Risk alert: U.S. bans Kaspersky software
Software widely used for antivirus protection
Read Article
Software widely used for antivirus protection
Read Article
Review records requests for signs of fraud
Read Article
Requirements for physicians under state and federal laws
Read Article
Case studies about ransomware incidents and the investigations that follow.
Read Article
Case studies about violations of HIPAA privacy rules.
Read Article
Keep your practice safe from cyber criminals
Read Flipbook
How to recognize phishing emails and other cyber criminal activities
Read Flipbook
Reduce risk when using your EHR
Read Flipbook
Have a cyber question?
Ask our expertsConnected devices generate and store data, posing serious security and privacy concerns.
Read Flipbook
John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.
Watch Video
Factors to consider when using remote patient monitoring.
Read Article
A hospital received an email invoice from their ED group with instructions to send payment to a new account.
Read Article
Learn about email security issues from a cyber security attorney.
Watch Video
10 ways that physician practices are vulnerable to cyber attacks
Read Flipbook
How to avoid email fraud; Beware of ransomware; What business interruption really means; Cyber liability cases and claims; About cyber liability insurance
Read Flipbook
Take these steps after an attack to help preserve evidence.
Read Article
Learn what’s covered in a cyber claim: cyber extortion; lost data; and business interruption.
Watch Video
What happens when a system failure brings down the EMR?
Read Article
Tips and and practices to help you defend against cyber criminals . . .
Read Article
Protecting sensitive data involves a variety of physical safeguards.
Read Article
Loading More...