6 years  
  6. Privacy settings – Check your settings for all social media accounts, software, and network permissions  
  7. When an employee leaves – Ensure all  access has been removed

For assistance with any of these security practices, please contact us at 614-548-1135 or sales@centraltech.io

Related Content

Avoiding the HIPAA Wall of Shame
Avoiding the HIPAA Wall of Shame

Everyone knows you should go to the dentist every six months to keep your teeth in tip-top shape. You are motivated to do this for a gorgeous smile and to prevent tooth decay and gum disease. But, how often do you check on your IT hygiene? How are you preventing data breaches and ransomware?

Last Updated:
June 1, 2021
Has Your E-mail Address Been Compromised?
Has Your E-mail Address Been Compromised?

Your email address is your literal address to all of your secure data. You probably use your email to get into your bank account, tax documents, and all of the juicy secure data.

Last Updated:
July 14, 2021
How Safe Are Your Passwords?
How Safe Are Your Passwords?

Passwords are our everything. It gives us access to our bank, our social media, and our Amazon purchases. There is probably not one day that goes by that we are not utilizing password-protected accounts. So let’s protect our online lives with safe password practices.

Last Updated:
June 15, 2021

Contact Us

Need to get in touch? We'd love to hear from you.
Give Us A Call

Interested in Central Tech's MSP solutions? Chat with a member of our sales team to get started.

+1 614 548-1135
Email Support

Questions about our services, or just just want to say hey? We typically respond with 1-2 business days.

Email Support
Get News & Updates

Sign up for our free newsletter to get the latest on company and industry news, exclusive offers, and more.

Join our Newsletter
© Copyright Central Tech, LLC. All Rights Reserved.