Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
30
12:00 AM - Hepatology 2021
31
1
2
3
4
7
8
9
10
11
13
14
15
16
18
19
20
21
22
23
24
25
27
28
29
30
1
2
World Nanotechnology Congress 2021
2021-03-29    
All Day
Nano Technology Congress 2021 provides you with a unique opportunity to meet up with peers from both academic circle and industries level belonging to Recent [...]
Nanomedicine and Nanomaterials 2021
2021-03-29    
All Day
NanoMed 2021 conference provides the best platform of networking and connectivity with scientist, YRF (Young Research Forum) & delegates who are active in the field [...]
Smart Materials and Nanotechnology
2021-03-29 - 2021-03-30    
All Day
Smart Material 2021 clears a stage to globalize the examination by introducing an exchange amongst ventures and scholarly associations and information exchange from research to [...]
Hepatology 2021
2021-03-30 - 2021-03-31    
All Day
Hepatology 2021 provides a great platform by gathering eminent professors, Researchers, Students and delegates to exchange new ideas. The conference will cover a wide range [...]
Annual Congress on  Dental Medicine and Orthodontics
2021-04-05 - 2021-04-06    
All Day
Dentistry Medicine 2021 is a perfect opportunity intended for International well-being Dental and Oral experts too. The conference welcomes members from every driving university, clinical [...]
World Climate Congress & Expo 2021
2021-04-06 - 2021-04-07    
All Day
Climatology is the study of the atmosphere and weather patterns over time. This field of science focuses on recording and analyzing weather patterns throughout the [...]
European Food Chemistry and Drug Safety Congress
2021-04-12 - 2021-04-13    
All Day
We invite you to meet us at the Food Chemistry Congress 2021, where we will ensure that you’ll have a worthwhile experience with scholars of [...]
Proteomics, Genomics & Bioinformatics
2021-04-12 - 2021-04-13    
All Day
Proteomics 2021 is one of the front platforms for disseminating latest research results and techniques in Proteomics Research, Mass spectrometry, Bioinformatics, Computational Biology, Biochemistry and [...]
Plant Science & Physiology
2021-04-17 - 2021-04-18    
All Day
The PLANT PHYSIOLOGY 2021 theme has broad interests, which address many aspects of Plant Biology, Plant Science, Plant Physiology, Plant Biotechnology, and Plant Pathology. Research [...]
Pollution Control & Sustainable 2021
2021-04-26 - 2021-04-27    
All Day
Pollution Control 2021 conference is organizing with the theme of “Accelerating Innovations for Environmental Sustainability” Conference Series llc LTD organizes environmental conferences series 1000+ Global [...]
Events on 2021-03-30
Hepatology 2021
30 Mar 21
Events on 2021-04-06
Events on 2021-04-17
Events on 2021-04-26
Latest News

Apr 26 : 5 things physicians need to know about ‘Heartbleed’

ehr replacements

Heartbleed may sound like a medical term, but it is actually a flaw in computer software that has affected web operations for many businesses and consumers. Medical practices are no exception, and should be aware of how to handle this and other Heartbleeds, that could corrupt electronic health record (EHR) systems, patient portals, or networked computers in your practice.

Lee Kim, JD, FHIMSS, director of privacy and security at the Healthcare Information and Management Systems Society, answers five questions for physicians facing possible issues now or in the future arising from Heartbleed.

Q: Could you explain in laymen’s terms what Heartbleed is?

Kim: “Heartbleed” is not a virus but rather a vulnerability in the software. This vulnerability was caused by a software bug. As a result of this vulnerability, Internet communications and transmissions which were intended to be encrypted might actually not be encrypted. A hacker may exploit this vulnerability and steal secret keys and information as a result of the unsecure channel.

However, not every Internet site is affected—only those that use certain versions of OpenSSL. According to US-CERT (the United States Computer Emergency Readiness Team), many vendors have already issued patches to address this OpenSSL vulnerability – essentially, to plug this vulnerability so that it can no longer be exploited.

Q: Should practice owners with web-based EHRs worry that this could affect their equipment?

Kim: Practice owners need to contact their vendors to determine if the web-based EHR is vulnerable to Heartbleed and, if so, whether that vulnerability has been patched. If it has not been patched, the practice owners may wish to inquire about the plan of action to address the Heartbleed vulnerability.

Q: Are other office computers at risk for the virus?

Kim: If an office computer exchanges encrypted information over a network, then its information and secret keys might be exploitable by an unauthorized third party. A vulnerability scan will help determine whether an office computer is indeed vulnerable to the “Heartbleed” vulnerability.

Q: What can practices do to prevent this or any other virus from affecting their business?

Kim: The best approach is to be proactive by conducting regular risk assessments and remediate and mitigate those risks, which need to be addressed. As part of the risk assessment, a vulnerability scan should be done and vulnerabilities should be addressed by applying patches to address these vulnerabilities. Some resources which can be used to track vulnerabilities include the NIST Vulnerability Database (https://nvd.nist.gov/) and the MITRE CVE® list (http://cve.mitre.org/cve/index.html).

Q: Do practices need to have patients change passwords used for online patient portals?

Kim: It is a good idea, in any event, for patients to regularly change passwords with online patient portals. However, due to the nature of the “Heartbleed” vulnerability, it is possible that passwords may be compromised if the website uses a vulnerable version of OpenSSL. Accordingly, it would behoove the practice to make patients change their passwords, especially if they had been using an affected version of OpenSSL. More information on affected versions and what can be done to proactively address the reported vulnerability can be found here: http://www.kb.cert.org/vuls/id/720951.

Source