Facebook Fallout Becoming a Social Media Menace

Many healthcare professionals have unwittingly placed their facilities at risk for ransomware attacks.

Many of us watched Mark Zuckerberg testify before Congress last week, in the wake of the news that Facebook had released the data of 87 million users to a company named Cambridge Analytica, which in turn sold the data to political campaigns. 

Let’s briefly talk about what happened at Facebook. A researcher named Aleksandr Kogan developed a Facebook application, or “app.” It was one of those “take a quiz” apps, on the surface. Unfortunately, if you took the quiz, your Facebook information was sent to the app creator. No big foul yet. 

Now, this was a special app. It then pulled the information of all your friends and contacts on Facebook, without their permission. Here is how we get to 87 million users. The app then went on to gather data of the contacts of your contacts – the way a virus spreads.   

Facebook and government bodies are still figuring out how much information was gathered. Cambridge Analytica has confirmed it also harvested some private messages. Facebook told them to delete the data once they found out what happened. The folks at Cambridge Analytica said they did, then continued selling the data to political campaigns. 

Mr. Kogan, who began working for Cambridge Analytica after creating the app, insists that the app was modified to collect only user names, birth dates, and pages users liked. We only have the assurances of Mr. Kogan and Cambridge Analytica on what data they have, and we already know they have been less than forthcoming.

Why is this such a big concern for healthcare? If I know enough about you, I can breach your system accounts. If I know where you work, I can find out what systems are used by your healthcare company. I can get your company email address. If I just know where you work and your name, I can use it to send emails with hacking tools to you and your coworkers that look like they are coming from you. 

Let’s assume that we trust Cambridge Analytica, and someone knows your name, birth date, and the Facebook pages you liked. Lots of people like their employers’ Facebook pages. Now I have your name, employer’s name, and your birth date. I can Google your company domain by Googling your company.  Knowing your name and company domain, I can figure out your email address. 

With just this much, I can start sending emails to you and your fellow employees. I can include special programs that allow me to take over computers in your company to access information – or maybe just lock the computers and demand payments to unlock them. If I can get control of your computer, maybe I can also log in to software with patient information that I can sell to identity thieves. 

What can be done? First, a dose of reality: social media is here to stay. Platforms like Facebook are free to users, and Facebook makes huge profits from advertisements. Facebook users are the product. Facebook can’t allow users to block themselves off completely from advertisers – or potential hackers that want to use social media to break into systems. 

Here are some common-sense things that can be done, keeping all this in mind.

First, you can start by being wary of emails that seem odd, like Dunn & Bradstreet suddenly needing a response to an impending issue when you never deal with this kind of information. Without opening such emails, notify your IT department. If you open an email that seems odd, immediately call IT. 

Next, be careful what you share about your company on social media. You may think you know the members of a group of fellow employees on Facebook. You may not know them as well as you think. Consider staying away from these groups, or clearing memberships with your IT department.  Review your company’s social media rules and comply with them.

Follow Mark Zuckerberg’s advice and review the privacy agreements and settings for your social media applications. If you are not comfortable with the privacy rules of a social media company, maybe you don’t need to use their apps. If you are comfortable, ask yourself: what privacy settings do you want to use for your account?

Never use personal information to make up company passwords. Change your passwords regularly, even if it is not required by your IT department.  Consider adopting the same rules for your passwords for personal use. 

When you walk away from your computer, lock it. You should also change your computer settings on your company computer to lock it after a period of inactivity. Even if someone can get access to your computer, they may not be able to unlock it without your computer login password. 

All of these rules are like buying an alarm for your house or a getting a guard dog. You can’t guarantee you will stop any thief, but you can get them to pick the easier house down the block.


Comment on this article

Print Friendly, PDF & Email

Timothy Powell, CPA, CHCP

Timothy Powell is a nationally recognized expert on regulatory matters, including the False Claims Act, Zone Program Integrity Contractor (ZPIC) audits, and U.S. Department of Health and Human Services (HHS) Office of Inspector General (OIG) compliance. He is a member of the RACmonitor editorial board and a national correspondent for Monitor Mondays.

Related Stories

Leave a Reply

Please log in to your account to comment on this article.

Featured Webcasts

Mastering the Two-Midnight Rule: Keys to Navigating Short-Stay Admissions with Confidence

Mastering the Two-Midnight Rule: Keys to Navigating Short-Stay Admissions with Confidence

The CMS Two-Midnight Rule and short-stay audits are here to stay, impacting inpatient and outpatient admissions, ASC procedures, and Medicare Parts C & D. New for 2024, the Two-Midnight Rule applies to Medicare Advantage patients, requiring differentiation between Medicare plans affecting Case Managers, Utilization Review, and operational processes and knowledge of a vital distinction between these patients that influences post-discharge medical reviews and compliance risk. Join Michael G. Calahan for a comprehensive webcast covering federal laws for all admission processes. Gain the knowledge needed to navigate audits effectively and optimize patient access points, personnel, and compliance strategies. Learn Two-Midnight Rule essentials, Medicare Advantage implications, and compliance best practices. Discover operational insights for short-stay admissions, outpatient observation, and the ever-changing Inpatient-Only Listing.

Print Friendly, PDF & Email
September 19, 2023
Secondary Diagnosis Coding: A Deep Dive into Guidelines and Best Practices

Secondary Diagnosis Coding: A Deep Dive into Guidelines and Best Practices

Explore comprehensive guidelines and best practices for secondary diagnosis coding in our illuminating webcast. Delve into the intricacies of accurately assigning secondary diagnosis codes to ensure precise medical documentation. Learn how to navigate complex scenarios and adhere to coding regulations while enhancing coding proficiency. Our expert-led webcast covers essential insights, including documentation requirements, sequencing strategies, and industry updates. Elevate your coding skills and stay current with the latest coding advancements so you can determine the correct DRG assignment to optimize reimbursement, support medical decision-making, and maintain compliance.

Print Friendly, PDF & Email
September 20, 2023
Principal Diagnosis Coding: Mastering Selection and Sequencing

Principal Diagnosis Coding: Mastering Selection and Sequencing

Enhance your inpatient coding precision and revenue with Principal Diagnosis Coding: Mastering Selection and Sequencing. Join our expert-led webcast to conquer the challenges of principal diagnosis selection and sequencing. We’ll decode the intricacies of ICD-10-CM guidelines, equipping you with a clear grasp of the rules and the official UHDDS principal diagnosis definition. Uncover the crucial role of coding conventions, master the sequencing of related conditions, and confidently tackle cases with equally valid principal diagnoses.

Print Friendly, PDF & Email
September 14, 2023
2024 IPPS Summit: Final Rule Update with Expert Insights and Analysis

2024 IPPS Summit: Final Rule Update with Expert Insights and Analysis

Only ICD10monitor delivers what you need: updates on must-know changes associated with the FY24 Inpatient Prospective Payment System (IPPS) Final Rule, including new ICD-10-CM/PCS codes, plus insights, analysis and answers to questions from the country’s most respected subject matter experts.

Print Friendly, PDF & Email
2024 IPPS Summit Day 3: MS-DRG Shifts and NTAPs

2024 IPPS Summit Day 3: MS-DRG Shifts and NTAPs

This third session in our 2024 IPPS Summit will feature a review of FY24 changes to the MS-DRG methodology and new technology add-on payments (NTAPs), presented by senior healthcare consultant Laurie Johnson, with bonus insights and analysis from two acclaimed subject matter experts

Print Friendly, PDF & Email
August 17, 2023

Trending News