SlideShare una empresa de Scribd logo
1 de 22
webinar
Addressing the Data Security
Risks of Cloud-Based Software
Tim Nabhani & Jesse Salmon October 10, 2019
kareo.com
Agenda
2
Agenda
2
• Welcome & Introductions
• Data Security Overview
• On-Premise Data Security Best
Practices
• Cloud Data Security Measures
• General Data Security Best
Practices
• Conclusion
kareo.com 33
Speakers
Tim Nabhani is an Information Security Architect at Kareo. He is responsible for
developing solutions to meet Kareo's strategic security initiatives. He has earned
his Masters in Computer Science from Cal State Long Beach, along with various
Information Security certifications such as CISSP and GPEN, and has over a
decade's worth of experience in building and securing technology solutions.
Tim Nabhani
Jesse Salmon
Jesse Salmon leads Kareo’s Information Security Team which maintains technical
safeguards to protect patient data. He got his start in Information Security while
attached to the 1st Marine Expeditionary Force serving as an information
assurance team lead. While deployed, Jesse learned the importance of
measuring and incremental improvement of security controls. Taking these skills
to the private sector, Jesse consulted for Fortune 500 companies providing
services around Identity and Access Management, PCI compliance and threat
detection.
Data Security Overview
kareo.com 55
Why is Security Important?
Bad Guys want to steal your data
• For Profit
• Fullz
• State Actors
• Corporate Espionage
• Hacktivists
Legal Requirements
• HIPAA / HITECH
kareo.com 66
Where to Store your Data?
Storing your data in the cloud vs. storing your data on a company server
- How does it work?
- How is data securely stored?
kareo.com 77
The Myths
1. “My data is stored in the cloud so I don’t need to back it up.”
2. “Because my data is stored in the cloud, it is being used
securely.”
3. “The free software I’m using is truly free.”
4. “The cloud is new technology and can’t be trusted.”
5. “My on-premise servers are more secure than the cloud.”
On-Premise Data Security Best Practices
kareo.com 99
How Are You Protecting Your Servers?
Prevention
Detection
Response
kareo.com 1010
Protecting Your Servers by Prevention
Security measures must be taken to protect information
from unauthorized modification, destruction, or disclosure
whether accidental or intentional.
Secure Your Network
• Hide and protect your WiFi
Protect the Perimeter
• Enable firewall protection at work
Invest in Tools
• AntiVirus
Update
• Install latest patches
kareo.com 1111
Protecting Your Servers though Detection
The most important element is timely detection and
notification of an attack
Physical Security
• Lock all filing cabinets and checking if still locked
• Closed circuit cameras
Monitoring and Logging
• Log all events in case of an investigation
• Deploy sensors throughout your network
• Commonly found in endpoint security software
kareo.com 1212
Protecting Your Servers with your Response
Making important decisions or developing policy while under
attack is a recipe for disaster.
This process is extremely important due to the lessons
learned.
Test Your Security
• Penetration testing
• Virtual fire drills
Disaster Recovery
• Planning
• Testing
• Updating
Cloud Data Security Measures
kareo.com 1414
HIPAA Requirements
BAA (Business Associate Agreement) between you and your software
provider clarifies responsibilities in the event of a data breach
• Unless otherwise stated, the provider (you) is fully responsible for the
protection/safety of all patient information
kareo.com 1515
Data Encryption
Encryption at Rest
and in Transit
Key Management
kareo.com 1616
Disaster Recovery
Multiple Data Centers
• To recover in case of loss
Damage Control
• Sprinklers
Testing
• Recovery time
kareo.com 1717
Questions to Ask
Certifications?
HITRUST
• Highest healthcare security standard
possible
• Provides evidence that security systems
are audited by independent 3rd party
Reports?
SOC2 Type 2 Report
• Rigorous proof and test of existing
controls
General Best Practices for Data Security
kareo.com 1919
Training Your Staff
Think Before You Click
• If you’re not expecting it, don’t click it
• No pop-ups or unknown emails/links
Multiple Strong Keys
• Use strong password and update it
regularly
• Use a second factor to authenticate
kareo.com 2020
Free is not Free
Free Browser Plugins are Dangerous
• Read your cookies
• See the URLs you access
• Access files on your computer
• See your web requests
Free Software is NOT Free
• You’re probably paying with data instead of money
• Giving others access to data puts you and your patients at risk
Advertisements can carry viruses
• New type of malware carried through ads called Malvertizing
Conclusion
kareo.com 2222
Connect with Kareo
Kareo @GoKareo GoKareo
3353 Michelson Drive, Suite 400
Irvine, CA 92612
(866) 231-2871
billing.companies@kareo.com

