New Search

If you are not happy with the results below please do another search

96 search results for: cybersecurity

91

Best Practices for Implementing PHI Security

[vc_row][vc_column][vc_video link=”https://youtu.be/d_kMo9eLvyQ”][vc_column_text]William McBorrough is co-Founder and Chief Security Advisor at MCGlobalTech. This presentation will review security trends in the healthcare industry over the last year and present current top cybersecurity threats to healthcare organizations and patients. The audience will also learn strategies and best practices for combating those threats and protecting patients. Objectives: 1. Provide […]

92

First Healthcare Compliance to co-host 2nd Annual Healthcare Compliance Symposium on April 4, 2019

The Healthcare Compliance Symposium 2019 will bring professionals from the healthcare and legal communities together for a day of discussion and learning on the campus of Delaware Law School. Seven industry experts will provide helpful insight on timely topics including cybersecurity, human resources challenges, telemedicine, exclusions, and ethics while instructing and leading interactive discussions among attendees to answer common questions and provide practical tips.

95

Preventing a HIPAA Breach – Phishing Attacks and Access

Your organization’s security risk analysis and security awareness training are the best defense against nefarious cyber criminals.  In reviewing breaches from 2017, cyberattacks with ransomware brought organizations to a standstill if they lacked a pre-emptive back-up plan for the data hostage situation; a few had no choice but to succumb to the hackers’ payment demands. […]

96

First Healthcare Compliance Podcast- Unauthorized Access with Ray Ribble

Catherine Short, Partnership Marketing Specialist at First Healthcare Compliance, hosts Ray Ribble, founder of SPHER Inc. a healthcare cybersecurity company, for an interactive discussion on “Addressing Unauthorized Access – Knowing who is looking at your PHI.” This podcast focuses on a discussion of the current landscape as it relates to unauthorized access of patient PHI within […]