{"id":11826,"date":"2025-12-12T06:00:23","date_gmt":"2025-12-12T05:00:23","guid":{"rendered":"https:\/\/blogs.bmj.com\/bjsm\/?p=11826"},"modified":"2025-12-11T19:46:21","modified_gmt":"2025-12-11T18:46:21","slug":"digital-integrity-in-healthcare-from-a-teachable-moment-to-a-teachable-roadmap","status":"publish","type":"post","link":"https:\/\/blogs.bmj.com\/bjsm\/2025\/12\/12\/digital-integrity-in-healthcare-from-a-teachable-moment-to-a-teachable-roadmap\/","title":{"rendered":"Digital Integrity in Healthcare: From a Teachable Moment to a Teachable Roadmap"},"content":{"rendered":"<p><span style=\"font-weight: 400\">For healthcare professionals, digital safety is now as vital as patient confidentiality. Recently, a verified professional account on a major social media platform, one I had built since 2011 to share evidence-based exercise medicine and advocate for physical activity, was hijacked. Overnight, my brand was impersonated, and my access was revoked. Fourteen years of professional communication and community vanished behind a login wall that no longer recognised my registered name, number or identity.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This was not the result of carelessness. My devices were fully secured: an up-to-date iPhone, high security-protected laptop, unique passwords and two-factor authentication enabled. Yet the account was compromised. I remain in contact with the platform\u2019s impersonation and recovery teams but, at the time of writing, my professional identity there has not yet been restored.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The incident revealed an unsettling truth: even when clinicians uphold exemplary digital hygiene, systemic vulnerabilities within recovery and verification workflows can undermine professional identity and the integrity of public health communication. It was a stark reminder that cybersecurity is as much about culture and human behaviour as it is about code.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It began, as many lessons do, with a single vibration on my phone. Two unexpected text messages, both claiming to be from the platform. Not requested by me. Within minutes I was refreshing screens, generating codes and negotiating with algorithms that no longer recognised me. In that strange digital silence, I felt something every clinician knows: the moment you realise the system you trust has failed and you must find a way to keep caring anyway.<\/span><\/p>\n<p><span style=\"font-weight: 400\">My professional account, @exerciseworks, had been far more than a social channel. It was a living repository of ideas, collaborations, communities, friends and evidence linking movement to health. To lose it was to feel an entire professional ecosystem evaporate. Yet even as I worked to stabilise the crisis, I found myself shifting from frustration to reflection. In healthcare we speak of near misses, learning incidents and root-cause analyses. Why should digital harms be viewed any differently?<\/span><\/p>\n<p><span style=\"font-weight: 400\">So, I reframed the hack as a teachable moment. Not one defined by failure, but by insight: our professional presence online is as fragile and as vital as any system we safeguard in clinical practice.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Healthcare has long recognised that most adverse events arise not from individual mistakes but from system design and process gaps. Digital incidents deserve the same systemic thinking. Attackers increasingly exploit recovery workflows, authenticator fatigue and social engineering of platform support teams. The result is that doing everything right may still not be enough, which is a humbling yet necessary insight for any clinician maintaining a professional digital presence.<\/span><\/p>\n<p><span style=\"font-weight: 400\">When the breach occurred, I responded using the familiar logic of clinical governance: document, stabilise, escalate. My mobile operator confirmed there had been no SIM swap. My financial institutions were alerted. I kept a detailed record of every step, screenshot and correspondence. These actions mirrored the routines that preserve safety in clinical care: continuity, transparency and evidence gathering.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Yet the deeper learning was personal. Once the initial urgency passed and I paused long enough to reflect, I realised that resilience is a muscle we train both online and offline. Cybersecurity, like exercise, is preventive medicine. It strengthens the connective tissue of trust between health professionals and the public.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Below is the emerging roadmap shaped by this experience.<\/span><\/p>\n<h4>Towards a teachable digital roadmap<\/h4>\n<ol>\n<li style=\"font-weight: 400\"><b>See identity as infrastructure.