Más contenido relacionado

La actualidad más candente

Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnKloudLearn
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Edureka!
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsFireEye, Inc.
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security RequirementsSteven Cahill
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughSavvius, Inc
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised InsiderImperva
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Software
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationSymantec
 
Security Automation and Orchestration
Security Automation and OrchestrationSecurity Automation and Orchestration
Security Automation and OrchestrationGreg Foss
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldQualys
 
The Non-Advanced Persistent Threat
The Non-Advanced Persistent ThreatThe Non-Advanced Persistent Threat
The Non-Advanced Persistent ThreatImperva
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatETech 7
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services OverviewCasey Lucas
 
Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?SwiftTech Solutions, Inc.
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersIBM Security
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Securitycrussell79
 

La actualidad más candente (20)

Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
Basic Security Requirements
Basic Security RequirementsBasic Security Requirements
Basic Security Requirements
 
Cyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enoughCyber Security - IDS/IPS is not enough
Cyber Security - IDS/IPS is not enough
 
Anatomy of the Compromised Insider
Anatomy of the Compromised InsiderAnatomy of the Compromised Insider
Anatomy of the Compromised Insider
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
Security Automation and Orchestration
Security Automation and OrchestrationSecurity Automation and Orchestration
Security Automation and Orchestration
 
Gain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless WorldGain Visibility & Control of IT Assets in a Perimeterless World
Gain Visibility & Control of IT Assets in a Perimeterless World
 
The Non-Advanced Persistent Threat
The Non-Advanced Persistent ThreatThe Non-Advanced Persistent Threat
The Non-Advanced Persistent Threat
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?Video surveillance: Why should my business use it?
Video surveillance: Why should my business use it?
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
Cisa ransomware guide
Cisa ransomware guideCisa ransomware guide
Cisa ransomware guide
 

Similar a Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation

Addressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based SoftwareAddressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based SoftwareKareo
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentationJMS Secure Data
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured WorldJennifer Mary
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxLokNathRegmi1
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
The Ins and Outs of Data Security: Kareo Success Summit
The Ins and Outs of Data Security: Kareo Success SummitThe Ins and Outs of Data Security: Kareo Success Summit
The Ins and Outs of Data Security: Kareo Success SummitKareo
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteSurfWatch Labs
 

Similar a Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation (20)

Addressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based SoftwareAddressing the Data Security Risks of Cloud-Based Software
Addressing the Data Security Risks of Cloud-Based Software
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Jms secure data presentation
Jms secure data  presentationJms secure data  presentation
Jms secure data presentation
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
 
CCSK.pptx
CCSK.pptxCCSK.pptx
CCSK.pptx
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
The Ins and Outs of Data Security: Kareo Success Summit
The Ins and Outs of Data Security: Kareo Success SummitThe Ins and Outs of Data Security: Kareo Success Summit
The Ins and Outs of Data Security: Kareo Success Summit
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
 

Más de Kareo

Roundtable Discussion: The State of the Medical Billing Industry
Roundtable Discussion: The State of the Medical Billing IndustryRoundtable Discussion: The State of the Medical Billing Industry
Roundtable Discussion: The State of the Medical Billing IndustryKareo
 
Getting Paid in 2023: Strategies to Maximize Your Revenue
Getting Paid in 2023: Strategies to Maximize Your RevenueGetting Paid in 2023: Strategies to Maximize Your Revenue
Getting Paid in 2023: Strategies to Maximize Your RevenueKareo
 
Key Tips to Set Your Billing Company Up for Success
Key Tips to Set Your Billing Company Up for SuccessKey Tips to Set Your Billing Company Up for Success
Key Tips to Set Your Billing Company Up for SuccessKareo
 
MACRA/MIPS Tips: Don't Leave Money on the Table
MACRA/MIPS Tips: Don't Leave Money on the TableMACRA/MIPS Tips: Don't Leave Money on the Table
MACRA/MIPS Tips: Don't Leave Money on the TableKareo
 
