PLEASE NOTE: THIS COURSE CAN NO LONGER BE TAKEN FOR CE POINTS. This course is available now for review by registered users to reprint their Certificates if needed. It has expired and can no longer be taken to achieve CE points or certificates.
In the dental office, we often think about hygiene, prevention, infection and disease. We know that viruses and disease are ubiquitous, and no one is immune from the threat of illness. Like in life, the cyber landscape is full of risk. Decision-makers need to think in clinical terms about their information technology infrastructure. Systems should not be thought of as either clean or infected, but in terms of a wellness model that considers susceptibility, resilience, wellness, vulnerability to infection and recoverability.
This course will help decision-makers understand how to protect the integrity of digital records, and how their networks store and access data. It will give them a checklist based framework, from a clinicians perspective, to guide discussions with their IT professionals, create policies in the office, and place an emphasis on multiple, overlapping and mutually supportive defensive systems that balance benefits, risks and costs.
Learning Objectives:
• Identify what falls into patient data, and if it’s integrity is “intact”
• Identify how IT is currently being used, the physical make up of an IT network, and key policies that need to be in place.
• Identify the core assets in their own practice that need protection and identify the most-significant threats to their business • Learn what to discuss with IT professionals, as a decision-maker, to build a threat-based, layered and defensive network architecture.
A checklist-based plan will be given and discussed.