<\/b><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Your professional profiles are the arteries of communication. Protect them as you would a patient record.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Anticipate human error.<\/b><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Two-factor authentication is only as strong as the behaviour around it. In my case, it did not protect identity or intellectual property.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Choose multi-factor authentication deliberately.<\/b><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">SMS codes mitigate some risks but remain vulnerable to interception and SIM-related attacks. Authenticator apps and hardware keys offer stronger, phishing-resistant protection.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Embed reflection.<\/b><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Schedule digital audits with the same regularity as clinical governance reviews.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Document and escalate systematically.<\/b><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Record timestamps, screenshots and correspondence. Clear digital forensics support recovery and accelerate platform verification.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Build peer verification networks.<\/b><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Trusted colleagues who can calmly confirm identity can counter disinformation and support recovery processes.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Transform pain into pedagogy.<\/b><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Every disruption, once analysed, becomes curriculum material for others: a teachable moment that encourages shared learning and action.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400\">As I worked through the consequences of the breach, one sentence surfaced and stayed with me: perhaps <\/span><b><i>integrity itself is our final firewall, built not of code but of conscience<\/i><\/b><span style=\"font-weight: 400\">. In that moment, I understood that digital security is not only a technical discipline but an ethical one. How we respond to breach, vulnerability and uncertainty defines the authenticity of our professional selves.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The wider insight is clear. Digital professionalism is not about perfection. It is about resilience within systems of trust. Cybersecurity in healthcare must therefore be reframed not as an IT concern but as an ethical responsibility tied to online safety, transparency and public trust (<\/span><span style=\"font-weight: 400\">1, 2, 3,<\/span> <span style=\"font-weight: 400\">4).<\/span><span style=\"font-weight: 400\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Institutional stewardship of professional accounts should become standard practice, with documented ownership, recovery protocols and designated validation contacts. Digital identity is not simply a personal tool (<\/span><span style=\"font-weight: 400\">5)<\/span><span style=\"font-weight: 400\">. It is part of our shared clinical infrastructure for credible, evidence-based communication.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Although my own account remains unresolved, the experience has reaffirmed a simple truth: safeguarding digital identity is an act of ethical stewardship for our reputations, our science and the integrity of the health messages we share (6).<\/span><\/p>\n<p><span style=\"font-weight: 400\">Teachable moments, in any format, are opportunities to reconnect, reflect and strengthen our professional integrity. Please check your cyber security systems now. Your creativity and intellectual property are too important to be mishandled.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11827\" src=\"https:\/\/blogs.bmj.com\/bjsm\/files\/2025\/12\/Ann-Gates-Cybersecurity-infographic-120x300.jpg\" alt=\"\" width=\"552\" height=\"1380\" srcset=\"https:\/\/blogs.bmj.com\/bjsm\/files\/2025\/12\/Ann-Gates-Cybersecurity-infographic-120x300.jpg 120w, https:\/\/blogs.bmj.com\/bjsm\/files\/2025\/12\/Ann-Gates-Cybersecurity-infographic-768x1920.jpg 768w, https:\/\/blogs.bmj.com\/bjsm\/files\/2025\/12\/Ann-Gates-Cybersecurity-infographic-614x1536.jpg 614w, https:\/\/blogs.bmj.com\/bjsm\/files\/2025\/12\/Ann-Gates-Cybersecurity-infographic-640x1600.jpg 640w, https:\/\/blogs.bmj.com\/bjsm\/files\/2025\/12\/Ann-Gates-Cybersecurity-infographic.jpg 800w\" sizes=\"auto, (max-width: 552px) 100vw, 552px\" \/><\/p>\n<h5>Author<\/h5>\n<p><em><b>Ann Gates BPharm (Hons) MRPharmS (Retired)<\/b><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Honorary Associate Professor, The University of Nottingham<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Honorary Visiting Professor, Plymouth Marjon University<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Collaborative Partner, Erasmus+ Vanguard Project <\/span><a href=\"https:\/\/vanguard-erasmus.eu\/project\/\"><span style=\"font-weight: 400\">https:\/\/vanguard-erasmus.eu\/project\/<\/span><\/a><\/em><\/p>\n<h5>Acknowledgement<\/h5>\n<p><span style=\"font-weight: 400\">This article was structured and refined with the assistance of OpenAI\u2019s ChatGPT. All content, tone and verification have been reviewed and approved by the author.