Robotic Process Automation: Two Ways to Bring it Into Your Practice Today
Robotic Process Automation: Two Ways to Bring it Into Your Practice TodayRobotic Process Automation: Two Ways to Bring it Into Your Practice Today
Robotic Process Automation: Two Ways to Bring it Into Your Practice TodayKareo
 
Modernized Patient and Mental Health Practice: Accessibility and Mental Healt...
Modernized Patient and Mental Health Practice: Accessibility and Mental Healt...Modernized Patient and Mental Health Practice: Accessibility and Mental Healt...
Modernized Patient and Mental Health Practice: Accessibility and Mental Healt...Kareo
 
Don’t Miss Out on Money! How to Make Sure Your Credentialing is Done Correctly.
Don’t Miss Out on Money! How to Make Sure Your Credentialing is Done Correctly.Don’t Miss Out on Money! How to Make Sure Your Credentialing is Done Correctly.
Don’t Miss Out on Money! How to Make Sure Your Credentialing is Done Correctly.Kareo
 
The Future Is Now—Drive Workflow Efficiency & Improve Profitability with Robo...
The Future Is Now—Drive Workflow Efficiency & Improve Profitability with Robo...The Future Is Now—Drive Workflow Efficiency & Improve Profitability with Robo...
The Future Is Now—Drive Workflow Efficiency & Improve Profitability with Robo...Kareo
 
Setting your practice or client’s practice up for success with achieving clea...
Setting your practice or client’s practice up for success with achieving clea...Setting your practice or client’s practice up for success with achieving clea...
Setting your practice or client’s practice up for success with achieving clea...Kareo
 
Getting Paid in 2022: Adapting your Practice to Thrive Within the Healthcare ...
Getting Paid in 2022: Adapting your Practice to Thrive Within the Healthcare ...Getting Paid in 2022: Adapting your Practice to Thrive Within the Healthcare ...
Getting Paid in 2022: Adapting your Practice to Thrive Within the Healthcare ...Kareo
 
5 Easy Steps to Earning Money Through MACRA
5 Easy Steps to Earning Money Through MACRA5 Easy Steps to Earning Money Through MACRA
5 Easy Steps to Earning Money Through MACRAKareo
 
Getting Paid in 2021: New Year, Fresh Perspective, More Revenue
Getting Paid in 2021: New Year, Fresh Perspective, More RevenueGetting Paid in 2021: New Year, Fresh Perspective, More Revenue
Getting Paid in 2021: New Year, Fresh Perspective, More RevenueKareo
 
The ABCs of Starting a Medical Practice
The ABCs of Starting a Medical PracticeThe ABCs of Starting a Medical Practice
The ABCs of Starting a Medical PracticeKareo
 
Top 10 Medical Billing KPIs That Show Where Your Practice is Losing Money
Top 10 Medical Billing KPIs That Show Where Your Practice is Losing MoneyTop 10 Medical Billing KPIs That Show Where Your Practice is Losing Money
Top 10 Medical Billing KPIs That Show Where Your Practice is Losing MoneyKareo
 
How to Build a 5-Star Practice with a Patient-Centered Approach
How to Build a 5-Star Practice with a Patient-Centered ApproachHow to Build a 5-Star Practice with a Patient-Centered Approach
How to Build a 5-Star Practice with a Patient-Centered ApproachKareo
 
Overcoming Telehealth Barriers to Mobilize Your Practice and Maximize Revenue
Overcoming Telehealth Barriers to Mobilize Your Practice and Maximize RevenueOvercoming Telehealth Barriers to Mobilize Your Practice and Maximize Revenue
Overcoming Telehealth Barriers to Mobilize Your Practice and Maximize RevenueKareo
 
How to Earn Your 9% MIPS Incentive Despite 2020 Challenges
How to Earn Your 9% MIPS Incentive Despite 2020 ChallengesHow to Earn Your 9% MIPS Incentive Despite 2020 Challenges
How to Earn Your 9% MIPS Incentive Despite 2020 ChallengesKareo
 
Modernize Your Mental Health Practice to Save Time and Improve Care Delivery
Modernize Your Mental Health Practice to Save Time and Improve Care DeliveryModernize Your Mental Health Practice to Save Time and Improve Care Delivery
Modernize Your Mental Health Practice to Save Time and Improve Care DeliveryKareo
 
