A suspicious e-mail was received at Greenway Medical Center and included an attachment. Three of the staff members opened the attachment. Within an hour, there were problems with the computer system throughout the office - response time was very slow, there were screens that appeared to be scrambled, and a dialogue (pop-up) box appeared in the middle of the screen that would not close. The office contracts out their information technology (IT) maintenance. After reviewing the situation, the IT consultant informed the office manager that the system was infected by a computer virus because the system was unprotected from outside access. How could the office have avoided such a situation?

What will be an ideal response?

Installing a firewall would have prevented this attack.

Health Professions

You might also like to view...

You are interviewing a patient you suspect to be suffering from acute coronary syndrome. Which of the following questions is most appropriate?

A) "Are you having any pain in your chest?" B) "Are you having any chest discomfort or pain?" C) "Does it hurt when I press on your chest?" D) "Does your chest hurt when you breathe?"

Health Professions

The overall conversion process to ICD-10 coding is a ___-year process

a. three b. two c. one d. five

Health Professions