TMLT hosted webinars and supporting documents.
48 hours after a HIPAA breach
The actions taken in the hours and days after a cyber breach are critical, especially in protecting evidence. In this webinar, attorney Adrian Senyszyn, discusses the most important steps that covered
NEXT WEBINAR: Auditing information systems activityLearn More
Preserving evidence Is vital in a ransomware attack
Providers can take steps following an attack to help preserve evidence, which may help them meet their burden of proof and conclude that there was a low probability of compromise to ePHI.
Is HIPAA relevant in 2019?
TMLT risk management experts Cathy Bryant and Kassie Toerner discuss the role HIPAA rules and regulations play for medical practices when dealing with online threats, risks, and vulnerabilities.
One thing physician practices must do now
In this webinar recording, TMLT risk management experts Cathy Bryant and Kassie Toerner discuss various risk assessments and current standards expected by the Health and Human Services Office for Civi