Vendors are the greatest source of breaches. Software, firmware, hardware, cloud services are on the table.
Total usage policies of the office. Review education and details for security and HIPAA staff testing. Auditing and skills refresh. New software and hardware practice integration.
Domain services, local servers and phone service. Cloud services exist in unexpected places. How to add new services safely.
Document and understand the physical layout and design the processes to secure the office.
Design a secure network, modify existing physical networks and network configuration. Monitor network activity and maintenance.
Personal devices in the facility. Allowed devices, policies on BYODs.
Computer system setup, roles, software, passwords and MFA.
Understanding how it works. Level of prevention security. Simulation of ransomware lockup.