HIPAA Cyber Crime - How to Prevent, Prepare, Respond and Recover

Duration: 60 Minutes
Instructor: Paul R. Hales
Webinar Id: 801203


One Attendee
Unlimited Attendees ?

This HIPAA Cyber Crime Training will discuss how to use the HIPAA rules to prevent, prepare, respond and recover from Cyber Attack , Ransomware is the easiest and safest way for cyber-criminals to extort money from the Healthcare Industry.


This webinar for HIPAA Covered Entities and Business Associates explains how to use the HIPAA Rules to Prevent, Prepare, Respond and Recover from Cyber Attacks.

Why should you Attend: Cyber Threats to the Security of Health Information are at Crisis levels. The latest threats are caused by two security flaws called "Meltdown" and "Spectre" in nearly all "chips" - microprocessors installed in electronic devices like computers, smartphones and tablets. Windows, Linux, iOS, MacOS, tvOS, Android and nearly all operating systems are affected by these vulnerabilities. Meltdown and Spectre, could allow hackers to lift passwords, photos, documents and other data from electronic devices and cloud computing services used by the entire Healthcare Industry. Meltdown and Spectre add to a list of Cyber-Threats that, today, are more dangerous to the Healthcare Industry like Ransomware.

Healthcare is continues to be the biggest target for Criminal Ransomware attacks and new types of Ransomware are particularly dangerous. They not only lock up your information system - they steal Protected Health Information (PHI). Covered Entities and Business Associates of all types and sizes are prime Ransomware targets because disruption of healthcare operations, even for a brief period, can result in catastrophic harm to patients. Criminal hackers don't need to be sophisticated technology to mount a Ransomware attack - they simply trick employees to open a "phishing" email or click on an Internet link. Ransomware is the easiest and safest way for cyber-criminals to extort money from the Healthcare Industry.

A Ransomware attack on a Covered Entity or BA that encrypts PHI is presumed to be a HIPAA Breach according to the U. S. Department of Health and Human Services (HHS). The public, law enforcement and elected officials are alarmed and many are outraged by continuous, serious breaches of Health Information and medical identity theft. More than 170 million Americans have been victimized since OCR began to keep count in 2009. The largest Breach affecting 78.8 Million Americans happened when an Anthem employee was tricked by a Phishing Email. Organizations experiencing breaches or committing violations suffered significant financial loss and significant, ongoing damage to their reputations - whether they are nationally known or locally prominent.

The HIPAA Rules are a blueprint to prevent, prepare for, respond to and recover from a Cyber Attack. Some think HIPAA is complex, impossible to understand or follow. We think differently. The secret is the HIPAA rules are easy to follow step-by-step when you know the steps. You should attend this session to see the blueprint and learn how to find and follow the HIPAA Rules easily, simply, step-by-step to prevent, prepare for, respond to and recover from a Cyber Attack.

Areas Covered in the Session:

  • Top Cyber Threats
  • Ransomware - New Ransomware threats and old Ransomware tricks that still work
  • Why Cyber Criminals target the Healthcare Industry
  • The Key HIPAA Rules to Prevent - Prepare - Respond - Recover from a Cyber Attack

Who Will Benefit:
  • Health Care Practice and Business Associate Owners
  • Chief Executive Officer
  • Chief Operating Officer
  • Chief Compliance Officer
  • Chief Information Officer
  • Chief Information Security Officer
  • Compliance Official
  • Risk Management Director
  • HIPAA Compliance Official
  • HIPAA Privacy Officer
  • HIPAA Security Officer
  • Information Technology Supervisor
  • General Counsel - Associate General Counsel
  • Attorney
  • Certified Public Accountant

Speaker Profile
Paul R. Hales, J.D. is widely recognized for his expert knowledge and ability to explain the HIPAA Rules clearly in plain language. Paul is an attorney licensed to practice before the Supreme Court of the United States and a graduate of Columbia University Law School with an international practice in HIPAA privacy and security. He is the author of all content in The HIPAA E-Tool®, an Internet-based, complete HIPAA compliance solution with separate editions for Covered Entities, Business Associates, Health Plans and Third Party Administrators.

You Recently Viewed