Thank you for subscribing to CYBER @TMLT
Error - something went wrong!
WEBINAR: Budgeting for HIPAA & Cyber SecurityLearn More
Other content in this Stream
48 hours after a HIPAA breach
The actions taken in the hours and days after a cyber breach are critical, especially in protecting evidence. In this webinar, attorney Adrian Senyszyn, discusses the most important steps that covered
Is HIPAA relevant in 2019?
TMLT risk management experts Cathy Bryant and Kassie Toerner discuss the role HIPAA rules and regulations play for medical practices when dealing with online threats, risks, and vulnerabilities.
Podcast: Tips, trends, and understanding your cyber insurance
Learn about the current cyber security landscape, what your cyber insurance policy should cover, and more.
Law enforcement exceptions to HIPAA
If you suspect one of your patients may harm himself or others, can you report your suspicions to the police without violating patient privacy?
Anthem pays $16 million HIPAA penalty
Anthem will pay $16 million after cyber attacks exposed the ePHI of 79 million people
Case Closed: HIPAA and patient privacy
This presentation is a case study based on alleged violations of HIPAA privacy rules.
HHS releases voluntary cyber security practices
HHS released voluntary cyber security practices to the health care industry with the aim of providing practice guidelines to reduce cyber security risks.
Guidelines for the release of medical records
It is imperative to have a system in place that allows the release of complete, legible, and organized records from your medical office.
How to dispose of storage devices containing PHI and other sensitive data
Improper disposal of electronic devices and media puts the information stored on those devices at risk for a breach. And when devices contain protected health information (PHI), it puts your patient’s
What we can learn from MD Anderson's $4.3 million HIPAA penalty
MD Anderson Cancer Center was recently fined for HIPAA violations. Let's go behind the headlines and take a look at the case.
Why the Facebook scandal should have you analyzing your third-party vendors
How to Encrypt Your Smartphone
Your mobile phone comes equipped with tools for encryption that take a few minutes to an hour to initiate and add an important layer of security to your device.
The Internet of Things
Connected devices generate and store data for their various functions, posing serious security and privacy concerns.
TMLT Offers New Risk Assessment Options
TMLT now offers the following options for fee-for-service risk assessments: HIPAA Solution, HIPAA Mock Audit, and Comprehensive Risk Assessment.
Reporter 2017 General Surgery
Failure to monitor vitamin levels after bariatric surgery; HIPAA and patient privacy
HIPAA and the Opioid Crisis
On October 27, the HHS Office for Civil Rights issued guidance on how HIPAA allows information sharing to respond to the opioid crisis.
Cyber Security: Back to Basics
Basic cyber security tips and responsibilities.
Reporter 2017 Anesthesiology
Failure to protect the airway; HIPAA and patient privacy
Disjunction in Health Care Data Security
Data security and control of information in health care lag behind other industries.
Reporter 2017 Pediatrics