Cyber

Cyber security news and case studies

  • What we can learn from the Capital One breach

    Approximately 100 million people in the U.S. had their personal information obtained by a software engineer who gained unauthorized access to Capital One credit card applications and customer data.

    Read Article
  • WEBINAR: An individual's right to access their medical records

    Register
  • Podcast: Tech, Telemedicine, Tomorrow

    LISTEN
  • Ransomware is cyber extortion

    Ransomware is cyber extortion

    Ransomware is a form of cyber extortion — and a serious business risk. Also considered "electronic vandalism," ransomware can corrupt or destroy your data.

    Read Article
  • Preserving evidence Is vital in a ransomware attack

    Providers can take steps following an attack to help preserve evidence, which may help them meet their burden of proof and conclude that there was a low probability of compromise to ePHI.

    Read Article
  • NEED MORE CYBER LIABILITY COVERAGE? Higher limits available for purchase.

    Request A Quote
  • Reporter 2017 Radiology

    Reporter 2017 Radiology

    Failure to report misplaced central line; HIPAA and patient privacy

    Read Flipbook
  • Reporter 2017 Pediatrics

    Reporter 2017 Pediatrics

    Failure to obtain parental consent for circumcision; HIPAA and patient privacy

    Read Flipbook
  • Reporter 2011 Pathology

    Reporter 2011 Pathology

    Misdiagnosis of pancreatic cancer; Highlighting HIPAA and HITECH — changes enacted to privacy rules

    Read Flipbook
  • Reporter 2017 Pain Management

    Reporter 2017 Pain Management

    Failure to properly monitor patient's medication and supervise physician assistant; Case closed: HIPAA and patient privacy

    Read Flipbook
  • ×

    Subscribe to CYBER @TMLT for more resources and cyber news.

    First Name
    Last Name
    Are you a physician?
    Are you a TMLT policyholder?
    Please list your specialty or occupation. - optional
    Thank you for subscribing to CYBER @TMLT
    Error - something went wrong!
  • Reporter 2017 Orthopedics

    Reporter 2017 Orthopedics

    Alleged wrong-site surgery; HIPAA and patient privacy

    Read Flipbook
  • Have a cyber question?

    Ask our experts
  • Reporter 2017 Internal Medicine

    Reporter 2017 Internal Medicine

    Failure to properly manage warfarin dosage; Case closed: HIPAA and patient privacy

    Read Flipbook
  • Reporter 2017 Gastroenterology

    Reporter 2017 Gastroenterology

    Negligence and failure to arrange adequate follow-up care; HIPAA and patient privacy

    Read Flipbook
  • What is covered under "cyber extortion" within a cyber liability policy?1:39

    What is covered under "cyber extortion" within a cyber liability policy?

    John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.

    Watch Video
  • What are some of the direct and indirect costs of a data breach?1:51

    What are some of the direct and indirect costs of a data breach?

    John Southrey, director of consulting services at TMLT, describes the costs - both direct and indirect - of a cyber data breach.

    Watch Video
  • Deadline to Report 2018 HIPAA Breaches Approaching

    If you experienced a HIPAA breach that affected fewer than 500 individuals in 2018, the deadline to report that breach to HHS is March 1.

    Read Article
  • HHS releases voluntary cyber security practices

    HHS released voluntary cyber security practices to the health care industry with the aim of providing practice guidelines to reduce cyber security risks.

    Read Article
  • A group admin explains what business interruption really means

    A group admin explains what business interruption really means

    What happens when a system failure brings down the EMR?

    Read Article
  • Anthem pays $16 million HIPAA penalty

    Anthem pays $16 million HIPAA penalty

    Anthem will pay $16 million after cyber attacks exposed the ePHI of 79 million people

    Read Article
  • How to dispose of storage devices containing PHI and other sensitive data

    How to dispose of storage devices containing PHI and other sensitive data

    Improper disposal of electronic devices and media puts the information stored on those devices at risk for a breach. And when devices contain protected health information (PHI), it puts your patient’s

    Read Article
  • Can physicians use their own mobile devices at work?1:36

    Can physicians use their own mobile devices at work?

    Cathy Bryant, manager of product development & consulting services at TMLT, discusses the pros and cons of "BYOD," or "Bring Your Own Device."

    Watch Video
  • WEBINAR: An individual's right to access their medical records

    Register
  • How can I prevent a cyber breach?1:40

    How can I prevent a cyber breach?

    Cathy Bryant, manager of product development & consulting services at TMLT, provides five steps to help health care entities prevent a cyber breach.

    Watch Video
  • What we can learn from MD Anderson's $4.3 million HIPAA penalty

    What we can learn from MD Anderson's $4.3 million HIPAA penalty

    MD Anderson Cancer Center was recently fined for HIPAA violations. Let's go behind the headlines and take a look at the case.

    Read Article
  • loading
    Loading More...