Cyber

Cyber security news and case studies

  • What is covered under "cyber extortion" within a cyber liability policy?1:39

    What is covered under "cyber extortion" within a cyber liability policy?

    John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.

    Watch Video
  • NEED MORE CYBER LIABILITY COVERAGE? Higher limits available for purchase.

    Request A Quote
  • What are some of the direct and indirect costs of a data breach?1:51

    What are some of the direct and indirect costs of a data breach?

    John Southrey, director of consulting services at TMLT, describes the costs - both direct and indirect - of a cyber data breach.

    Watch Video
  • Can physicians use their own mobile devices at work?1:36

    Can physicians use their own mobile devices at work?

    Cathy Bryant, manager of product development & consulting services at TMLT, discusses the pros and cons of "BYOD," or "Bring Your Own Device."

    Watch Video
  • How can I prevent a cyber breach?1:40

    How can I prevent a cyber breach?

    Cathy Bryant, manager of product development & consulting services at TMLT, provides five steps to help health care entities prevent a cyber breach.

    Watch Video
  • What we can learn from MD Anderson's $4.3 million HIPAA penalty

    What we can learn from MD Anderson's $4.3 million HIPAA penalty

    MD Anderson Cancer Center was recently fined for HIPAA violations. Let's go behind the headlines and take a look at the case.

    Read Article
  • Why the Facebook scandal should have you analyzing your third-party vendors

    Why the Facebook scandal should have you analyzing your third-party vendors

    Read Article
  • What Is Your Total Cost of (Cyber) Risk?

    The financial impact of a data breach can be much greater than expected.

    Read Article
  • ×

    Subscribe to CYBER @TMLT for more resources and cyber news.

    First Name
    Last Name
    Are you a physician?
    Are you a TMLT policyholder?
    Please list your specialty or occupation. - optional
    Thank you for subscribing to CYBER @TMLT
    Error - something went wrong!
  • Lone Star Reporter Quarter 2 2018

    Lone Star Reporter Quarter 2 2018

    Risk management trends analysis; CME: Preparing for office-based medical emergencies; How to prepare for a cyber breach; Failure to properly treat myocardial infarction; Failure to supervise APP

    Read Flipbook
  • Have a cyber question?

    Ask our experts
  • Reporter Quarter 2 2018

    Reporter Quarter 2 2018

    Risk management trends analysis; Preparing for office based medical emergencies (CME); How to prepare for a cyber breach; Failure to treat myocardial infarction; Failure to supervise APP

    Read Flipbook
  • Ransomware attacks

    Ransomware attacks

    The case studies in this presentation are real life examples of ransomware attacks on health care organizations, and are intended to help physicians respond appropriately for when this type of cyber c

    View Presentation
  • Ten Things that Compromise Patient Data

    Ten Things that Compromise Patient Data

    This publication describes 10 reasons physician practices are vulnerable to cyber attacks and offers advice on how to address these issues.

    Read Flipbook
  • March 15 Webinar Features TMLT Cyber Expert

    March 15 Webinar Features TMLT Cyber Expert

    A panel of experts will discuss how to manage risks related to protected health information. The webinar is presented by Cyber Trust Alliance and features TMLT’s cyber expert John Southrey.

    Read Article
  • Charging for Copies of Medical Records: Rules Released

    The amount you can charge for supplying copies of medical records has changed, as the Office of Civil Rights has issued guidance that clarifies allowable fees.

    Read Article
  • Understanding Your TMLT Coverage

    Understanding Your TMLT Coverage

    Overview of your TMLT coverages: Medefense, Cyber liability, EPLI, and Medical Director.

    Read Flipbook
  • How Much Cyber Insurance Do You Need?

    As cyber attacks in health care continue, many practices may be asking this question.

    Read Article
  • Case Closed: HIPAA and patient privacy

    Case Closed: HIPAA and patient privacy

    This presentation is a case study based on alleged violations of HIPAA privacy rules.

    View Presentation
  • Allscripts EHRs Fall Victim to Ransomware Attacks

    EHR company Allscripts is still working to recover from a ransomware attack on Thursday, January 18, affecting two of its national data centers.

    Read Article
  • Cyber Security: Physical Safeguards Are Important Too

    Protecting sensitive data involves a variety of physical safeguards.

    Read Article
  • Deadline to Report 2017 HIPAA Breaches Approaching

    If you experienced a HIPAA breach that affected fewer than 500 individuals in 2017, the deadline to report that breach to HHS is the end of February.

    Read Article
  • How to Encrypt Your Smartphone

    Your mobile phone comes equipped with tools for encryption that take a few minutes to an hour to initiate and add an important layer of security to your device.

    Read Article
  • loading
    Loading More...