Safe Browsing Practices

Recognize unsafe websites, protect your login credentials online, and adopt browsing habits that keep the office network and patient data secure.

📘 Reading Lesson

Lesson Notes

Read through the key concepts before you try the challenge.

Real-World Scenario

You receive an email with a link to 'update your Outlook password.' The page that opens looks exactly like Microsoft's login page. Before you type your credentials, you notice the URL is 'microsoft-security-update.biz' — not microsoft.com. You close the tab, report the phishing attempt, and save the clinic from a potential credential theft. That split-second decision — checking the URL before entering a password — is the skill this lesson builds.

Recognizing Unsafe Websites

Not all websites are what they appear to be. Criminals create fake websites that look identical to real ones in order to steal login credentials, install malware, or collect sensitive information. Here is how to identify warning signs before it is too late:

  • Check the URL before entering any information — the domain name is the part just before the first single slash in the URL. 'https://cms.gov/billing-guide' has the domain 'cms.gov' — a real government site. 'https://cms-gov.billing-help.net/update' has the domain 'billing-help.net' — a completely different site with no connection to CMS. Attackers use domains that look similar to real ones: microsofft.com, cms-gov.net, paypaI.com (that is a capital 'I' not an 'l'). Always verify the exact domain before entering credentials.
  • HTTPS (the padlock icon in the address bar) means the connection is encrypted — not that the site is safe. Many phishing sites now use HTTPS to appear legitimate. A padlock means no one can intercept the data between you and the site — but it says nothing about whether the site itself is honest. Do not trust a site simply because it has a padlock.
  • Watch for urgent or threatening language — websites that say 'Your account has been compromised! Click here immediately to restore access' or 'Your computer is infected — call this number now' are almost always scams. Legitimate services do not demand immediate action through alarming popup messages. Close such pages without clicking anything and report them to IT.
  • Pop-up windows claiming you have a virus are always fake — no website can scan your computer for viruses through a browser. These pop-ups are designed to frighten you into calling a fake 'support' number or downloading malware disguised as security software. Close the browser tab (use Task Manager if the tab will not close) and report the site to IT.

Protecting Your Login Credentials Online

Your login credentials — username and password — are the keys to every system you access. Protecting them online is one of the highest-impact security habits you can develop:

  • Never enter a password on a page you reached by clicking a link in an email — instead, open a new browser tab and type the website address directly. This ensures you are on the real site, not a fake one designed to look like it. This single habit prevents the vast majority of credential phishing attacks.
  • Use a unique password for every work system — if you use the same password for your EHR login and your email, and one of those systems is breached, attackers immediately have access to both. Many healthcare data breaches are traced to credential reuse. Use a password manager (covered in Module 8) to manage unique passwords without memorizing all of them.
  • Log out of sensitive systems when you finish — especially on a shared workstation. Leaving the EHR, insurance portal, or email logged in while you go to lunch means anyone who sits at that workstation can access patient data. Most clinical systems have short auto-logout timers, but you should always log out manually when you leave a workstation unattended.

Downloads and Attachments

Downloading files from the internet or opening email attachments are the most common vectors for malware entering an office network. Here is how to handle downloads safely:

  • Only download files from sources you trust and have verified — the vendor's official website, an email from a known contact at a known organization, or a file shared through your organization's official system. If you are unsure about a download, ask IT before opening it.
  • Be suspicious of unexpected files — if you receive an unexpected email with an attachment (even from a known sender), call or text the sender to confirm they actually sent it before opening. Attackers can spoof email addresses and compromise email accounts to send malware to your contacts.
  • The file extension matters — .pdf and .docx files from trusted sources are usually safe to open. .exe, .bat, .vbs, .zip containing .exe, and .js files are higher risk and should only be opened if IT or your supervisor has specifically authorized them. A fake invoice in a .exe file is a common malware delivery method.

Responsible Use

In a medical office, your online behavior affects not just your own security but the security of every patient's records in the system. A single malware infection from an unsafe download can encrypt every file on the network drive, demanding a ransom to restore access. These ransomware attacks have shut down hospitals and medical practices for days, causing delayed care and significant financial loss. Safe browsing is not a personal preference — it is a professional obligation when you have access to protected health information.

AI Assist

💡 AI Task: Ask ChatGPT — 'Create a one-page Safe Browsing Quick Reference guide for medical office staff. It should cover: how to check if a website URL is legitimate, why HTTPS does not mean a site is safe, what to do if you see a virus warning popup, how to handle unexpected email attachments, and the login habit that prevents phishing. Keep each item to 2-3 sentences.' Review the guide and compare it to the content of this lesson.

Knowledge Check

You receive an email from 'billing@insurance-claims-cms.net' asking you to log in to update your account. The login page looks exactly like CMS's real site. What should you do?

Challenge

Apply what you've learned in this lesson.

Practice URL analysis and build a Safe Browsing Quick Reference for your workstation.

  1. Analyze the following five URLs and identify which are legitimate and which are suspicious. Write one sentence explaining your reasoning for each: (1) https://www.cms.gov/Medicare/Billing (2) https://cms-medicare-update.net/login (3) https://mybenefits.bcbs.com/provider/login (4) https://bcbs-provider-portal.com/update-credentials (5) https://oig.hhs.gov/fraud/consumer-alerts/
  2. Search for 'URL phishing checker' and use a reputable free tool (such as Google Safe Browsing or URLVoid) to check two of the suspicious URLs above. Screenshot the results.
  3. In a Word document, write a 5-point Safe Browsing Checklist for Lakeside Medical Associates front desk staff. Each point should be one actionable sentence.
  4. Save the checklist as 'LMA_SafeBrowsing_2025-05.docx' and export as PDF.