Collecting Patient Payments During COVID-19 and Beyond - a Blueprint for Success
Collecting Patient Payments During COVID-19 and Beyond - a Blueprint for SuccessCollecting Patient Payments During COVID-19 and Beyond - a Blueprint for Success
Collecting Patient Payments During COVID-19 and Beyond - a Blueprint for SuccessKareo
 
Leveraging Federal Financial Assistance Programs During COVID-19
Leveraging Federal Financial Assistance Programs During COVID-19Leveraging Federal Financial Assistance Programs During COVID-19
Leveraging Federal Financial Assistance Programs During COVID-19Kareo
 

Más de Kareo (20)

Roundtable Discussion: The State of the Medical Billing Industry
Roundtable Discussion: The State of the Medical Billing IndustryRoundtable Discussion: The State of the Medical Billing Industry
Roundtable Discussion: The State of the Medical Billing Industry
 
Getting Paid in 2023: Strategies to Maximize Your Revenue
Getting Paid in 2023: Strategies to Maximize Your RevenueGetting Paid in 2023: Strategies to Maximize Your Revenue
Getting Paid in 2023: Strategies to Maximize Your Revenue
 
Key Tips to Set Your Billing Company Up for Success
Key Tips to Set Your Billing Company Up for SuccessKey Tips to Set Your Billing Company Up for Success
Key Tips to Set Your Billing Company Up for Success
 
MACRA/MIPS Tips: Don't Leave Money on the Table
MACRA/MIPS Tips: Don't Leave Money on the TableMACRA/MIPS Tips: Don't Leave Money on the Table
MACRA/MIPS Tips: Don't Leave Money on the Table
 
Robotic Process Automation: Two Ways to Bring it Into Your Practice Today
Robotic Process Automation: Two Ways to Bring it Into Your Practice TodayRobotic Process Automation: Two Ways to Bring it Into Your Practice Today
Robotic Process Automation: Two Ways to Bring it Into Your Practice Today
 
Modernized Patient and Mental Health Practice: Accessibility and Mental Healt...
Modernized Patient and Mental Health Practice: Accessibility and Mental Healt...Modernized Patient and Mental Health Practice: Accessibility and Mental Healt...
Modernized Patient and Mental Health Practice: Accessibility and Mental Healt...
 
Don’t Miss Out on Money! How to Make Sure Your Credentialing is Done Correctly.
Don’t Miss Out on Money! How to Make Sure Your Credentialing is Done Correctly.Don’t Miss Out on Money! How to Make Sure Your Credentialing is Done Correctly.
Don’t Miss Out on Money! How to Make Sure Your Credentialing is Done Correctly.
 
The Future Is Now—Drive Workflow Efficiency & Improve Profitability with Robo...
The Future Is Now—Drive Workflow Efficiency & Improve Profitability with Robo...The Future Is Now—Drive Workflow Efficiency & Improve Profitability with Robo...
The Future Is Now—Drive Workflow Efficiency & Improve Profitability with Robo...
 
Setting your practice or client’s practice up for success with achieving clea...
Setting your practice or client’s practice up for success with achieving clea...Setting your practice or client’s practice up for success with achieving clea...
Setting your practice or client’s practice up for success with achieving clea...
 
Getting Paid in 2022: Adapting your Practice to Thrive Within the Healthcare ...
Getting Paid in 2022: Adapting your Practice to Thrive Within the Healthcare ...Getting Paid in 2022: Adapting your Practice to Thrive Within the Healthcare ...
Getting Paid in 2022: Adapting your Practice to Thrive Within the Healthcare ...
 
5 Easy Steps to Earning Money Through MACRA
5 Easy Steps to Earning Money Through MACRA5 Easy Steps to Earning Money Through MACRA
5 Easy Steps to Earning Money Through MACRA
 
Getting Paid in 2021: New Year, Fresh Perspective, More Revenue
Getting Paid in 2021: New Year, Fresh Perspective, More RevenueGetting Paid in 2021: New Year, Fresh Perspective, More Revenue
Getting Paid in 2021: New Year, Fresh Perspective, More Revenue
 
The ABCs of Starting a Medical Practice
The ABCs of Starting a Medical PracticeThe ABCs of Starting a Medical Practice
The ABCs of Starting a Medical Practice
 
