Edward Kopp – PCIP / Phoenix Dental IT
Phoenix Dental I.T. was very pleased with the turn-out at the WRDC 2017! It was a joy meeting so many fine Dental Industry Professionals. We are certainly looking forward to attending next year’s conference in Glendale!
One of Phoenix Dental IT’s key goals at the convention was to show the ability of a Citrix Solution to render images not only on a practice’s efficiently no only and a local network but even when remotely connected. In order to accomplish this we remotely connected (using a 4G Cellphone Hotspot!) to a Carestream™ Server and displayed X-Rays and 3D Volumes for visitors to the booth. This illustrated the clear image display as well as the ability to manipulate and rotate 3D Images efficiently, even on a slower remote connection when your network is properly configured and installed.
We set up this demo in a “real-world” manner. This included using a low-cost ASUS All-In-One thin client and we deployed the Two-Factor Authentication (2FA) process required by both HIPAA and PCI-SSC.
A surprising outcome was the number of visitors to our booth that asked “why are you looking at your cell-phone?” when we were connecting to the Demo. We explained that we were getting the “second factor” required for 2-Factor Authentication.
Two-Factor Authentication is a simple concept. It is something that you can and should do right away (in both the practice’s procedures and for any sensitive connectivity you do in your personal life such as online banking.) The Basics: In order to remotely log in you need to provide 2 of 3 things.
Something You Know – This would be your User Name and Password
Something You Have – This can be a USB “KEY” or a randomly generated code (most common) that is provided when you remotely connect to the network. The easiest way to do this is to set up an application on your phone to receive SMS Messages or otherwise provide a randomly generated one-time code such as Google Authenticator TM.
Something You Are – This involves biometrics such as fingerprints, retinal scans, etc. Certainly more involved.
“Am I using Two Factor Authentication Now?” – If you are able to remotely connect to your network with just a username and password, you are NOT using 2FA.
If you are required to provide a second item to remotely connect beyond your username & password, such as a text message received on your phone or perhaps you are required to connect a USB Key to the computer you are using, then you may currently be using 2FA.
“How hard is it to install 2FA?” – Not as hard as you might think. Depending on you network’s configuration you may be able to make the necessary changes with the equipment and software that you currently have with the minor addition of a service such as Google Authenticator TM / SMS Passcode TM.
Popular remote access applications such as LogMeIn TM and GoToMyPC TM now provide the option to activate 2FA. YOU must make sure 2FA is activated for every remote user’s account! (These programs provide a second layer of verification by sending a random code to the user’s cell phone via text-message or phone call.)
“If the random code is sent to the same device I use to connect, is that 2FA?” – There is no benefit to this type of setup. If a malicious individual has gained access to your laptop and is able to receive the 2nd Factor for remote connection, it defeats the purpose. This would not meet the requirements of 2FA.
“Will every user at the practice need to enter a random passcode?” – 2FA is a requirement for remotely connecting to your network and is not required when you are physically at the practice and connected to the network. Adding 2FA features does not impact the way your on-site users login.
The time to add 2FA is now! Not using 2FA puts your network and patient data at risk.
Protect you practice’s Operational Remote Access Link Health!