MyDentalPractice Guides
ClinicSecurity

Security best practices

A short checklist of the highest-leverage security actions for your clinic.

Overview

Most security incidents stem from a few preventable habits. This article is your short list — do these and you've done 90% of what matters.

Prerequisites

  • Owner or Admin role
  • Willingness to be slightly inconvenienced for much-better security

Steps

Enforce 2FA for all clinic users. Settings → Security → 2FA enforcement: Required. Single biggest reduction in account takeover risk.

Use passkeys where supported. Phishing-resistant. Faster than typing passwords. See Passkeys.

Set short session timeout for shared computers. Front-desk computers typically log multiple staff in throughout a day. Set 15-min idle timeout to avoid leaving sessions open.

Review staff list quarterly. Settings → Staff — disable users who've left. Active accounts for departed staff are a real risk.

Review audit log alerts weekly. Spend 10 minutes scanning Settings → Security → Audit Log for anomalies. Set up automated alerts for the routine ones.

Train staff on phishing. Common attack: email impersonating support asking for password reset. Teach staff: support never asks for passwords. Real reset flows always use the Forgot password link.

Don't reuse passwords across systems. A breach elsewhere shouldn't grant access here. Encourage password managers.

Use strong sender-domain authentication. SPF, DKIM, DMARC for your sending domain. Stops scammers spoofing you to your patients.

Lock the registration code. If using public enrolment, regenerate the code after a campaign so old QR codes can't enrol stale prospects.

Have a written incident response plan. Even one page. Who calls whom, what to disable, how to communicate with patients.

Expected outcome

  • Account takeover risk dramatically reduced
  • Anomalous access surfaces quickly via alerts
  • Departing staff don't retain access
  • Phishing failures stop being staff-error catastrophes

Troubleshooting

SymptomLikely causeFix
Staff resist 2FAFriction concernShow a phishing case study; the inconvenience is small
Passkey adoption lowDevices varyStart with Owner/Admin to lead by example
Audit log alerts overwhelmingThresholds too lowTune; most clinics need 5-10 actionable alerts/month
Phishing email reached patientsLacking SPF/DKIMConfigure in Settings → Communications → Email
Departed staff still have accessDisable not doneAdd to offboarding checklist

On this page