Get Out of the Fog, Stay Safe in the Cloud – Part 2

Andrew H. Lee, Senior Product Managerfogblog_security_150px

You know that cloud-based solutions add greater protection from security risks, but it’s important to consider the correct criteria to be sure you select the solution that best fits your needs.   Here are five key takeaways:

  1. Password Policies –Strict password policy requirements are imperative to protect your data. For greater security, password requirements should include a minimum length, alpha-numeric character combinations, and lock-outs after failed login attempts. Be clever when setting your passwords.
  2. Time-outs when idle – Make sure your system automatically times out if you leave your system idle for more than 10 minutes.
  3. Encryption – Make sure your cloud solution encrypts the patient data. Look for encryption of at least 128 bit.
  4. Enterprise-Grade Hosting –An Enterprise-grade hosting facility such as Amazon is recommended to assure greater security.
  5. 3rd Party Audits – Find a vendor who has taken a proactive approach to security by arranging to be audited to identify areas of risk and has made the investment to secure all backdoor vulnerabilities (i.e.: PLYNT Security Testing Verification & Certification).

While there are no guarantees in protection from hackers, it is important to reduce the risks associated with maintaining patient health information. The right cloud solution can significantly reduce the risk.

Next in our cloud series, we’ll look at cloud models, so stay tuned.

Is your practice management solution living up to your needs for today and beyond? We’d like to hear from you as we shape the future of practice management.
Did you enjoy reading this blog article? Receive an update for each new post by clicking on the “Follow” button in the upper right corner.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: