This “Cybersecurity for the Clinician” video training series totaling 47 minutes among eight videos explains in easy, non-technical language what clinicians and students in the medical profession need to understand about how cyber attacks can affect clinical operations and patient safety, and how to do your part to help keep health care data, systems, and patients safe from cyber threats. Episode 8: Conclusion, summarizes the concepts covered throughout the series.
Sign in to take quiz and track your certificates
The AMA Ed Hub™ is a unified education portal that provides a personalized experience for physicians and their care teams to keep current, increase their professional satisfaction, claim continuing education credits and continuously improve the care they provide–leading to real world outcomes of better healthcare and better health for their patients.
[00:00:00] Christian Dameff, MD: Thank you for joining us on this journey to learn more about cybersecurity threats to health care. Protecting our patients health, well-being, and privacy is a team effort, and requires everyone to pitch in. We've covered a lot of material, from cybersecurity as a patient safety issue, to the cyber threat landscape of today, to such topics as secure passwords, phishing, and insider threats.
[00:00:32] We learned how health care is considered critical infrastructure, which depends upon, and is dependent upon, other critical industries like electricity, water, and communications. And how, as health care professionals, we have a higher order of responsibility to the nation. You have been educated in all the various ways that social engineering can deceive us into clicking on malicious links or taking actions under threat.
[00:00:58] We have learned about the costly and dangerous impacts and consequences of cyberattacks, why hackers do them for money, or other malicious motivations. We even talked about some technical topics, like how medical devices and anything connected to a network can be susceptible to corruption and disruption, like medical equipment, mobile phones, thermostats, printers, industrial systems.
[00:01:24] Finally, the most important thing for you to review is how you can prevent these attacks from happening and how to maintain operations when something does occur. You need to think of yourself as the first line of defense and you need to practice good cybersecurity hygiene because it is important for good clinical practice.
[00:01:43] Let's summarize some of the basics of what you need to do and what not to do. Do not open email attachments unless you are expecting the email with the attachment and you trust the sender. Do not click on links in emails unless you are absolutely sure of their validity. Only visit or download software from webpages you trust.
[00:02:05] Use different passwords on different systems and accounts. Use a mix of upper and lowercase letters, numbers, and symbols in your passwords. Use a password manager. Finally, practice offline and paper-based procedures before downtime hits.
We hope you learned a lot from this training and feel more empowered to better protect your patients, your organization, and yourself from cyber threats.
[00:02:32] Finally, many thanks to our generous sponsors for making this training series possible. The Health Information Sharing and Analysis Center, and Health Care Service Corporation. Good luck in your practice, and remember, cyber safety is patient safety.
Disclosure Statement: Unless noted, all individuals in control of content reported no relevant financial relationships.
If applicable, all relevant financial relationships have been mitigated.
Participation Statement: Upon completion of this activity, learners will receive a Participation Certificate.
You currently have no searches saved.
You currently have no courses saved.