This webinar for HIPAA Covered Entities and Business Associates explains how to use the HIPAA Rules to Prevent, Prepare, Respond and Recover from Ransomware Attacks. There is a secret to HIPAA Compliance. The secret is the HIPAA Rules are easy to follow, step-by-step, when you know the steps. Attend this session to see the HIPAA Rules in action - steps that are your blueprint to prevent, prepare for, respond to and recover from a Ransomware Attack - all explained clearly in plain language.
Objectives of the Presentation
Ransomware described - new ransomware threats and old ransomware tricks that still work
Why ransomware criminals target the healthcare industry
The key HIPAA rules to prevent - prepare - respond - recover from a ransomware attack
What to do if (when) your organization suffers a ransomware attack
To Pay or Not to Pay? - And most important - how to avoid having to make the choice because you are prepared
Why Should you Attend
Cyber Threats to the Security of Health Information are at Crisis levels. The latest threats are caused by two security flaws called "Meltdown" and "Spectre" in nearly all "chips" - microprocessors installed in electronic devices like computers, smartphones and tablets. Meltdown and Spectre, could allow hackers to lift passwords, photos, documents and other data from electronic devices and cloud computing services used by the entire Healthcare Industry. Healthcare continues to be the biggest target for Criminal Ransomware attacks and new types of Ransomware are particularly dangerous. They not only lock up your information system - they steal Protected Health Information (PHI). Covered Entities and Business Associates of all types and sizes are prime targets because disruption of healthcare operations, even for a brief period, can result in catastrophic harm to patients. Criminal hackers don´t need to be sophisticated to mount an attack - they simply trick employees to open a "phishing" email or click on an Internet link. Ransomware is the easiest and safest way for cyber-criminals to extort money from the Healthcare Industry.
You should attend this session to learn how to find and follow the HIPAA Rules which provide an easy, step-by-step guide to prevent, prepare for, respond to and recover from a Cyber Attack.
Who will Benefit
Health Care Practice and Business Associate Owners, Chief Executive Officers, Chief Operating Officers, Chief Compliance Officers, Chief Information Officers, Chief Information Security Officers, Compliance Officials, Risk Management Directors, HIPAA Compliance Officials, HIPAA Privacy Officers, HIPAA Security Officers, Information Technology Supervisors, General Counsel - Associate General Counsel, Attorney, Certified Public Accountants