Top 10 Medical Billing KPIs That Show Where Your Practice is Losing Money
Top 10 Medical Billing KPIs That Show Where Your Practice is Losing MoneyTop 10 Medical Billing KPIs That Show Where Your Practice is Losing Money
Top 10 Medical Billing KPIs That Show Where Your Practice is Losing Money
 
How to Build a 5-Star Practice with a Patient-Centered Approach
How to Build a 5-Star Practice with a Patient-Centered ApproachHow to Build a 5-Star Practice with a Patient-Centered Approach
How to Build a 5-Star Practice with a Patient-Centered Approach
 
Overcoming Telehealth Barriers to Mobilize Your Practice and Maximize Revenue
Overcoming Telehealth Barriers to Mobilize Your Practice and Maximize RevenueOvercoming Telehealth Barriers to Mobilize Your Practice and Maximize Revenue
Overcoming Telehealth Barriers to Mobilize Your Practice and Maximize Revenue
 
How to Earn Your 9% MIPS Incentive Despite 2020 Challenges
How to Earn Your 9% MIPS Incentive Despite 2020 ChallengesHow to Earn Your 9% MIPS Incentive Despite 2020 Challenges
How to Earn Your 9% MIPS Incentive Despite 2020 Challenges
 
Modernize Your Mental Health Practice to Save Time and Improve Care Delivery
Modernize Your Mental Health Practice to Save Time and Improve Care DeliveryModernize Your Mental Health Practice to Save Time and Improve Care Delivery
Modernize Your Mental Health Practice to Save Time and Improve Care Delivery
 
Collecting Patient Payments During COVID-19 and Beyond - a Blueprint for Success
Collecting Patient Payments During COVID-19 and Beyond - a Blueprint for SuccessCollecting Patient Payments During COVID-19 and Beyond - a Blueprint for Success
Collecting Patient Payments During COVID-19 and Beyond - a Blueprint for Success
 
Leveraging Federal Financial Assistance Programs During COVID-19
Leveraging Federal Financial Assistance Programs During COVID-19Leveraging Federal Financial Assistance Programs During COVID-19
Leveraging Federal Financial Assistance Programs During COVID-19
 

Último

Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near MeBook Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Menarwatsonia7
 
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service HyderabadCall Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabaddelhimodelshub1
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girls Service Gurgaon
 
EMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical CareEMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical CareRommie Duckworth
 
Call Girls Kukatpally 7001305949 all area service COD available Any Time
Call Girls Kukatpally 7001305949 all area service COD available Any TimeCall Girls Kukatpally 7001305949 all area service COD available Any Time
Call Girls Kukatpally 7001305949 all area service COD available Any Timedelhimodelshub1
 
Kukatpally Call Girls Services 9907093804 High Class Babes Here Call Now
Kukatpally Call Girls Services 9907093804 High Class Babes Here Call NowKukatpally Call Girls Services 9907093804 High Class Babes Here Call Now
Kukatpally Call Girls Services 9907093804 High Class Babes Here Call NowHyderabad Call Girls Services
 
Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...
Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...
Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...delhimodelshub1
 
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...High Profile Call Girls Chandigarh Aarushi
 
Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...
Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...
Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...narwatsonia7
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxAyush Gupta
 
Hi,Fi Call Girl In Whitefield - [ Cash on Delivery ] Contact 7001305949 Escor...
Hi,Fi Call Girl In Whitefield - [ Cash on Delivery ] Contact 7001305949 Escor...Hi,Fi Call Girl In Whitefield - [ Cash on Delivery ] Contact 7001305949 Escor...
Hi,Fi Call Girl In Whitefield - [ Cash on Delivery ] Contact 7001305949 Escor...narwatsonia7
 
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call GirlsBook Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call GirlsCall Girls Noida
 
Call Girls Uppal 7001305949 all area service COD available Any Time
Call Girls Uppal 7001305949 all area service COD available Any TimeCall Girls Uppal 7001305949 all area service COD available Any Time
Call Girls Uppal 7001305949 all area service COD available Any Timedelhimodelshub1
 
Call Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any TimeCall Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any Timedelhimodelshub1
 
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...High Profile Call Girls Chandigarh Aarushi
 
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...scanFOAM
 
Call Girls Hyderabad Kirti 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Kirti 9907093804 Independent Escort Service HyderabadCall Girls Hyderabad Kirti 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Kirti 9907093804 Independent Escort Service Hyderabaddelhimodelshub1
 