<\/span><\/p>\n<h5>References and further information<\/h5>\n<ol>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">National Cyber Security Centre (2024) Multi-factor authentication guidance for individuals and organisations. London: UK Government. <\/span><a href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/not-all-types-mfa-created-equal\"><span style=\"font-weight: 400\">https:\/\/www.ncsc.gov.uk\/blog-post\/not-all-types-mfa-created-equal<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Cybersecurity and Infrastructure Security Agency (CISA) (2024) Phishing Guidance: Defending Against Social Engineering. Washington, DC: U.S. Department of Homeland Security.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">European Union Agency for Cybersecurity (ENISA) (2025) ENISA Threat Landscape 2025. Athens: ENISA Publications Office. <\/span><a href=\"https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2025\"><span style=\"font-weight: 400\">https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2025<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">World Health Organization (2024) Ethics and governance of digital health technologies. Geneva: WHO. <\/span><a href=\"https:\/\/www.who.int\/publications\/i\/item\/9789240084759\"><span style=\"font-weight: 400\">https:\/\/www.who.int\/publications\/i\/item\/9789240084759<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">General Medical Council (2024) Doctors\u2019 use of social media: guidance on maintaining professional standards. London: GMC. <\/span><a href=\"https:\/\/www.gmc-uk.org\/professional-standards\/the-professional-standards\/using-social-media-as-a-medical-professional\/using-social-media-as-a-medical-professional\"><span style=\"font-weight: 400\">https:\/\/www.gmc-uk.org\/professional-standards\/the-professional-standards\/using-social-media-as-a-medical-professional\/using-social-media-as-a-medical-professional<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Gates AB, Kerry R, Moffatt F, et al Movement for movement: exercise as everybody&#8217;s business British Journal of Sports Medicine 2017;51:767-768. <\/span><a href=\"https:\/\/bjsm.bmj.com\/content\/51\/10\/767\"><span style=\"font-weight: 400\">https:\/\/bjsm.bmj.com\/content\/51\/10\/767<\/span><\/a><\/li>\n<\/ol>\n<p><br style=\"font-weight: 400\" \/><br style=\"font-weight: 400\" \/><br style=\"font-weight: 400\" \/><!--TrendMD v2.4.8--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For healthcare professionals, digital safety is now as vital as patient confidentiality. Recently, a verified professional account on a major social media platform, one I had built since 2011 to share evidence-based exercise medicine and advocate for physical activity, was hijacked. Overnight, my brand was impersonated, and my access was revoked. Fourteen years of professional [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/blogs.bmj.com\/bjsm\/2025\/12\/12\/digital-integrity-in-healthcare-from-a-teachable-moment-to-a-teachable-roadmap\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":464,"featured_media":11827,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[16457,16458,16068,16455,16459,16456,16439],"class_list":["post-11826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-account","tag-cyber-safety","tag-featured","tag-hacking","tag-online","tag-professional","tag-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital Integrity in Healthcare: From a Teachable Moment to a Teachable Roadmap - BJSM blog - social media&#039;s leading SEM voice<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.bmj.com\/bjsm\/?p=11826\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Integrity in Healthcare: From a Teachable Moment to a Teachable Roadmap - BJSM blog - social media&#039;s leading SEM voice\" \/>\n<meta property=\"og:description\" content=\"For healthcare professionals, digital safety is now as vital as patient confidentiality. Recently, a verified professional account on a major social media platform, one I had built since 2011 to share evidence-based exercise medicine and advocate for physical activity, was hijacked. Overnight, my brand was impersonated, and my access was revoked. Fourteen years of professional [...]Read More...