Q&A on medical record privacy and security
Requirements for physicians under state and federal laws
Read Article
Requirements for physicians under state and federal laws
Read Article
Case studies about ransomware incidents and the investigations that follow.
Read Article
Case studies about violations of HIPAA privacy rules.
Read Article
Factors to consider when using remote patient monitoring.
Read Article
A hospital received an email invoice from their ED group with instructions to send payment to a new account.
Read Article
Learn about email security issues from a cyber security attorney.
Watch Video
How to avoid email fraud; Beware of ransomware; What business interruption really means; Cyber liability cases and claims; About cyber liability insurance
Read Flipbook
Email fraud is used by cyber criminals to hack into health care organizations and access patient data.
View Presentation
Have a cyber question?
Ask our expertsProviders can take these steps after an attack to help preserve evidence.
Read Article
You play an important role in keeping your organization’s sensitive information secure. Make a habit of following these best practices to reduce the risk of a breach of sensitive information. Keep thi
View Presentation
Learn what’s covered in a cyber claim: cyber extortion; lost data; and business interruption.
Watch Video
What happens when a system failure brings down the EMR?
Read Article
Learn five steps to help prevent a cyber breach.
Watch Video
Tips and and practices to help you defend against cyber criminals . . .
Read Article
Protecting sensitive data involves a variety of physical safeguards.
Read Article
Connected devices generate and store data, posing serious security and privacy concerns.
View Presentation
A ransomware action plan could help preserve data and limit the extent of a breach.
Read Article
Under the ever-present threat of an attack by cyber criminals, health care entities are taking a closer look at ways to strengthen and safeguard their authentication methods.
View Presentation
Improper disposal of electronic devices increases the risk of a breach.
Read Article
Cybercriminals are employing customer service tactics to engage with their victims.
Read Article