Health eServices is composed of industry-based health information technology practitioners and noted academic researchers. We are highly experienced in health IT, data exchange standards, compliance assessment, and testing.

We seek to help entities resolve challenging technologies, policies, and regulatory issues involved with effective sharing of client health information. We seek to provide comprehensive guidance on data standards, regulatory requirements, and sustainable technology practices.

Recent Health IT Articles Posted By Health eServices
NYTimes Explains How to Protect Yourself from Ransomware Attacks
Nathan E Botts

NYTimes Explains How to Protect Yourself from Ransomware Attacks

Personal Health Data Security

An abstract from the NY Times article: "Security experts believe WannaCry may have initially infected machines via email attachments. The lesson: Avoid clicking links inside dubious emails, Mr. Kamden said.

How do you spot a fishy email? Look carefully at the email address of the sender to see if it is coming from a legitimate address. Also, look for obvious typos and grammatical errors in the body. Hover over hyperlinks (without clicking on them) inside emails to see whether they direct you to suspicious web pages. If an email appears to have come from your bank, credit card company or internet service provider, keep in mind that they will never ask for sensitive information like your password or social security number."

Use the link below to access the full article.

Previous Article Everything you need to know about the WannaCry / Wcry / WannaCrypt ransomware
Next Article How to Protect Your Privacy as More Apps Harvest Your Data
7392 Rate this article:
No rating
Please login or register to post comments.

Theme picker

Google Ads
Google Ads