Thank you for subscribing to CYBER @TMLT
Error - something went wrong!
Reporter 2011 Orthopedics
Failure to treat post-operative infection; Highlighting HIPAA and HITECH — changes enacted to privacy rules
Podcast: Tech, Telemedicine, TomorrowLISTEN
Other content in this Stream
What we can learn from the Capital One breach
Approximately 100 million people in the U.S. had their personal information obtained by a software engineer who gained unauthorized access to Capital One credit card applications and customer data.
Ransomware is cyber extortion
Ransomware is a form of cyber extortion — and a serious business risk. Also considered "electronic vandalism," ransomware can corrupt or destroy your data.
Preserving evidence Is vital in a ransomware attack
Providers can take steps following an attack to help preserve evidence, which may help them meet their burden of proof and conclude that there was a low probability of compromise to ePHI.
Reporter 2017 Radiology
Failure to report misplaced central line; HIPAA and patient privacy
Reporter 2017 Pediatrics
Failure to obtain parental consent for circumcision; HIPAA and patient privacy
Reporter 2011 Pathology
Misdiagnosis of pancreatic cancer; Highlighting HIPAA and HITECH — changes enacted to privacy rules
Reporter 2017 Pain Management
Failure to properly monitor patient's medication and supervise physician assistant; Case closed: HIPAA and patient privacy
Reporter 2017 Orthopedics
Alleged wrong-site surgery; HIPAA and patient privacy
Reporter 2017 Internal Medicine
Failure to properly manage warfarin dosage; Case closed: HIPAA and patient privacy
Reporter 2017 Gastroenterology
Negligence and failure to arrange adequate follow-up care; HIPAA and patient privacy
What is covered under "cyber extortion" within a cyber liability policy?
John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.
What are some of the direct and indirect costs of a data breach?
John Southrey, director of consulting services at TMLT, describes the costs - both direct and indirect - of a cyber data breach.
Deadline to Report 2018 HIPAA Breaches Approaching
If you experienced a HIPAA breach that affected fewer than 500 individuals in 2018, the deadline to report that breach to HHS is March 1.
HHS releases voluntary cyber security practices
HHS released voluntary cyber security practices to the health care industry with the aim of providing practice guidelines to reduce cyber security risks.
A group admin explains what business interruption really means
What happens when a system failure brings down the EMR?
Anthem pays $16 million HIPAA penalty
Anthem will pay $16 million after cyber attacks exposed the ePHI of 79 million people
How to dispose of storage devices containing PHI and other sensitive data
Improper disposal of electronic devices and media puts the information stored on those devices at risk for a breach. And when devices contain protected health information (PHI), it puts your patient’s
Can physicians use their own mobile devices at work?
Cathy Bryant, manager of product development & consulting services at TMLT, discusses the pros and cons of "BYOD," or "Bring Your Own Device."
How can I prevent a cyber breach?
Cathy Bryant, manager of product development & consulting services at TMLT, provides five steps to help health care entities prevent a cyber breach.
What we can learn from MD Anderson's $4.3 million HIPAA penalty