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.bmj.com\/bjsm\/?p=11826\" \/>\n<meta property=\"og:site_name\" content=\"BJSM blog - social media&#039;s leading SEM voice\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-12T05:00:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.bmj.com\/bjsm\/files\/2025\/12\/Ann-Gates-Cybersecurity-infographic.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"2000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"bjsm\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"bjsm\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/?p=11826#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/?p=11826\"},\"author\":{\"name\":\"bjsm\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/#\\\/schema\\\/person\\\/e5c423b95aa02d621ac95e263c08e07f\"},\"headline\":\"Digital Integrity in Healthcare: From a Teachable Moment to a Teachable Roadmap\",\"datePublished\":\"2025-12-12T05:00:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/?p=11826\"},\"wordCount\":1114,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/?p=11826#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/files\\\/2025\\\/12\\\/Ann-Gates-Cybersecurity-infographic.jpg\",\"keywords\":[\"account\",\"cyber safety\",\"featured\",\"hacking\",\"online\",\"professional\",\"protection\"],\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/?p=11826#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/?p=11826\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/?p=11826\",\"name\":\"Digital Integrity in Healthcare: From a Teachable Moment to a Teachable Roadmap - BJSM blog - social media&#039;s leading SEM voice\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/?p=11826#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/?p=11826#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/files\\\/2025\\\/12\\\/Ann-Gates-Cybersecurity-infographic.jpg\",\"datePublished\":\"2025-12-12T05:00:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/?p=11826#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/?p=11826\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/?p=11826#primaryimage\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/files\\\/2025\\\/12\\\/Ann-Gates-Cybersecurity-infographic.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/files\\\/2025\\\/12\\\/Ann-Gates-Cybersecurity-infographic.jpg\",\"width\":800,\"height\":2000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/?p=11826#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Integrity in Healthcare: From a Teachable Moment to a Teachable Roadmap\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/#website\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/\",\"name\":\"BJSM blog - social media&#039;s leading SEM voice\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/#organization\",\"name\":\"BJSM blog - social media&#039;s leading SEM voice\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/files\\\/2017\\\/11\\\/blog-logo-bjsm.png\",\"contentUrl\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/files\\\/2017\\\/11\\\/blog-logo-bjsm.png\",\"width\":222,\"height\":34,\"caption\":\"BJSM blog -  social media&#039;s leading SEM voice\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/#\\\/schema\\\/person\\\/e5c423b95aa02d621ac95e263c08e07f\",\"name\":\"bjsm\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0032367471e5ee33e4efbe4567cbfe76056393a0e5f81bd8d576f8b5a2b90644?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0032367471e5ee33e4efbe4567cbfe76056393a0e5f81bd8d576f8b5a2b90644?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/0032367471e5ee33e4efbe4567cbfe76056393a0e5f81bd8d576f8b5a2b90644?s=96&d=mm&r=g\",\"caption\":\"bjsm\"},\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bjsm\\\/author\\\/chloewilliamson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital Integrity in Healthcare: From a Teachable Moment to a Teachable Roadmap - BJSM blog - social media&#039;s leading SEM voice","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.bmj.com\/bjsm\/?p=11826","og_locale":"en_US","og_type":"article","og_title":"Digital Integrity in Healthcare: From a Teachable Moment to a Teachable Roadmap - BJSM blog - social media&#039;s leading SEM voice","og_description":"For healthcare professionals, digital safety is now as vital as patient confidentiality. Recently, a verified professional account on a major social media platform, one I had built since 2011 to share evidence-based exercise medicine and advocate for physical activity, was hijacked. Overnight, my brand was impersonated, and my access was revoked. Fourteen years of professional [...]Read More...","og_url":"https:\/\/blogs.bmj.com\/bjsm\/?p=11826","og_site_name":"BJSM blog - social media&#039;s leading SEM voice","article_published_time":"2025-12-12T05:00:23+00:00","og_image":[{"width":800,"height":2000,"url":"https:\/\/blogs.bmj.com\/bjsm\/files\/2025\/12\/Ann-Gates-Cybersecurity-infographic.jpg","type":"image\/jpeg"}],"author":"bjsm","twitter_card":"summary_large_image","twitter_misc":{"Written