- Being aware of what information is stored on your devices and who has access to it.
- Deleting any unnecessary personal information from your devices.
- Encrypting sensitive information that is kept on your devices or sent via email, over a wireless network, or through the internet.
- Using encryption when remote access is used on your device (e.g., if a company troubleshoots your software remotely).
- Overwriting the data so unauthorized individuals won't be able to access the information.
|
Encryption can also protect against hackers and ransomware, which take over your files through suspicious downloads, links, attachments, or websites.
Do you have cybersecurity questions you need answered? Take this one-question survey to let us know what information you’d like us to cover!
Have questions? For additional assistance, contact the Agent/Broker Email Help Desk at FFMProducer-AssisterHelpDesk@cms.hhs.gov.
|