Cyber security
Protect your practice from cyber criminals. Take a look at our cyber liability coverage and other cyber security resources.
-
Risk alert: U.S. bans Kaspersky software
Software widely used for antivirus protection
-
Risk alert: Medical records phishing scams
Review records requests for signs of fraud
-
Q&A on medical record privacy and security
Requirements for physicians under state and federal laws
-
Case briefs — Ransomware
Case studies about ransomware incidents and the investigations that follow.
-
Case briefs — HIPAA
Case studies about violations of HIPAA privacy rules.
-
Ransomware attacks
Keep your practice safe from cyber criminals
-
Keeping your email secure
How to recognize phishing emails and other cyber criminal activities
-
EHR best practices
Reduce risk when using your EHR
-
Have a cyber question?
Ask our experts -
The Internet of things
Connected devices generate and store data, posing serious security and privacy concerns.
-
Remote patient monitoring — Risk management considerations
Factors to consider when using remote patient monitoring.
-
Cyber fraud case study: Failure to recognize phishing email
A hospital received an email invoice from their ED group with instructions to send payment to a new account.
-
1:05:33
The problem with email
Learn about email security issues from a cyber security attorney.
-
10 things that compromise patient data
10 ways that physician practices are vulnerable to cyber attacks
-
The Reporter Cyber Edition 2020
How to avoid email fraud; Beware of ransomware; What business interruption really means; Cyber liability cases and claims; About cyber liability insurance
-
Preserving evidence is vital in a ransomware attack
Take these steps after an attack to help preserve evidence.
-
A group admin explains what business interruption really means
What happens when a system failure brings down the EMR?
-
Protect your information from cyber thieves
Tips and and practices to help you defend against cyber criminals . . .
-
Cyber security: Physical safeguards are important too
Protecting sensitive data involves a variety of physical safeguards.
-
How to dispose of storage devices containing PHI and other sensitive data
Improper disposal of electronic devices increases the risk of a breach.
-
Cyber criminals launching more professional attacks
Cybercriminals are employing customer service tactics to engage with their victims.
-
Loading More...