Case briefs — Ransomware
Case studies about ransomware incidents and the investigations that follow.
Read Article
Case studies about ransomware incidents and the investigations that follow.
Read Article
CME webinar:
Information blocking
Case studies about violations of HIPAA privacy rules.
Read Article
Join TMLT cyber experts as they discuss the latest concerns about phishing, conducting vulnerability scans, two-factor authentication, and the continued importance of strong passwords.
Read Article
The case studies in this presentation are real life examples of ransomware attacks on health care organizations, and are intended to help physicians respond appropriately for when this type of cyber c
View Presentation
You play an important role in keeping your organization’s sensitive information secure. Make a habit of following these best practices to reduce the risk of a breach of sensitive information. Keep thi
View Presentation
Learn about email security issues and how it relates to HIPAA from a cyber security attorney.
Watch Video
Requirements for physicians under state and federal laws
Read Article
Factors to consider when using remote patient monitoring.
Read Article
Have a cyber question?
Ask our expertsEmail fraud is a common tactic used by cyber criminals to hack into health care organizations and access patient data. Knowing how to recognize email fraud is important to reduce risk and possibly pre
View Presentation
Learn what’s covered in a cyber claim: cyber extortion; lost data; and business interruption.
Watch Video
How to avoid email fraud; Beware of ransomware; What business interruption really means; Cyber liability cases and claims; About cyber liability insurance
Read Flipbook
The Fifth Circuit Court disagreed with the OCR’s interpretation of the encryption and disclosure provisions.
Read Article
A hospital received an email invoice from their ED group with instructions to send payment to a new account.
Read Article
Providers can take these steps after an attack to help preserve evidence.
Read Article
What happens when a system failure brings down the EMR?
Read Article
Learn five steps to help prevent a cyber breach.
Watch Video
Tips and and practices to help you defend against cyber criminals . . .
Read Article
Protecting sensitive data involves a variety of physical safeguards.
Read Article
Cyber liability insurance is an increasingly vital tool in protecting health care providers and their patients against evolving cyber risks. This presentation is your introductory guide to actionable
View Presentation
Connected devices generate and store data for their various functions, posing serious security and privacy concerns. This presentation is intended to warn physicians of the risks with using internet c
View Presentation
Loading More...