HIPAA, Ransomware & Cyber Criminal Chaos - Prepare, Prevent, Respond and Recover - Recorded Webinar

0 0 Reviews
Webinar Duration: 90 minutes

RECORDED: Access recorded version only for one participant; unlimited viewing for 6 months (Access information will be emailed 24 hours after the completion of payment)


This webinar will explain about Ransomware attack on a Covered Entity or BA that encrypts PHI is presumed to be a HIPAA Breach according to the U. S. Department of Health and Human Services (HHS).

- Ransomware including new, more treacherous varieties used by cyber-criminals to attack the Healthcare Industry
- HIPAA Rules that apply to Ransomware attacks
- "Social Engineering" tricks criminals use to sneak Ransomware into Electronic Information Systems
- What to do if your organization suffers a Ransomware attack
- Best practices to:
- Prevent
- Prepare
- Respond
- Recover from Ransomware Attacks

Why should you Attend: Healthcare is the biggest target for Ransomware attacks in 2017. New types of Ransomware are particularly dangerous. They not only lock up your information system - they steal Protected Health Information (PHI).Covered Entities and Business Associates of all types and sizes are prime Ransomware targets because disruption of healthcare operations, even for a brief period, can result in catastrophic harm to patients. Criminal hackers don't need to be sophisticated technology to mount a Ransomware attack - they simply trick employees to open a "phishing" email or click on an Internet link. Ransomware is the easiest and safest way for cyber-criminals to extort money from the Healthcare Industry.

Areas Covered in the Session:
- Introduction - Course Agenda and Objectives
- What is Ransomware?
- Why is the Healthcare Industry a Prime Target?
- HIPAA Law and HIPAA Rules that apply to Ransomware Attacks
- Covered Entity - Business Associate Relationship, Responsibilities, Interdependent Liabilities
- What to Do if (when) your organization suffers a Ransomware Attack
- Preliminary Description - HIPAA Breach Risk Assessment
- Best Practices to Prevent a Ransomware Attack
- How to Prepare for a Ransomware Attack
- How to Respond to a Ransomware Attack
- To pay or not to pay?
- Law Enforcement
- How to Recover from a Ransomware Attack
- How to do a HIPAA Breach Risk Assessment - Demonstration
- What to do if the Ransomware Attack caused a HIPAA Breach
- Step-by-Step Breach Notification Requirements
- Documentation
- Notifications - Fewer than 500 Individuals affected
- Notifications - More than 500 Individuals affected
- Questions, Answers, Discussion

Learning objectives: How to use the HIPAA Rules to Prevent, Prepare, Respond and Recover from Ransomware Attacks

Who Will Benefit:
- Health Care Providers - Hospitals
- Multi-Specialty Medical Groups
- Nursing Homes
- Long Term Care - Assisted Living Facilities
- Physicians (M.D.s and D.O.s)
- Dentists
- Optometrists
- Chiropractors
- Physical Therapists
- Podiatrists
- Health Plans including Employer Sponsored Health Plans
- Third Party Administrators - Insurance Brokers
- Healthcare Practice Administrator Companies
- Healthcare Record Storage and Retrieval Companies
- All Business Associates of Health Care Providers and Health Plans

Paul R. Hales received his Juris Doctor degree from Columbia University Law School and is licensed to practice law before the Supreme Court of the United States. He is an expert on HIPAA Privacy, Security, Breach notification and Enforcement Rules with a national HIPAA consulting practice based in St. Louis. Paul is the author of all content in The HIPAA E-Tool, an Internet-based, Software as a Service product for health care providers and business associates.

After your payment, we will contact you with instructions about how to access the webinar.
Delivery in 7 day(s)