+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


HIPAA Cyber Crime - How to Prevent, Prepare, Respond and Recover - Webinar

  • ID: 4541091
  • Webinar
  • Region: Global
  • 60 Minutes
  • Online Compliance Panel
1 of 3
This webinar for HIPAA Covered Entities and Business Associates explains how to use the HIPAA Rules to Prevent, Prepare, Respond and Recover from Ransomware Attacks. There is a secret to HIPAA Compliance. The secret is the HIPAA Rules are easy to follow, step-by-step, when you know the steps. Attend this session to see the HIPAA Rules in action - steps that are your blueprint to prevent, prepare for, respond to and recover from a Ransomware Attack - all explained clearly in plain language.

Objectives of the Presentation

- Ransomware described - new ransomware threats and old ransomware tricks that still work
- Why ransomware criminals target the healthcare industry
- The key HIPAA rules to prevent - prepare - respond - recover from a ransomware attack
- What to do if (when) your organization suffers a ransomware attack
- To Pay or Not to Pay? - And most important - how to avoid having to make the choice because you are prepared

Why Should you Attend

Cyber Threats to the Security of Health Information are at Crisis levels. The latest threats are caused by two security flaws called "Meltdown" and "Spectre" in nearly all "chips" - microprocessors installed in electronic devices like computers, smartphones and tablets. Meltdown and Spectre, could allow hackers to lift passwords, photos, documents and other data from electronic devices and cloud computing services used by the entire Healthcare Industry. Healthcare continues to be the biggest target for Criminal Ransomware attacks and new types of Ransomware are particularly dangerous. They not only lock up your information system - they steal Protected Health Information (PHI). Covered Entities and Business Associates of all types and sizes are prime targets because disruption of healthcare operations, even for a brief period, can result in catastrophic harm to patients. Criminal hackers don't need to be sophisticated to mount an attack - they simply trick employees to open a "phishing" email or click on an Internet link. Ransomware is the easiest and safest way for cyber-criminals to extort money from the Healthcare Industry.

You should attend this session to learn how to find and follow the HIPAA Rules which provide an easy, step-by-step guide to prevent, prepare for, respond to and recover from a Cyber Attack.
Note: Product cover images may vary from those shown
2 of 3
  • Paul R. Hales Paul R. Hales,
    Attorney at Law ,
    Paul R. Hales, Attorney at Law, LLC

    Paul Hales J.D is an expert in HIPAA compliance law. Mr. Hales is a graduate of Columbia University Law School, licensed to practice before the Supreme Court of the United States, Federal Appellate and District Courts, and Missouri state courts. He specializes in compliance with HIPAA Privacy, Security, Breach Notification and Enforcement Rules and is the author of all content in The HIPAA E-Tool, an Internet-based, complete HIPAA compliance solution for health care providers and business associates.

Note: Product cover images may vary from those shown
3 of 3
  • Health Care Practice and Business Associate Owners
  • Chief Executive Officer
  • Chief Operating Officer
  • Chief Compliance Officer
  • Chief Information Officer
  • Chief Information Security Officer
  • Compliance Official
  • Risk Management Director
  • HIPAA Compliance Official
  • HIPAA Privacy Officer
  • HIPAA Security Officer
  • Information Technology Supervisor
  • General Counsel - Associate General Counsel
  • Attorney
  • Certified Public Accountant
Note: Product cover images may vary from those shown