Training Options Duration: 90 Minutes
Thursday, June 21, 2018 | 10:00 AM PDT | 01:00 PM EDT
Overview: This webinar will explain about Ransomware attack on a Covered Entity or BA that encrypts PHI is presumed to be a HIPAA Breach according to the U. S. Department of Health and Human Services (HHS).
Ransomware including new, more treacherous varieties used by cyber-criminals to attack the Healthcare Industry
HIPAA Rules that apply to Ransomware attacks
"Social Engineering" tricks criminals use to sneak Ransomware into Electronic Information Systems
What to do if your organization suffers a Ransomware attack
Best practices to:
Recover from Ransomware Attacks
Why should you Attend: Healthcare is the biggest target for Ransomware attacks in 2017. New types of Ransomware are particularly dangerous. They not only lock up your information system - they steal Protected Health Information (PHI).Covered Entities and Business Associates of all types and sizes are prime Ransomware targets because disruption of healthcare operations, even for a brief period, can result in catastrophic harm to patients. Criminal hackers don't need to be sophisticated technology to mount a Ransomware attack - they simply trick employees to open a "phishing" email or click on an Internet link. Ransomware is the easiest and safest way for cyber-criminals to extort money from the Healthcare Industry.
Areas Covered in the Session:
Introduction - Course Agenda and Objectives
What is Ransomware?
Why is the Healthcare Industry a Prime Target?
HIPAA Law and HIPAA Rules that apply to Ransomware Attacks
Covered Entity - Business Associate Relationship, Responsibilities, Interdependent Liabilities
What to Do if (when) your organization suffers a Ransomware Attack
Preliminary Description - HIPAA Breach Risk Assessment
Best Practices to Prevent a Ransomware Attack
How to Prepare for a Ransomware Attack
How to Respond to a Ransomware Attack
To pay or not to pay?
How to Recover from a Ransomware Attack
How to do a HIPAA Breach Risk Assessment - Demonstration
What to do if the Ransomware Attack caused a HIPAA Breach
Step-by-Step Breach Notification Requirements
Notifications - Fewer than 500 Individuals affected
Notifications - More than 500 Individuals affected
Questions, Answers, Discussion
Learning objectives: How to use the HIPAA Rules to Prevent, Prepare, Respond and Recover from Ransomware Attacks
Who Will Benefit:
Health Care Providers - Hospitals
Multi-Specialty Medical Groups
Long Term Care - Assisted Living Facilities
Physicians (M.D.s and D.O.s)
Health Plans including Employer Sponsored Health Plans
Third Party Administrators - Insurance Brokers
Healthcare Practice Administrator Companies
Healthcare Record Storage and Retrieval Companies
All Business Associates of Health Care Providers and Health Plans
Paul R. Hales received his Juris Doctor degree from Columbia University Law School and is licensed to practice law before the Supreme Court of the United States. He is an expert on HIPAA Privacy, Security, Breach notification and Enforcement Rules with a national HIPAA consulting practice based in St. Louis. Paul is the author of all content in The HIPAA E-Tool, an Internet-based, Software as a Service product for health care providers and business associates.
Price - $139
Netzealous LLC - MentorHealth
Phone No: 1-800-385-1607
Webinar Sponsorship: https://www.mentorhealth.com/control/webinar-sponsorship/
Follow us on : https://www.facebook.com/MentorHealth1
Follow us on : https://www.linkedin.com/company/mentorhealth/
Follow us on : https://twitter.com/MentorHealth1