Back to Top Skip to main content
Alert Arrow ALERT!!

There are emergency procedures in place for parts of world due to weather.

Get the latest information on emergency prescription refills and PCM referral waivers. 

Cybersecurity Awareness

You can store and track your personal health and fitness information in many ways:

  • Fitness tracking wearables
  • Mobile devices and Apps
  • Online web services, such as Personal Health Records (PHRs)

This makes it easier for you to be in charge of your health information. But, this technology may increase the possibility your health information is stolen. 

Cyberfit spotlight image

Protecting Military Health System (MHS) patient health information is everyone’s responsibility, from the Chief Medical Information Officer to the medical provider, and of equal importance, to you—the patient. Our goal is to empower you to protect health care information under your control and lower the risk of cyber crimes.

To Learn More...

Go to or, download any of the following materials:

Product Title
Fact Sheets Empower Yourself to Protect Your Information
Medical Device Security for Patients
Medical Device Security for Providers
Posters Avoid Sharing Your Info
Health-Related Chat Rooms
Disable Bluetooth or WiFi
Fitness Wearables and Apps
Maintain Physical Control of Your Devices
Virus and Malware Protection
Keep Health Information on Track
Use the Internet Wisely
Only Connect Your Medical Devices to a Secure Network #1
Only Connect Your Medical Devices to a Secure Network #2
Only Connect Your Medical Devices to a Secure Network #3
Only Connect Your Medical Devices to a Secure Network #4
Follow Your Medical Device Instructions
5-Day Cyberfit Plan Day 1: Password Protect Your Devices
Day 2: Clean Out Your Mobile Apps
Day 3: Protect Your Stored Information
Day 4: Share Your Information Wisely
Day 5: Beware of Health Information Fraud
Infographics Myth vs. Fact #1
Myth vs. Fact #2
Myth vs. Fact #3
Myth vs. Fact #4
Are you using a medical device?
Cybersecurity Risks of Medical Devices
Recipe Cards Creating a Cyberfit Device
Creating the Perfect Password
Creating a Secure Medical Device

You also may be interested in...

Are you using a medical device?

If you're using medical devices such as blood pressure cuffs, blood glucose monitors or CPAP machines, talk to your doctor about how to operate the devices securely to avoid health care fraud, medical identity theft or interference/hacking of your device.

If you're using medical devices, make sure you know how to operate them securely to avoid potential health care fraud or identity theft.

Creating a Secure Medical Device

This cyberfit recipe for success encourages you to take steps to make sure you're medical devices are kept secure to avoid possible side effects: health care fraud, identity theft or interference with the functionality of your device.

Follow this cyberfit recipe for success for creating a secure medical device.

Cybersecurity Risks of Medical Devices

Medical devices such as blood pressure cuffs, heart rate monitors, blood glucose monitors and CPAP machines can have certain cybersecurity risks. To be sure your information is secure, follow the instructions for you medical devices, avoid interference with other electronic equipment, and see if you can turn them off when not in use. To keep your home internet secure: password protect your internet connection, keep your security updates current and check your router for encryption settings.

Medical devices can have cybersecurity risks. Take steps to make sure your information is secure.

Personal responsibility is key to cybersecurity

Servio Medina, one of the Defense Health Agency’s Health Information Technology leaders on cybersecurity, implores his audience to practice positive cyber hygiene. (MHS photo)

Leader in cybersecurity discusses the risks of human error in cybersecurity at HIMSS

Recommended Content:


Track your weight loss

Mobile apps and programs are becoming simpler and more intuitive to help monitor your healthy eating. Some programs are interactive as well. They also provide nutrition information for more than 45,000 food items, including brand name and restaurant foods. Entering foods and calculating their calories takes only a fraction of the time when compared to a “paper” food diary. (MHS graphic)

The first step to losing weight and gaining better health is using self-monitoring techniques to track your calories

Recommended Content:

Nutrition | Physical Activity | Human Performance Resource Center

Cyberfit Myth vs. Fact 4

cyberfit Myth vs. Fact #3

Public WiFi is not secure.

Military health cybersecurity officials warn of possible pitfalls of easy access to information

woman looking at a laptop

There’s more information than ever before available online. While there are advantages to that, Military Health System officials warn to be careful with the data.

Cyberfit Recipe for Success 2

Recipe for creating the perfect password

Creating the Perfect Password

Cyberfit Recipe for Success 1

Creating a Cyberfit Device Recipe Card

Creating a Cyberfit Device

Cyberfit Myth vs. Fact 1

cyberfit infographic

Consider using an alias if you interact in a health-related chat room.

Cyberfit Myth vs. Fact 2

Cyberfit Myth vs. Fact 2

Take time to learn about your fitness wearables and apps.

5-Day Cyberfit Plan: Day 5

5-Day Cyberfit Plan, Day 5

Beware of Health Information Fraud

5-Day Cyberfit Plan: Day 2

5-Day Cyberfit Plan, Day 2

Clean Out Your Mobile Apps

5-Day Cyberfit Plan: Day 3

5-Day Cyberfit Plan, Day 3

Protect Your Stored Information

5-Day Cyberfit Plan: Day 4

5-Day Cyberfit Plan, Day 4

Share Your Information Wisely

<< < 1 2 > >> 
Showing results 1 - 15 Page 1 of 2

DHA Address: 7700 Arlington Boulevard | Suite 5101 | Falls Church, VA | 22042-5101

Some documents are presented in Portable Document Format (PDF). A PDF reader is required for viewing: Download a PDF Reader or learn more about PDFs.