Cyber attorney Adrian Senyszyn answers FAQs about cyber security, current cyber threats, HIPAA, and breach ...
Other content in this Stream
Corvus Scans assess your practice’s online presence, looking for any cyber vulnerabilities
Case studies about ransomware incidents and the investigations that follow.
Case studies about violations of HIPAA privacy rules.
We're upgrading our coverage — from cyber liability 1.0 to cyber liability 3.0
Factors to consider when using remote patient monitoring.
The Fifth Circuit Court disagreed with the OCR’s interpretation of the encryption and disclosure provisions.
If you suspect one of your patients may harm himself or others, can you report your suspicions to the police without violating patient privacy?
In 2020, the OCR finalized and settled 14 investigations of HIPAA breaches or complaints. TMLT risk management experts summarize the OCR findings and lessons learned.
TMLT risk management experts Cathy Bryant and Kassie Toerner address risk assessments and current standards expected by the Health and Human Services Office for Civil Rights.
Watch this webinar recording to learn what’s covered in a cyber claim: cyber extortion; damaged, corrupted, or lost data; and business interruption.
A discussion of cyber risks, including business interruption; regulatory fines and penalties; data recover; and notifying patients about a privacy breach.
Cyber attorney Adrian Senyszyn answers FAQs about cyber security, current cyber threats, HIPAA, and breach investigations.
Our increased use of teleconferencing has created new opportunities for cyber criminals to hack into video calls.
Learn about the current cyber security landscape, what your cyber insurance policy should cover, and more.
The hospital received an email invoice from the ED group with instructions to send payment to a new account.
HHS OCR announced it will waive potential HIPAA penalties against health care providers using telehealth services to care for patients during the COVID-19 national emergency.
HIPAA and public health emergencies: updates from the OCR
John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.
Learn the most important steps to take following a cyber incident or breach.
Providers can take these steps after an attack to help preserve evidence.