Thank you for subscribing to CYBER @TMLT
Error - something went wrong!
Podcast: Tech, Telemedicine, TomorrowLISTEN
Other content in this Stream
Deadline and new requirements added to Texas breach notification law
Beginning in January 2020, data breaches must be reported to affected individuals no later than 60 days from the discovery date.
Ransomware attacks shut down practices
These incidents highlight the catastrophic consequences of ransomware attacks.
Study shows increased cyber security can affect patient outcomes
Corrective actions taken to enhance privacy and security may introduce usability issues.
Ransomware is cyber extortion
Ransomware is a form of cyber extortion — and a serious business risk. Also considered "electronic vandalism," ransomware can corrupt or destroy your data.
What is covered under "cyber extortion" within a cyber liability policy?
John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.
What are some of the direct and indirect costs of a data breach?
John Southrey, director of consulting services at TMLT, describes the costs - both direct and indirect - of a cyber data breach.
Protect your information from cyber thieves
Tips and and practices to help you defend against cyber criminals . . .
48 hours after a HIPAA breach
The actions taken in the hours and days after a cyber breach are critical, especially in protecting evidence. In this webinar, attorney Adrian Senyszyn, discusses the most important steps that covered
Podcast: Tips, trends, and understanding your cyber insurance
Learn about the current cyber security landscape, what your cyber insurance policy should cover, and more.
Cyber fraud case study: Failure to recognize phishing email
The hospital received an email invoice from the ED group with instructions to send payment to a new account.
Technology-based errors and omissions in health care
A practice’s technology services or products can cause errors and omissions (E&O) that could lead to claims, including bodily injury to others.
What we can learn from the Capital One breach
Approximately 100 million people in the U.S. had their personal information obtained by a software engineer who gained unauthorized access to Capital One credit card applications and customer data.
Preserving evidence Is vital in a ransomware attack
Providers can take steps following an attack to help preserve evidence, which may help them meet their burden of proof and conclude that there was a low probability of compromise to ePHI.
Reporter 2017 Radiology
Failure to report misplaced central line; HIPAA and patient privacy
Reporter 2017 Pediatrics
Failure to obtain parental consent for circumcision; HIPAA and patient privacy
Reporter 2011 Pathology
Misdiagnosis of pancreatic cancer; Highlighting HIPAA and HITECH — changes enacted to privacy rules
Reporter 2017 Pain Management
Failure to properly monitor patient's medication and supervise physician assistant; Case closed: HIPAA and patient privacy
Reporter 2017 Orthopedics
Alleged wrong-site surgery; HIPAA and patient privacy
Reporter 2017 Internal Medicine
Failure to properly manage warfarin dosage; Case closed: HIPAA and patient privacy
Reporter 2017 Gastroenterology