SHS Information Security Training

advertisement
SHS Annual Information Security Training
Information Security: What is It?
• The mission of the SHS Information Security
Program is to Protect Valuable SHS Resources
• Information Security is Everyone’s Responsibility
What Valuable Resources are We Protecting?
• Protected Health Information (PHI)
• Other Sensitive Information, including:
– Social Security Numbers
– Personnel Data: includes Names, Addresses, Dates of birth,
etc.
– Credit Card Numbers
– Financial Data
•
•
•
•
Hardware, Software, and Equipment (computers & laptops)
SHS Reputation in the Community
SHS Legal Position
Employees
Why You Need to Know about Information Security
• Without Information Security, SHS cannot protect PHI,
other sensitive information, and other valuable SHS
resources
• The Health Insurance Portability and Accountability Act
(HIPAA) requires SHS to provide for the physical and
electronic security of PHI
• Our customers are counting on us to protect their privacy
What are the Greatest Threats to these
Valuable Resources?
• Loss and Theft of Sensitive Information
• Phishing Scams that Compromise Sensitive Information
• Poor Password Practices that Lead to Unauthorized
Access
• Computer Malware, Including Viruses
• Improper Disposal of Sensitive Information
The Three Categories of Security Controls:
Physical Controls
• Physical Controls: designed to deny unauthorized
access to facilities, equipment and resources, and to
protect personnel and property from damage or harm.
These include:
–
–
–
–
–
–
Badge Security
Motion Detectors and Alarms
Security Cameras
Security Lighting
Fire Detection and Suppression
Emergency Power
The Three Categories of Security Controls:
Administrative Controls
• Administrative Controls: In general what people do to
protect valuable resources, including:
– Following policies, procedures, and work instructions
– Participating in education, training and awareness
The Three Categories of Security Controls:
Technical Controls
Technical Controls: Safeguards or countermeasures for an information
system that are primarily implemented and executed by the information
system through mechanisms contained in the hardware, software, or
firmware components of the system. These include:
– Computer Access Control
– Authentication mechanisms, including unique user names and complex
passwords
– Outbound Email Encryption
– Computer Whole Disk Encryption
– Malware Protection
– Inbound Spam and Phishing Email Filters
– Auditing and Monitoring of User Access
How to Prevent Loss or Theft
• Secure mobile devices (laptops, tablets, smart
phones, and USB drives) at all times
• Do not leave mobile devices unattended in your car
• Do not store sensitive information on your mobile
device unless it is part of an approved business
process
• Enforce visitor policies
Proper Disposal of Sensitive
Information
• Dispose of all printed material in Recycling bins
• Destroy CD and DVDs that contain sensitive information
before disposing of them
Protecting Against Phishing Attacks
• Never reveal your SHS network password to anyone
• SHS will never contact you and ask you for your password
• Phishing Attacks Can be by Email or Phone
– Emails often contain:
• A link that takes you outside the SHS network – make sure you
know where you are being asked to go!
• Requests your user name, password, or credit card
• False communications from web sites, auction sites, banks, online
payment processors or IT administrators
• Phishing Attacks often contain threats or promises
• Verify the source of the request
– Call the Service Desk
– Ask your Manager
Choosing and Protecting Your
Passwords
• Never Share Your SHS Network password with anyone
else
• Longer passwords are generally more secure
• Do not reuse your SHS password on any other site
• Do not write your password down and store it in an
unsecured place, especially on your desk or next to your
computer
Protecting against Malware
• Malware gets introduced to the SHS network most
frequently by employees:
• Visiting a website that has malware on it
• Downloading a file from a website
• Opening an email attachment that contains malware
• Visit only trusted websites
• Do not open attachments from unexpected or untrusted
email sources
• Maintain anti-virus protection on your home computer
and your mobile devices
Outbound Emails and Faxes containing PHI
• ALWAYS use the ‘encrypt message’ button or type
‘send secure’ into the subject line when sending PHI
or other sensitive information to a non-SHS (not
samhealth.org) address.
• ALWAYS use a coversheet when faxing PHI or other
sensitive information anywhere.
• ALWAYS double check email addresses or fax
numbers BEFORE you hit the SEND button.
Social Media
Many of us use social media – Facebook, Twitter, LinkedIn,
etc. – as a means of staying in touch with family, friends,
and professional contacts. SHS uses social media in its
Marketing and Foundation campaigns. These are fantastic
communication tools!
HOWEVER, A WORD OF CAUTION: Patient information
– even “disguised” patient information – has no place on
your personal or professional social media account or
page. This includes photos of the worksite, which may
include patients, documents, or employee sensitive
information in the background.
Social Media, cont.
You may think that no one will recognize the difficult patient
you dealt with last evening by your clever description, but in
our small communities identifying an unnamed patient can
be a very simple matter. You may be held personally
responsible for that disclosure – intentional or not – up to
and including SHS corrective action and possible personal
liability.
If you notice that a co-worker has posted PHI or other
sensitive information on their site, you should report that
immediately.
If You See Something, Say Something
• Report anything suspicious or out of the ordinary
• Rapid response minimizes the damage done as the result
of an information security incident
• Report lost or stolen devices or equipment to the IS Service
Desk immediately at:
• (541) 768-4911
• SHSISServiceDesk@samhealth.org
In Conclusion
Protect Valuable SHS Assets
Identify and Understand Threats to Security
Secure you Mobile Devices
Employ Physical, Administrative, and Technical Security
Controls
• Protect Yourself from Phishing Attacks
• Safeguard Your Passwords
• Report Anything Suspicious
•
•
•
•
Download