The actions taken in the hours and days after a cyber breach are critical, especially in protecting evidence. Learn the most important steps to take following a cyber incident or breach. Recorded on July 23, 2019.
Podcast: Tech, Telemedicine, Tomorrow
LISTENOther content in this Stream

Factors to consider when using remote patient monitoring.

The Fifth Circuit Court disagreed with the OCR’s interpretation of the encryption and disclosure provisions.

In 2020, the OCR finalized and settled 14 investigations of HIPAA breaches or complaints. In this webinar, TMLT risk management experts summarize these OCR findings and lessons learned.

TMLT risk management experts Cathy Bryant and Kassie Toerner address risk assessments and current standards expected by the Health and Human Services Office for Civil Rights.

If you suspect one of your patients may harm himself or others, can you report your suspicions to the police without violating patient privacy?

Watch this webinar recording to learn what’s covered in a cyber claim: cyber extortion; damaged, corrupted, or lost data; and business interruption.

This webinar discuss cyber risks such as: business interruption; regulatory fines and penalties; recovering data that is compromised; and notifying patients about a privacy breach.

Cyber attorney Adrian Senyszyn addresses frequently asked questions about cyber security and current threats to practices, HIPAA compliance, and breach investigations.

How to avoid email fraud; Beware of ransomware; What business interruption really means; Cyber liability cases and claims; About cyber liability insurance

Our increased use of teleconferencing has created new opportunities for cyber criminals to hack into video calls.

Learn about the current cyber security landscape, what your cyber insurance policy should cover, and more.

The hospital received an email invoice from the ED group with instructions to send payment to a new account.

HHS OCR announced it will waive potential HIPAA penalties against health care providers using telehealth services to care for patients during the COVID-19 national emergency.

John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.

Providers can take these steps after an attack to help preserve evidence.

Corrective actions taken to enhance privacy and security may introduce usability issues.

Cathy Bryant, manager of product development & consulting services at TMLT, discusses the pros and cons of "BYOD," or "Bring Your Own Device."

What happens when a system failure brings down the EMR?

Case studies of actual ransomware attacks on health care organizations.