Último (20)

Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service GuwahatiCall Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
Call Girl Guwahati Aashi 👉 7001305949 👈 🔝 Independent Escort Service Guwahati
 
Call Girls in Lucknow Esha 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
Call Girls in Lucknow Esha 🔝 8923113531  🔝 🎶 Independent Escort Service LucknowCall Girls in Lucknow Esha 🔝 8923113531  🔝 🎶 Independent Escort Service Lucknow
Call Girls in Lucknow Esha 🔝 8923113531 🔝 🎶 Independent Escort Service Lucknow
 
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near MeBook Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
Book Call Girls in Hosur - 7001305949 | 24x7 Service Available Near Me
 
Russian Call Girls Lucknow Khushi 🔝 7001305949 🔝 🎶 Independent Escort Service...
Russian Call Girls Lucknow Khushi 🔝 7001305949 🔝 🎶 Independent Escort Service...Russian Call Girls Lucknow Khushi 🔝 7001305949 🔝 🎶 Independent Escort Service...
Russian Call Girls Lucknow Khushi 🔝 7001305949 🔝 🎶 Independent Escort Service...
 
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service HyderabadCall Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Krisha 9907093804 Independent Escort Service Hyderabad
 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
 
EMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical CareEMS and Extrication: Coordinating Critical Care
EMS and Extrication: Coordinating Critical Care
 
Call Girls Kukatpally 7001305949 all area service COD available Any Time
Call Girls Kukatpally 7001305949 all area service COD available Any TimeCall Girls Kukatpally 7001305949 all area service COD available Any Time
Call Girls Kukatpally 7001305949 all area service COD available Any Time
 
Kukatpally Call Girls Services 9907093804 High Class Babes Here Call Now
Kukatpally Call Girls Services 9907093804 High Class Babes Here Call NowKukatpally Call Girls Services 9907093804 High Class Babes Here Call Now
Kukatpally Call Girls Services 9907093804 High Class Babes Here Call Now
 
Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...
Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...
Russian Call Girls in Hyderabad Ishita 9907093804 Independent Escort Service ...
 
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
Call Girl Chandigarh Mallika ❤️🍑 9907093804 👄🫦 Independent Escort Service Cha...
 
Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...
Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...
Housewife Call Girls Nandini Layout - Phone No 7001305949 For Ultimate Sexual...
 
Basics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptxBasics of Anatomy- Language of Anatomy.pptx
Basics of Anatomy- Language of Anatomy.pptx
 
Hi,Fi Call Girl In Whitefield - [ Cash on Delivery ] Contact 7001305949 Escor...
Hi,Fi Call Girl In Whitefield - [ Cash on Delivery ] Contact 7001305949 Escor...Hi,Fi Call Girl In Whitefield - [ Cash on Delivery ] Contact 7001305949 Escor...
Hi,Fi Call Girl In Whitefield - [ Cash on Delivery ] Contact 7001305949 Escor...
 
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call GirlsBook Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
Book Call Girls in Noida Pick Up Drop With Cash Payment 9711199171 Call Girls
 
Call Girls Uppal 7001305949 all area service COD available Any Time
Call Girls Uppal 7001305949 all area service COD available Any TimeCall Girls Uppal 7001305949 all area service COD available Any Time
Call Girls Uppal 7001305949 all area service COD available Any Time
 
Call Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any TimeCall Girls Secunderabad 7001305949 all area service COD available Any Time
Call Girls Secunderabad 7001305949 all area service COD available Any Time
 
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
Call Girls Service Chandigarh Grishma ❤️🍑 9907093804 👄🫦 Independent Escort Se...
 
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
Experience learning - lessons from 25 years of ATACC - Mark Forrest and Halde...
 
