A Frank Conversation About Cybersecurity: What You Need to Know About Securing Your Data and Protecting Your Practice Deadline for Response: December 15, 2021 First Name, Last Name & Degree Email Address Practice Name 1) A strong security system will always be able to prevent even the most determined attackers from getting in.TrueFalse 2) If you have a strong information technology (IT) team with security professionals, then you should not have to involve yourself in the regular, ongoing activities associated with your computer networks.TrueFalse 3) If your IT staff or contracted outside IT support service scans your networks looking for unprotected PHI/PII and finds nothing, you should feel confident that your data is secure.TrueFalse 4) The most important step in securing any network is a robust patching routine.TrueFalse 5) The key components of internal systems needed to make your system as secure as possible include network hardening firewalls, virus scanning and internal logging systems.TrueFalse Evaluation completed by:PhysicianNon-Physician E1. The content of the article was:ExcellentGoodFairPoor E2. The author's writing style was:ExcellentGoodFairPoor E3. The graphics included in the article were:ExcellentGoodFairPoor E4. The stated objectives of this program were:ExceededMetNot Met Was this article free of commercial bias?YesNo If not, why not? Please share your name and contact information so that we may investigate further. E5. Will the knowledge learned today affect your practice?Very MuchModeratelyMinimallyNone E6. Based on your participation in the CME activity, describe ways in which you will change the way you practice medicine. E7. Did this CME activity change what you know about describing the internal systems that should be in place to secure networks and computer systems?YesNo E8. Did this CME activity change what you know about understanding how to protect your electronic health records and personal health information?YesNo E9. Did this CME activity change what you know about discussing the questions to ask internal and external information technology staff to ensure necessary security measures are being taken?YesNo E10. Did this CME activity change what you know about listing the reports that should be received on a regular basis to document vulnerabilities in your network and steps taken to address them?YesNo E11. Based on your participation, what barriers to the implementation of the strategies or skills taught in this article have you identified? I attest that I have read the article “A Frank Conversation About Cybersecurity: What You Need to Know About Securing Your Data and Protecting Your Practice” and am claiming 1 AMA PRA Category 1 Credit.™ Please sign in below box. Please enter today's date: Please provide your complete business address: Suggested topics for future articles: Time is Up!