by":"bjsm","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.bmj.com\/bjsm\/?p=11826#article","isPartOf":{"@id":"https:\/\/blogs.bmj.com\/bjsm\/?p=11826"},"author":{"name":"bjsm","@id":"https:\/\/blogs.bmj.com\/bjsm\/#\/schema\/person\/e5c423b95aa02d621ac95e263c08e07f"},"headline":"Digital Integrity in Healthcare: From a Teachable Moment to a Teachable Roadmap","datePublished":"2025-12-12T05:00:23+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.bmj.com\/bjsm\/?p=11826"},"wordCount":1114,"commentCount":0,"publisher":{"@id":"https:\/\/blogs.bmj.com\/bjsm\/#organization"},"image":{"@id":"https:\/\/blogs.bmj.com\/bjsm\/?p=11826#primaryimage"},"thumbnailUrl":"https:\/\/blogs.bmj.com\/bjsm\/files\/2025\/12\/Ann-Gates-Cybersecurity-infographic.jpg","keywords":["account","cyber safety","featured","hacking","online","professional","protection"],"articleSection":["General"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.bmj.com\/bjsm\/?p=11826#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.bmj.com\/bjsm\/?p=11826","url":"https:\/\/blogs.bmj.com\/bjsm\/?p=11826","name":"Digital Integrity in Healthcare: From a Teachable Moment to a Teachable Roadmap - BJSM blog - social media&#039;s leading SEM voice","isPartOf":{"@id":"https:\/\/blogs.bmj.com\/bjsm\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.bmj.com\/bjsm\/?p=11826#primaryimage"},"image":{"@id":"https:\/\/blogs.bmj.com\/bjsm\/?p=11826#primaryimage"},"thumbnailUrl":"https:\/\/blogs.bmj.com\/bjsm\/files\/2025\/12\/Ann-Gates-Cybersecurity-infographic.jpg","datePublished":"2025-12-12T05:00:23+00:00","breadcrumb":{"@id":"https:\/\/blogs.bmj.com\/bjsm\/?p=11826#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.bmj.com\/bjsm\/?p=11826"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.bmj.com\/bjsm\/?p=11826#primaryimage","url":"https:\/\/blogs.bmj.com\/bjsm\/files\/2025\/12\/Ann-Gates-Cybersecurity-infographic.jpg","contentUrl":"https:\/\/blogs.bmj.com\/bjsm\/files\/2025\/12\/Ann-Gates-Cybersecurity-infographic.jpg","width":800,"height":2000},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.bmj.com\/bjsm\/?p=11826#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.bmj.com\/bjsm\/"},{"@type":"ListItem","position":2,"name":"Digital Integrity in Healthcare: From a Teachable Moment to a Teachable Roadmap"}]},{"@type":"WebSite","@id":"https:\/\/blogs.bmj.com\/bjsm\/#website","url":"https:\/\/blogs.bmj.com\/bjsm\/","name":"BJSM blog - social media&#039;s leading SEM voice","description":"","publisher":{"@id":"https:\/\/blogs.bmj.com\/bjsm\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.bmj.com\/bjsm\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blogs.bmj.com\/bjsm\/#organization","name":"BJSM blog - social media&#039;s leading SEM voice","url":"https:\/\/blogs.bmj.com\/bjsm\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.bmj.com\/bjsm\/#\/schema\/logo\/image\/","url":"https:\/\/blogs.bmj.com\/bjsm\/files\/2017\/11\/blog-logo-bjsm.png","contentUrl":"https:\/\/blogs.bmj.com\/bjsm\/files\/2017\/11\/blog-logo-bjsm.png","width":222,"height":34,"caption":"BJSM blog -  social media&#039;s leading SEM voice"},"image":{"@id":"https:\/\/blogs.bmj.com\/bjsm\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blogs.bmj.com\/bjsm\/#\/schema\/person\/e5c423b95aa02d621ac95e263c08e07f","name":"bjsm","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/0032367471e5ee33e4efbe4567cbfe76056393a0e5f81bd8d576f8b5a2b90644?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0032367471e5ee33e4efbe4567cbfe76056393a0e5f81bd8d576f8b5a2b90644?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0032367471e5ee33e4efbe4567cbfe76056393a0e5f81bd8d576f8b5a2b90644?s=96&d=mm&r=g","caption":"bjsm"},"url":"https:\/\/blogs.bmj.com\/bjsm\/author\/chloewilliamson\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.bmj.com\/bjsm\/wp-json\/wp\/v2\/posts\/11826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.bmj.com\/bjsm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.bmj.com\/bjsm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.bmj.com\/bjsm\/wp-json\/wp\/v2\/users\/464"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.bmj.com\/bjsm\/wp-json\/wp\/v2\/comments?post=11826"}],"version-history":[{"count":0,"href":"https:\/\/blogs.bmj.com\/bjsm\/wp-json\/wp\/v2\/posts\/11826\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.bmj.com\/bjsm\/wp-json\/wp\/v2\/media\/11827"}],"wp:attachment":[{"href":"https:\/\/blogs.bmj.com\/bjsm\/wp-json\/wp\/v2\/media?parent=11826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.bmj.com\/bjsm\/wp-json\/wp\/v2\/categories?post=11826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.bmj.com\/bjsm\/wp-json\/wp\/v2\/tags?post=11826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}