Call Girls Hyderabad Kirti 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Kirti 9907093804 Independent Escort Service HyderabadCall Girls Hyderabad Kirti 9907093804 Independent Escort Service Hyderabad
Call Girls Hyderabad Kirti 9907093804 Independent Escort Service Hyderabad
 

Addressing the Data Security Risks of Cloud-Based Software - HBMA Presentation

  • 1. webinar Addressing the Data Security Risks of Cloud-Based Software Tim Nabhani & Jesse Salmon October 10, 2019
  • 2. kareo.com Agenda 2 Agenda 2 • Welcome & Introductions • Data Security Overview • On-Premise Data Security Best Practices • Cloud Data Security Measures • General Data Security Best Practices • Conclusion
  • 3. kareo.com 33 Speakers Tim Nabhani is an Information Security Architect at Kareo. He is responsible for developing solutions to meet Kareo's strategic security initiatives. He has earned his Masters in Computer Science from Cal State Long Beach, along with various Information Security certifications such as CISSP and GPEN, and has over a decade's worth of experience in building and securing technology solutions. Tim Nabhani Jesse Salmon Jesse Salmon leads Kareo’s Information Security Team which maintains technical safeguards to protect patient data. He got his start in Information Security while attached to the 1st Marine Expeditionary Force serving as an information assurance team lead. While deployed, Jesse learned the importance of measuring and incremental improvement of security controls. Taking these skills to the private sector, Jesse consulted for Fortune 500 companies providing services around Identity and Access Management, PCI compliance and threat detection.
  • 5. kareo.com 55 Why is Security Important? Bad Guys want to steal your data • For Profit • Fullz • State Actors • Corporate Espionage • Hacktivists Legal Requirements • HIPAA / HITECH
  • 6. kareo.com 66 Where to Store your Data? Storing your data in the cloud vs. storing your data on a company server - How does it work? - How is data securely stored?
  • 7. kareo.com 77 The Myths 1. “My data is stored in the cloud so I don’t need to back it up.” 2. “Because my data is stored in the cloud, it is being used securely.” 3. “The free software I’m using is truly free.” 4. “The cloud is new technology and can’t be trusted.” 5. “My on-premise servers are more secure than the cloud.”
  • 8. On-Premise Data Security Best Practices
  • 9. kareo.com 99 How Are You Protecting Your Servers? Prevention Detection Response
  • 10. kareo.com 1010 Protecting Your Servers by Prevention Security measures must be taken to protect information from unauthorized modification, destruction, or disclosure whether accidental or intentional. Secure Your Network • Hide and protect your WiFi Protect the Perimeter • Enable firewall protection at work Invest in Tools • AntiVirus Update • Install latest patches
  • 11. kareo.com 1111 Protecting Your Servers though Detection The most important element is timely detection and notification of an attack Physical Security • Lock all filing cabinets and checking if still locked • Closed circuit cameras Monitoring and Logging • Log all events in case of an investigation • Deploy sensors throughout your network • Commonly found in endpoint security software
  • 12. kareo.com 1212 Protecting Your Servers with your Response Making important decisions or developing policy while under attack is a recipe for disaster. This process is extremely important due to the lessons learned. Test Your Security • Penetration testing • Virtual fire drills Disaster Recovery • Planning • Testing • Updating
  • 14. kareo.com 1414 HIPAA Requirements BAA (Business Associate Agreement) between you and your software provider clarifies responsibilities in the event of a data breach • Unless otherwise stated, the provider (you) is fully responsible for the protection/safety of all patient information
  • 15. kareo.com 1515 Data Encryption Encryption at Rest and in Transit Key Management
  • 16. kareo.com 1616 Disaster Recovery Multiple Data Centers • To recover in case of loss Damage Control • Sprinklers Testing • Recovery time
  • 17. kareo.com 1717 Questions to Ask Certifications? HITRUST • Highest healthcare security standard possible • Provides evidence that security systems are audited by independent 3rd party Reports? SOC2 Type 2 Report • Rigorous proof and test of existing controls
  • 18. General Best Practices for Data Security
  • 19. kareo.com 1919 Training Your Staff Think Before You Click • If you’re not expecting it, don’t click it • No pop-ups or unknown emails/links Multiple Strong Keys • Use strong password and update it regularly • Use a second factor to authenticate
  • 20. kareo.com 2020 Free is not Free Free Browser Plugins are Dangerous • Read your cookies • See the URLs you access • Access files on your computer • See your web requests Free Software is NOT Free • You’re probably paying with data instead of money • Giving others access to data puts you and your patients at risk Advertisements can carry viruses • New type of malware carried through ads called Malvertizing
  • 22. kareo.com 2222 Connect with Kareo Kareo @GoKareo GoKareo 3353 Michelson Drive, Suite 400 Irvine, CA 92612 (866) 231-2871 billing.companies@kareo.com