CTS Journal

Best Practices

Click on images below for complete articles.

Part 10 of our series on Best Practices

Everyone knows that the more complicated and unique a password is, the harder it is for hackers to discover it.

But passwords must also be unique. Otherwise, one account that becomes compromised can cascade into a nightmare of a long list of compromised accounts. Including, perhaps some very important ones. Your clinic network or EMR, perhaps. Or your banking records.

So, how can you create complex passwords, are truly unique, and yet are easy to use? Here are two methods that can help

Part 9 of our series on Best Practices

  • Hidden in your clinic's network wiring closet, or perhaps on a shelf, is a critical component needed to safeguard your clinic's data. Your wireless router.
  • Here are eight steps that needs to be done in order to help ensure you are using the right equipment, and it is configured properly.

Part 8 of our series on Best Practices

  • What are the implications for private medical clinics in British Columbia?
  • If I know that my clinic only has to be compliant with PIPA, do I need to report a breach?

Part 7 of our series on Best Practices

  • No "pwn" intended. How do I know whether someone has hacked a site where I have an on-line account?

An update to Part 5 of our series on Best Practices

The Doctors Technology Office sounded the alarm that ransomware "is spreading like the plague. Healthcare organizations must know that they ARE a target and will be attacked.". This post covers:

  • key information about the evolving and increasingly sophisticated nature of ransomware
  • what your clinic can do to decrease the chances of being attacked, and help recover from it, should this occur.

Part 6 of our series on Best Practices

  • Four critical steps you can take to respond effectively to a clinic data breach.

Part 5 of our series on Best Practices

  • 10 ways to protect your clinic

Part 4 of our series on Best Practices

  • How your clinic can quickly assess privacy and security risks
    • Privacy and Security Checklist
    • OIPC Security Self-Assessment Tool

Part 3 of our series on Best Practices

  • 12 recommendations that arose from an audit of a medical clinic by the BC Office of the Information and Privacy Commissioner (OIPC).

Part 2 of our series on Best Practices

  • Put someone in charge.
  • Once you have done that, here are 10 practical steps to help clinicians comply with privacy legislation.

Part 1 of our series on Best Practices

We are complicated creatures of habit. We tend to do things, more or less, because that’s the way we have always done them. Your patient’s confidential information may be put at risk simply because staff may not be aware of what they must do.

Other Blog Categories