This HIPAA Cyber Crime Training will discuss how to use the HIPAA rules to prevent, prepare, respond and recover from Cyber Attack , Ransomware is the easiest and safest way for cyber-criminals to extort money from the Healthcare Industry.
This webinar for HIPAA Covered Entities and Business Associates explains how to use the HIPAA Rules to Prevent, Prepare, Respond and Recover from Cyber Attacks.
Why should you Attend:
Cyber Threats to the Security of Health Information are at Crisis levels. The latest threats are caused by two security flaws called "Meltdown" and "Spectre" in nearly all "chips" - microprocessors installed in electronic devices like computers, smartphones and tablets. Windows, Linux, iOS, MacOS, tvOS, Android and nearly all operating systems are affected by these vulnerabilities. Meltdown and Spectre, could allow hackers to lift passwords, photos, documents and other data from electronic devices and cloud computing services used by the entire Healthcare Industry.
Meltdown and Spectre add to a list of Cyber-Threats that, today, are more dangerous to the Healthcare Industry like Ransomware.
Healthcare is continues to be the biggest target for Criminal Ransomware attacks and new types of Ransomware are particularly dangerous. They not only lock up your information system - they steal Protected Health Information (PHI). Covered Entities and Business Associates of all types and sizes are prime Ransomware targets because disruption of healthcare operations, even for a brief period, can result in catastrophic harm to patients. Criminal hackers don't need to be sophisticated technology to mount a Ransomware attack - they simply trick employees to open a "phishing" email or click on an Internet link. Ransomware is the easiest and safest way for cyber-criminals to extort money from the Healthcare Industry.
A Ransomware attack on a Covered Entity or BA that encrypts PHI is presumed to be a HIPAA Breach according to the U. S. Department of Health and Human Services (HHS). The public, law enforcement and elected officials are alarmed and many are outraged by continuous, serious breaches of Health Information and medical identity theft. More than 170 million Americans have been victimized since OCR began to keep count in 2009. The largest Breach affecting 78.8 Million Americans happened when an Anthem employee was tricked by a Phishing Email. Organizations experiencing breaches or committing violations suffered significant financial loss and significant, ongoing damage to their reputations - whether they are nationally known or locally prominent.
The HIPAA Rules are a blueprint to prevent, prepare for, respond to and recover from a Cyber Attack. Some think HIPAA is complex, impossible to understand or follow. We think differently. The secret is the HIPAA rules are easy to follow step-by-step when you know the steps. You should attend this session to see the blueprint and learn how to find and follow the HIPAA Rules easily, simply, step-by-step to prevent, prepare for, respond to and recover from a Cyber Attack.
Areas Covered in the Session: