||"This Course is approved for 1 general credit from the Nevada Board Of Continuing Legal Education."
This webinar will explain about Ransomware attack on a Covered Entity or BA that encrypts PHI is presumed to be a HIPAA Breach according to the U. S. Department of Health and Human Services (HHS).
Why should you Attend:
- Ransomware including new, more treacherous varieties used by cyber-criminals to attack the Healthcare Industry
- HIPAA Rules that apply to Ransomware attacks
- "Social Engineering" tricks criminals use to sneak Ransomware into Electronic Information Systems
- What to do if your organization suffers a Ransomware attack
- Best practices to:
- Recover from Ransomware Attacks
Healthcare is the biggest target for Ransomware attacks in 2017. New types of Ransomware are particularly dangerous. They not only lock up your information system - they steal Protected Health Information (PHI).Covered Entities and Business Associates of all types and sizes are prime Ransomware targets because disruption of healthcare operations, even for a brief period, can result in catastrophic harm to patients. Criminal hackers don't need to be sophisticated technology to mount a Ransomware attack - they simply trick employees to open a "phishing" email or click on an Internet link. Ransomware is the easiest and safest way for cyber-criminals to extort money from the Healthcare Industry.
Areas Covered in the Session:
- Introduction - Course Agenda and Objectives
- What is Ransomware?
- Why is the Healthcare Industry a Prime Target?
- HIPAA Law and HIPAA Rules that apply to Ransomware Attacks
- Covered Entity - Business Associate Relationship, Responsibilities, Interdependent Liabilities
- What to Do if (when) your organization suffers a Ransomware Attack
- Preliminary Description - HIPAA Breach Risk Assessment
- Best Practices to Prevent a Ransomware Attack
- How to Prepare for a Ransomware Attack
- How to Respond to a Ransomware Attack
- To pay or not to pay?
- Law Enforcement
- How to Recover from a Ransomware Attack
- How to do a HIPAA Breach Risk Assessment - Demonstration
- What to do if the Ransomware Attack caused a HIPAA Breach
- Step-by-Step Breach Notification Requirements
- Notifications - Fewer than 500 Individuals affected
- Notifications - More than 500 Individuals affected
- Questions, Answers, Discussion
How to use the HIPAA Rules to Prevent, Prepare, Respond and Recover from Ransomware Attacks
Who Will Benefit:
- Health Care Providers - Hospitals
- Multi-Specialty Medical Groups
- Nursing Homes
- Long Term Care - Assisted Living Facilities
- Physicians (M.D.s and D.O.s)
- Physical Therapists
- Health Plans including Employer Sponsored Health Plans
- Third Party Administrators - Insurance Brokers
- Healthcare Practice Administrator Companies
- Healthcare Record Storage and Retrieval Companies
- All Business Associates of Health Care Providers and Health Plans