Cyber

Cyber security news and case studies

  • Ransomware is cyber extortion

    Ransomware is cyber extortion

    Ransomware is a form of cyber extortion — and a serious business risk. Also considered "electronic vandalism," ransomware can corrupt or destroy your data.

    Read Article
  • New Webinar Series: HIPAA Compliance, Cyber Risks, and Cyber Security

    Register Now
  • What is covered under "cyber extortion" within a cyber liability policy?1:39

    What is covered under "cyber extortion" within a cyber liability policy?

    John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.

    Watch Video
  • What are some of the direct and indirect costs of a data breach?1:51

    What are some of the direct and indirect costs of a data breach?

    John Southrey, director of consulting services at TMLT, describes the costs - both direct and indirect - of a cyber data breach.

    Watch Video
  • NEED MORE CYBER LIABILITY COVERAGE? Higher limits available for purchase.

    Request A Quote
  • Deadline to Report 2018 HIPAA Breaches Approaching

    If you experienced a HIPAA breach that affected fewer than 500 individuals in 2018, the deadline to report that breach to HHS is March 1.

    Read Article
  • HHS releases voluntary cyber security practices

    HHS released voluntary cyber security practices to the health care industry with the aim of providing practice guidelines to reduce cyber security risks.

    Read Article
  • A group admin explains what business interruption really means

    A group admin explains what business interruption really means

    What happens when a system failure brings down the EMR?

    Read Article
  • Anthem pays $16 million HIPAA penalty

    Anthem pays $16 million HIPAA penalty

    Anthem will pay $16 million after cyber attacks exposed the ePHI of 79 million people

    Read Article
  • ×

    Subscribe to CYBER @TMLT for more resources and cyber news.

    First Name
    Last Name
    Are you a physician?
    Are you a TMLT policyholder?
    Please list your specialty or occupation. - optional
    Thank you for subscribing to CYBER @TMLT
    Error - something went wrong!
  • How to dispose of storage devices containing PHI and other sensitive data

    How to dispose of storage devices containing PHI and other sensitive data

    Improper disposal of electronic devices and media puts the information stored on those devices at risk for a breach. And when devices contain protected health information (PHI), it puts your patient’s

    Read Article
  • Have a cyber question?

    Ask our experts
  • Can physicians use their own mobile devices at work?1:36

    Can physicians use their own mobile devices at work?

    Cathy Bryant, manager of product development & consulting services at TMLT, discusses the pros and cons of "BYOD," or "Bring Your Own Device."

    Watch Video
  • How can I prevent a cyber breach?1:40

    How can I prevent a cyber breach?

    Cathy Bryant, manager of product development & consulting services at TMLT, provides five steps to help health care entities prevent a cyber breach.

    Watch Video
  • What we can learn from MD Anderson's $4.3 million HIPAA penalty

    What we can learn from MD Anderson's $4.3 million HIPAA penalty

    MD Anderson Cancer Center was recently fined for HIPAA violations. Let's go behind the headlines and take a look at the case.

    Read Article
  • Why the Facebook scandal should have you analyzing your third-party vendors

    Why the Facebook scandal should have you analyzing your third-party vendors

    Read Article
  • What Is Your Total Cost of (Cyber) Risk?

    The financial impact of a data breach can be much greater than expected.

    Read Article
  • Reporter Quarter 2 2018

    Reporter Quarter 2 2018

    Risk management trends analysis; Preparing for office based medical emergencies (CME); How to prepare for a cyber breach; Failure to treat myocardial infarction; Failure to supervise APP

    Read Flipbook
  • Ransomware attacks

    Ransomware attacks

    The case studies in this presentation are real life examples of ransomware attacks on health care organizations, and are intended to help physicians respond appropriately for when this type of cyber c

    View Presentation
  • Ten Things that Compromise Patient Data

    Ten Things that Compromise Patient Data

    This publication describes 10 reasons physician practices are vulnerable to cyber attacks and offers advice on how to address these issues.

    Read Flipbook
  • Understanding Your TMLT Coverage

    Understanding Your TMLT Coverage

    Overview of your TMLT coverages: Medefense, Cyber liability, EPLI, and Medical Director.

    Read Flipbook
  • How Much Cyber Insurance Do You Need?

    As cyber attacks in health care continue, many practices may be asking this question.

    Read Article
  • New Webinar Series: HIPAA Compliance, Cyber Risks, and Cyber Security

    Register Now
  • Case Closed: HIPAA and patient privacy

    Case Closed: HIPAA and patient privacy

    This presentation is a case study based on alleged violations of HIPAA privacy rules.

    View Presentation
  • Allscripts EHRs Fall Victim to Ransomware Attacks

    EHR company Allscripts is still working to recover from a ransomware attack on Thursday, January 18, affecting two of its national data centers.

    Read Article
  • loading
    Loading More...