Hackers Informed
Feel free to contact us for any questions, comments, or concerns that you may have.
A hacker is someone who uses various electronic devices such as computers, laptops, tablets, phones, etc. to gain unauthorized access to data through various means.
Various Methods of Hacking:
- Phishing (Easy and very popular method. Details on page)
- Social Engineering (Details on page)
- Spoofing
- Brute Force
- Scripting/Software
- Key Logger
- Website scripts and the list goes on
Dictionary Definition:
“The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.”
Phishing is a method of hackers sending email through various means where they will use someone’s else email address to send out emails with links and/or executable attachments to gain access.
The best example is back in the old days where “chain mails” is the term where an email sent to a user from someone they know saying something like:
“If you don’t pass this email to a 100 person, you will have bad luck for the rest of your life.”
Best practice but not 100% full-proof is not to open links/attachments. Any attachments that has a file with the extension such as *.bat, *.exe, etc. is best recommended not to open. Google has made tremendous effort and progress in regards to such files and preventing them to send out.
Please Contact The Business Office if you have issues, questions, concerns, and/or encountered a situation which requires attention. Also, please let us know if such a situation arises so we can provide you with necessary instructions on actions to take as well as taking the necessary steps to prevent further damages.
Kaspersky’s Definition:
“Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. In cybercrime, these “human hacking” scams tend to lure unsuspecting users into exposing data, spreading malware infections, or giving access to restricted systems. Attacks can happen online, in-person, and via other interactions.” *1
Social engineering requires the hacker to actively participate. Examples: Wearing a uniform of a certain company to gain entry to a business to acquire the necessary info to gain unauthorized access.
Please be aware of this as this is also very important and critical as it also breaks Hipaa’s policies if they pass by the front desk to gain access to the treatment area.
Many hackers/scammers also used this method to gather the information they need. They can post an ad for a job, find someone on some chat sites, etc. When they start inquiring for sensitive information such as your Social Security Number, Address, Phone number, etc. over the phone, chat, and/or email then be cautious and very wary of such people.
Companies should/will not ask such info remotely and usually do it in person at their place of business.
Many businesses, including the government, will not make calls to inquire for such sensitive information. They will usually mail you notices or letters requiring and providing information on what is needed. Please be aware.
Source: *1 Kaspersky
Thanks to PMC Definition:
“Confidentiality in the medical setting refers to “the principle of keeping secure and secret from others, information given by or about an individual in the course of a professional relationship,” and it is the right of every patient, even after death.” *2
At PTHC, we provide training, enforce, and reiterate this as a part of our company’s culture.
We do not give out any patient’s information without their consent.
To have a copy of your medical record or any data regarding the patient, all staff will have to follow procedures and the person requesting the information will have to verify their identity as well.
PTHC also abides by HIPAA regulations in regards to protecting patient data and shreds any documents pertaining to the patient if not longer in used.
Please be assured with a peace of mind as we strive to protect your data regardless if it’s in hard copy or in the clouds storage.
Data is not the only thing that we work on Confidentiality. Any patients needing a private room or meeting with our physical therapists for treatment or to discuss about their situations are safe guarded between the physical therapist and themselves.
Feel free and be at ease and make a request at the clinics you go to for your treatments if you feel you need privacy and do not want to be in the open or have your information out in the open. We have many clinics with private rooms to accommodate your requests.
We take confidentiality seriously as it is the trust between PTHC and you is our utmost priority.
If you have a situation, questions, and/or concerns, feel free to contact us.
Source: *2 PMC