Back to Top Skip to main content

Cybersecurity Awareness

You can store and track your personal health and fitness information in many ways:

  • Fitness tracking wearables
  • Mobile devices and Apps
  • Online web services, such as Personal Health Records (PHRs)

This makes it easier for you to be in charge of your health information. But, this technology may increase the possibility your health information is stolen. 

Cyberfit spotlight image

Protecting Military Health System (MHS) patient health information is everyone’s responsibility, from the Chief Medical Information Officer to the medical provider, and of equal importance, to you and each of your family members—the patients. Our goal is to empower you and your family to protect health care information under your control and lower the risk of cyber crimes.

To Learn More...

Go to www.tricare.mil/Cyberfit or, download any of the following materials:

Product Title
Fact Sheets Empower Yourself to Protect Your Information
Cyberfit Family
Cyberfit Family Medical Devices
Posters Work with Kids
Military Family Readiness
Guard Your Cell Phone
Baby Monitor
Navy Family
AirForce Family
Think Twice
Avoid Sharing Your Info
Health-Related Chat Rooms
Disable Bluetooth or WiFi
Fitness Wearables and Apps
Maintain Physical Control of Your Devices
Virus and Malware Protection
Keep Health Information on Track
Use the Internet Wisely
5-Day Cyberfit Plan Day 1: Password Protect Your Devices
Day 2: Clean Out Your Mobile Apps
Day 3: Protect Your Stored Information
Day 4: Share Your Information Wisely
Day 5: Beware of Health Information Fraud
Infographics Myth vs. Fact #1
Myth vs. Fact #2
Myth vs. Fact #3
Myth vs. Fact #4
Recipe Cards Creating a Cyberfit Device
Creating the Perfect Password
Creating a Secure Medical Device

You also may be interested in...

Army medical device cyber team balances benefits and risks of technology

Article
11/8/2018
An Army medic positions a patient for a CT scan, which helps radiologists diagnose different types of disease and injuries. Medical devices, such as radiology imaging systems, must now go through a cybersecurity validation process in order to connect to military networks (U.S. Army photo by Staff Sgt. Evelyn Chavez)

The frequency and severity of cybersecurity attacks against the medical community will continue to rise

Recommended Content:

Technology

CyberFit 2018

Photo
10/30/2018
By making cyber fitness a part of daily routines, families can protect their online information and personal well-being.

By making cyber fitness a part of daily routines, families can protect their online information and personal well-being.

Cyberfit family: Making cybersecurity understandable for all ages

Article
10/30/2018
By making cyber fitness a part of daily routines, families can protect their online information and personal well-being.

Protecting the homefront against cybersecurity issues

Recommended Content:

Technology

Creating a Secure Medical Device

Infographic
4/17/2017
This cyberfit recipe for success encourages you to take steps to make sure you're medical devices are kept secure to avoid possible side effects: health care fraud, identity theft or interference with the functionality of your device.

Follow this cyberfit recipe for success for creating a secure medical device.

Personal responsibility is key to cybersecurity

Article
2/23/2017
Servio Medina, one of the Defense Health Agency’s Health Information Technology leaders on cybersecurity, implores his audience to practice positive cyber hygiene. (MHS photo)

Leader in cybersecurity discusses the risks of human error in cybersecurity at HIMSS

Recommended Content:

Technology

Track your weight loss

Article
1/18/2017
Mobile apps and programs are becoming simpler and more intuitive to help monitor your healthy eating. Some programs are interactive as well. They also provide nutrition information for more than 45,000 food items, including brand name and restaurant foods. Entering foods and calculating their calories takes only a fraction of the time when compared to a “paper” food diary. (MHS graphic)

The first step to losing weight and gaining better health is using self-monitoring techniques to track your calories

Recommended Content:

Nutrition | Physical Activity | Human Performance Resource Center

Cyberfit Myth vs. Fact 4

Infographic
11/28/2016
cyberfit Myth vs. Fact #3

Public WiFi is not secure.

Cyberfit Recipe for Success 2

Infographic
10/11/2016
Recipe for creating the perfect password

Creating the Perfect Password

Cyberfit Recipe for Success 1

Infographic
10/11/2016
Creating a Cyberfit Device Recipe Card

Creating a Cyberfit Device

Cyberfit Myth vs. Fact 1

Infographic
10/7/2016
cyberfit infographic

Consider using an alias if you interact in a health-related chat room.

Cyberfit Myth vs. Fact 2

Infographic
10/7/2016
Cyberfit Myth vs. Fact 2

Take time to learn about your fitness wearables and apps.

5-Day Cyberfit Plan: Day 3

Infographic
10/4/2016
5-Day Cyberfit Plan, Day 3

Protect Your Stored Information

5-Day Cyberfit Plan: Day 1

Infographic
10/4/2016
5-Day Cyberfit Plan, Day 1

Password Protect Your Devices

5-Day Cyberfit Plan: Day 4

Infographic
10/4/2016
5-Day Cyberfit Plan, Day 4

Share Your Information Wisely

5-Day Cyberfit Plan: Day 2

Infographic
10/4/2016
5-Day Cyberfit Plan, Day 2

Clean Out Your Mobile Apps

<< < 1 2 > >> 
Showing results 1 - 15 Page 1 of 2

DHA Address: 7700 Arlington Boulevard | Suite 5101 | Falls Church, VA | 22042-5101

Some documents are presented in Portable Document Format (PDF). A PDF reader is required for viewing: Download a PDF Reader or learn more about PDFs.