Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
29
1
3
4
5
7
8
10
11
12
15
16
17
18
19
21
24
25
26
27
30
31
1
2
A Behavioral Health Collision At The EHR Intersection
2014-09-30    
2:00 pm - 3:30 pm
Date/Time Date(s) - 09/30/2014 2:00 pm Hear Why Many Organizations Are Changing EHRs In Order To Remain Competitive In The New Value-Based Health Care Environment [...]
Meaningful Use and The Rise of the Portals
2014-10-02    
12:00 pm - 12:45 pm
Meaningful Use and The Rise of the Portals: Best Practices in Patient Engagement Thu, Oct 2, 2014 10:30 PM - 11:15 PM IST Join Meaningful [...]
Adva Med 2014 The MedTech Conference
2014-10-06    
All Day
Adva Med 2014 The MedTech Conference October 6-8, 2014 McCormick Place Chicago, IL For more information, visit, advamed2014.com For Registration details, click here  
Public Health Measures Meaningful Use
2014-10-09    
12:00 pm - 12:45 pm
Public Health Measures Meaningful Use: Reporting on Public Health Measures Join Meaningful Use expert Jim Tate for a three part series of webinars addressing MU [...]
2014 Hospital & Healthcare I.T. Conference
2014-10-13    
All Day
Join us at our 2014 Hospital & Healthcare I.T. Conference and experience the following: Up to 125 Hospital & Healthcare I.T. executives from America’s most prestigious [...]
Connected Health Care 2014
Key Trends That will be Discussed at the Conference! Connected Healthcare 2014 is set to explore the crucial topics that are revolutionizing the connected health industry: [...]
HealthTech Conference
2014-10-14    
All Day
HealthTech Capital is a group of private investors dedicated to funding and mentoring new "HealthTech" start ups at the intersection of healthcare with the computer [...]
Health Informatics & Technology Conference (HITC-2014)
2014-10-20    
All Day
Information technology has ability to improve the quality, productivity and safety of health care mangement. However, relatively very few health care providers have adopted IT. [...]
HIMSS Amsterdam 2014
2014-10-20    
12:00 am
About HIMSS Amsterdam 2014 This year, the second annual HIMSS Amsterdam event will be taking place on 6-7 November 2014 at the Hotel Okura. The [...]
Patient Portal Functionality and EMR Integration Demonstration
2014-10-22    
2:00 pm - 3:30 pm
This purpose of this webcast is to present a demonstration to show how the Patient Portal integrates with EMR, as well as discuss how this [...]
Connected Health Symposium 2014
Symposium 2014 - Connected Health in Practice: Engaging Patients and Providers Outside of Traditional Care Settings Collaborating with industry visionaries, clinical experts, patient advocates and [...]
CHIME College of Healthcare Information Management Executives
2014-10-28 - 2014-10-31    
All Day
The Premier Event for Healthcare CIOs Hotel Accomodations JW Marriott San Antonio Hill Country 23808 Resort Parkway San Antonio, Texas 78761 Telephone: 210-276-2500 Guest Fax: [...]
The Myth of the Paperless EMR
2014-10-29    
2:00 pm - 3:00 pm
Is Paper Eluding Your Current Technologies; The Myth of the Paperless EMR Please join Intellect Resources as we present Is Paper Eluding Your Current Technologies; The Myth [...]
Events on 2014-09-30
Events on 2014-10-02
Events on 2014-10-06
Events on 2014-10-09
Events on 2014-10-13
Events on 2014-10-14
Connected Health Care 2014
14 Oct 14
San Diego
HealthTech Conference
14 Oct 14
San Mateo
Events on 2014-10-20
HIMSS Amsterdam 2014
20 Oct 14
Amsterdam
Events on 2014-10-23
Events on 2014-10-28
Events on 2014-10-29
Articles

4 Areas To Watch When Sharing Information Online

hospital data

4 Areas To Watch When Sharing Information Online

Sharing information online has become the norm in today’s world, especially in recent decades, as people purchase items online and share photos, stories and life events on social media.
It’s essential for anyone who uses the internet to understand what information should be shared online and when you should refrain from posting something personal. Some data may seem harmless but could lead cyber criminals to your identity. Once they know enough of your personal information, it’s easier for them to hack into your bank account, use your credit card or send you ransomware. Here are four areas where you should exercise caution.

1. Emails

Cyber criminals are often very good at disguising fraudulent emails to make them look legitimate. They may set up an email to look like it came from a bank, store or secure payment site you use. The subject line may appear to be a warning that your account is frozen or that you need to provide personal information to verify your account. These emails usually contain links or phone numbers that lead back to the hacker and allow them to install a virus or obtain your personal data.
If you doubt that an email is legitimate, proceed with caution. Don’t click on any links or attachments. If it appears to come from a financial institution you use, look up the phone number or website yourself and contact the company on your own. Legitimate customer service representatives never ask for personal information through email.
You can protect your system further by purchasing security tools such as spyware and antivirus software.

2. Photos

If you take a photo with a smartphone and share it online, your GPS coordinates may be embedded in the image. This information allows hackers to pinpoint precisely where you took the photo and possibly use this knowledge against you.
Keep in mind that when you post a photo to a social media site or elsewhere online, it is accessible to others. Hackers can copy, alter and share your photo without your consent. To protect your identity, check the privacy settings you have set up for the site where you post the picture. You may be able to apply more substantial restrictions.
Never post photos that are incriminating or depict you or someone else in a negative manner. While a picture may seem funny or harmless at the time, it’s there forever once an image is online. Years from now, someone can discover photos that can harm your reputation.

3. Personal Information

Many internet users understand that it’s dangerous to post private data online. However, they might not realize that cyber criminals can find clues about them by using information that seems harmless but gives away personal details.
Teenagers, for example, may share that they are planning to attend a concert. If they name the city and the date of the show, criminals know where they will be at a given time. A couple on a date may post photos of themselves at a particular restaurant. This information is generally harmless, but if cyber criminals are following you, the details add up to reveal where you live, what your interests are and where you like to go.
Again, privacy settings on social media sites play an essential role in protecting your personal information. Children and teens should be reminded that it can be hazardous to reveal their names and location details to people they’ve never met in person.

4. Webcams

Webcams have become an essential tool for videoconferencing. However, they can also be taken over by a hacker and accessed remotely. When you’re not using your webcam, disconnect or disable it. Talk to children and teenagers about using webcams responsibly. You can also make sure your system software is up to date and use a secure Wi-Fi network for added protection.
Using the internet to share information is an easy, convenient way to conduct business and stay in touch with friends and family. If you exercise caution with your online activities and use available tools to protect your security, you can reduce your risk of becoming a victim of identity theft.