BlogPosts

Category:
Correctly Respond to a Cyber Attack
As technological advancements increase daily, our dependence on technology continues to positively correlate with this trend. Practices implement technology to streamline administrative tasks, gather patient data, organize and store patient health records, manage finances, and other tasks to...  Read More
Cyber Security: The Unknown Risk
Stuart J. Oberman, Esq. of Oberman Law Firm discusses Cyber Security, "the unknown risk." Learn how to protect yourself from damaging data breaches that could jeopardize patient information.Cyber Security - The Unknown Risk  Read More
Protect Yourself From Phishing Scams
Within the past few years, phishing emails have become increasingly difficult to detect. However, recognizing similar characteristics in phishing scams helps avoid becoming the victim. If you answer 'yes' to any of the questions below, you may be looking at a potential phishing scam.1. Does the...  Read More
Types of Phishing Scams
Phishing scams typically fall into one of these 5 categories:1. Deceptive PhishingDeceptive phishing occurs when scammers impersonate credible companies in order to steal personal information and login credentials. These emails typically create a sense of urgency for victims to rectify a problem...  Read More
Cybercrime: Safety Checklist
Safety Begins At HomeOrganizations and institutions constantly adapt to the latest cybercrime techniques. However, the first line of defense starts at home because identity thieves specialize in hacking personal computers.   1. Watch for Phishing: One of the most common techniques, known as...  Read More
How to Correctly Respond to a Cyber Attack
As technological advancements increase daily, our dependence on technology continues to positively correlate with this trend. Practices implement technology to streamline administrative tasks, gather patient data, organize and store patient health records, manage finances, and other tasks to...  Read More
What to Consider When Performing a Cyber Security Assessment
A cyber security assessment of your dental practice is much more than a review of your practice software. It's vital to analyze both technical and non-technical components of your practice on each of the three pillars of cyber security: people, policies, and technology. Here are some important...  Read More
Ransomware - Catastrophic Cyber Security Breaches
Dental offices are now being hit with Ransomware (cyber blackmail). If you own or work in a dental practice, you need to know what Ransomware is, and the ramificationsof this serious security breach.Ransomware Trojans are a type of cyberware that is designed to extort money from a dental office....  Read More
The Savvy Dentist #28: How Secure Are Your IT Systems from Cyber Attack, with James Borg
The Savvy Dentist PodcastWhere Great Dentistry Meets Great BusinessCreate a dental practice and a business life you love with Dr Jesse Green as he interviews successful dentists, entrepreneurs, and athletes. Listen in as guests share their stories, ideas and business techniques that you can take...  Read More
Cyber Breaches in Dental Practices - The New Frontier
Cyber security in a dental practice is becoming more and more complicated. In fact, most practices have little or no cyber security measures. Recently, the database of a dental practice in California was hacked into, and the hacker demanded a ransom in the amount of $3,000.00.Hackers like to target...  Read More

Total Blog Activity

742
Total Bloggers
8,277
Total Blog Posts
2,800
Total Podcasts
1,248
Total Videos

Sponsors

Townie Perks

Townie® Poll

Do you plan to retire by 2028?
  

Site Help

Sally Gross, Member Services
Phone: +1-480-445-9710
Email: sally@farranmedia.com

Follow Dentaltown

Mobile App

WITH DENTALTOWN . . . NO DENTIST WILL EVER HAVE TO PRACTICE SOLO AGAIN®

WWW.DENTALTOWN.COM - WHERE THE DENTAL COMMUNITY LIVES®

9633 S. 48th Street Suite 200 • Phoenix, AZ 85044 · Phone: +1-480-598-0001 · Fax: +1-480-598-3450
©1999-2019 Dentaltown, L.L.C., a division of Farran Media, L.L.C. · All Rights Reserved