Podcast: Tech, Telemedicine, Tomorrow
LISTENOther content in this Stream

Factors to onsider when using remote patient monitoring.
The OCR has issued a warning about a false postcard notifying recipients of a mandatory HIPAA risk assessment.

The OCR is warning about an increase in malicious behavior by cyber criminals seeking access to protected health information.

In this webinar, TMLT’s cyber insurance expert, John Southrey, discusses the total cost of cyber risks and how TMLT’s cyber insurance can provide crucial financial risk transfer. The webinar is design

In this informative webinar, TMLT’s cyber insurance expert, John Southrey, provides a comprehensive overview of the primary cyber insurance benefits endorsed to TMLT’s medical professional liability i

In this webinar, cyber attorney Adrian Senyszyn addresses frequently asked questions about cyber security and current threats to practices, HIPAA compliance, and breach investigations. Watch this CME
Our increased dependency on teleconferencing has created new opportunities and incentives for cyber criminals to hack into video calls.

On-demand webinar discussing: HIPAA and patient privacy; sharing PHI with public health authorities; and preparing for coronavirus in your practice.

Learn about the current cyber security landscape, what your cyber insurance policy should cover, and more.

The hospital received an email invoice from the ED group with instructions to send payment to a new account.

HHS OCR announced it will waive potential HIPAA penalties against health care providers using telehealth services to care for patients during the COVID-19 national emergency.

John Southrey, director of consulting services at TMLT, describes the costs - both direct and indirect - of a cyber data breach.

John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.

The actions taken in the hours and days after a cyber breach are critical, especially in protecting evidence. In this webinar, attorney Adrian Senyszyn, discusses the most important steps that covered
Providers can take steps following an attack to help preserve evidence, which may help them meet their burden of proof and conclude that there was a low probability of compromise to ePHI.

Corrective actions taken to enhance privacy and security may introduce usability issues.

Cathy Bryant, manager of product development & consulting services at TMLT, discusses the pros and cons of "BYOD," or "Bring Your Own Device."

What happens when a system failure brings down the EMR?

Case studies of actual ransomware attacks on health care organizations.