Healthcare Compliance Software

Snooping Webinar

How to Prevent Employee Snooping and Insider Threats – Audio Version of the Webinar

Raymond Ribble is the CEO and Founder at SPHER, Inc. a market-leading compliance analytics, cyber-security solution addressing: HIPAA compliance, State Privacy Laws, and ePHI security threats and our presenter for this webinar. Snooping and Insider threats are exactly why user monitoring and ePHI access strategies are vital to the security of sensitive patient information and data protection. While it is an unsettling thought, not all cybersecurity incidents are traced from employee negligence. With so much attention and money surrounding cybersecurity in the healthcare industry, malicious employees may decide to purposefully disclose patient information. Since employees and contractors may have knowledge of your network setup, vulnerabilities, and access codes, snooping employees with malicious intent hold the key to exposing your organization to a series of unwanted risks and threats.

Combating Ransomware in Healthcare

Combating Ransomware in Healthcare: Audio Version of the Webinar

First Healthcare Compliance hosts William J McBorrough, co-Founder and Chief Security Advisor at MCGlobalTech, a Washington, D.C.-based Information Security Consulting Firm for an interactive discussion on “Combating Ransomware in Healthcare.” Ransomware attacks have impacted thousands of organizations worldwide. The healthcare sector has been the most targeted. Join in to discuss the state of ransomware in the healthcare sector in 2021 and best practices to prepare your organization from the inevitable attacks.

Healthcare Cybersecurity Awareness Training

Healthcare Cybersecurity Awareness Training

Raymond Ribble, founder of SPHER, Inc. a leading SaaS-based compliance analytics solution addressing PHI protection and cybersecurity in healthcare, leads this informative webinar. This presentation takes the audience through a series of scenarios and lessons learned that can assist in securing the employee “endpoint” either in the office or at a Home Office. The presentation highlights key security measures a person can deploy to create a better security environment in order to protect their personal and professional documents from unauthorized access.

Menu