Other content in this Stream
Requirements for physicians under state and federal laws
Case studies about ransomware incidents and the investigations that follow.
How to recognize phishing emails and other cyber criminal activities
Connected devices generate and store data, posing serious security and privacy concerns.
John Southrey, director of consulting services at TMLT, describes cyber extortion threats, like ransomware, and what to do if you receive this kind of threat.
Factors to consider when using remote patient monitoring.
A hospital received an email invoice from their ED group with instructions to send payment to a new account.
Learn about email security issues from a cyber security attorney.
10 ways that physician practices are vulnerable to cyber attacks
Take these steps after an attack to help preserve evidence.
Learn what’s covered in a cyber claim: cyber extortion; lost data; and business interruption.
What happens when a system failure brings down the EMR?
Tips and and practices to help you defend against cyber criminals . . .
Protecting sensitive data involves a variety of physical safeguards.
A ransomware action plan could help preserve data and limit the extent of a breach.