Cyber

Cyber security news and case studies

  • Remote patient monitoring — Risk management considerations

    Remote patient monitoring — Risk management considerations

    Factors to onsider when using remote patient monitoring.

    Read Article
  • WEBINAR: Lessons learned from OCR Resolution Agreements in 2020

    REGISTER
  • OCR warns of fraudulent postcard disguised as official OCR communication

    The OCR has issued a warning about a false postcard notifying recipients of a mandatory HIPAA risk assessment.

    Read Article
  • Podcast: Tech, Telemedicine, Tomorrow

    LISTEN
  • Cyber criminal pretends to be OCR investigator to obtain PHI

    Cyber criminal pretends to be OCR investigator to obtain PHI

    The OCR is warning about an increase in malicious behavior by cyber criminals seeking access to protected health information.

    Read Article
  • Cyber insurance, Part 2: What are the potential costs of cyber risk?25:47

    Cyber insurance, Part 2: What are the potential costs of cyber risk?

    In this webinar, TMLT’s cyber insurance expert, John Southrey, discusses the total cost of cyber risks and how TMLT’s cyber insurance can provide crucial financial risk transfer. The webinar is design

    Watch Video
  • Cyber insurance, Part 1: Understanding your coverage31:26

    Cyber insurance, Part 1: Understanding your coverage

    In this informative webinar, TMLT’s cyber insurance expert, John Southrey, provides a comprehensive overview of the primary cyber insurance benefits endorsed to TMLT’s medical professional liability i

    Watch Video
  • An interview with cyber attorney, Adrian Senyszyn55:43

    An interview with cyber attorney, Adrian Senyszyn

    In this webinar, cyber attorney Adrian Senyszyn addresses frequently asked questions about cyber security and current threats to practices, HIPAA compliance, and breach investigations. Watch this CME

    Watch Video
  • The Reporter Cyber Edition 2020

    The Reporter Cyber Edition 2020

    Read Flipbook
  • Cyber criminals hijack video calls; FBI provides recommendations

    Our increased dependency on teleconferencing has created new opportunities and incentives for cyber criminals to hack into video calls.

    Read Article
  • Have a cyber question?

    Ask our experts
  • Coronavirus: Answers to your risk management questions

    Coronavirus: Answers to your risk management questions

    On-demand webinar discussing: HIPAA and patient privacy; sharing PHI with public health authorities; and preparing for coronavirus in your practice.

    Read Article
  • Podcast: Tips, trends, and understanding your cyber insurance

    Podcast: Tips, trends, and understanding your cyber insurance

    Learn about the current cyber security landscape, what your cyber insurance policy should cover, and more.

    Read Article
  • Cyber fraud case study: Failure to recognize phishing email

    Cyber fraud case study: Failure to recognize phishing email

    The hospital received an email invoice from the ED group with instructions to send payment to a new account.

    Read Article
  • OCR to waive potential HIPAA penalties during COVID-19 emergency

    OCR to waive potential HIPAA penalties during COVID-19 emergency

    HHS OCR announced it will waive potential HIPAA penalties against health care providers using telehealth services to care for patients during the COVID-19 national emergency.

    Read Article
  • HIPAA and the coronavirus

    HIPAA and the coronavirus

    HIPAA and public health emergencies: updates from the OCR

    Read Article
  • What are some of the direct and indirect costs of a data breach?1:51

    What are some of the direct and indirect costs of a data breach?

    John Southrey, director of consulting services at TMLT, describes the costs - both direct and indirect - of a cyber data breach.

    Watch Video
  • What is covered under "cyber extortion" within a cyber liability policy?1:39

    What is covered under "cyber extortion" within a cyber liability policy?

    John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.

    Watch Video
  • 48 hours after a HIPAA breach40:43

    48 hours after a HIPAA breach

    The actions taken in the hours and days after a cyber breach are critical, especially in protecting evidence. In this webinar, attorney Adrian Senyszyn, discusses the most important steps that covered

    Watch Video
  • Preserving evidence Is vital in a ransomware attack

    Providers can take steps following an attack to help preserve evidence, which may help them meet their burden of proof and conclude that there was a low probability of compromise to ePHI.

    Read Article
  • Study shows increased cyber security can affect patient outcomes

    Study shows increased cyber security can affect patient outcomes

    Corrective actions taken to enhance privacy and security may introduce usability issues.

    Read Article
  • WEBINAR: Lessons learned from OCR Resolution Agreements in 2020

    REGISTER
  • Can physicians use their own mobile devices at work?1:36

    Can physicians use their own mobile devices at work?

    Cathy Bryant, manager of product development & consulting services at TMLT, discusses the pros and cons of "BYOD," or "Bring Your Own Device."

    Watch Video
  • A group admin explains what business interruption really means

    A group admin explains what business interruption really means

    What happens when a system failure brings down the EMR?

    Read Article
  • loading
    Loading More...