2015 was one of the biggest years for healthcare data breaches with more than 111 million records stolen. According to the 2016 Healthcare Data Breach Report, 98% of healthcare records compromised was due to hacking. The Anthem Inc. cyberattack was massive and made previous other attacks look small in comparison. All the major healthcare data breaches had one thing in common--- hackers! Don't expect the 2017 Healthcare Data Breach Report to show a decrease in cyberattack activity on healthcare entities.
Majority of the breaches reported to Office of Civil Rights in 2016 involved errors in judgement or negligence. Some examples include: loss of devices, theft of equipment, unauthorized disclosures and incorrect disposal of health records. Of course human error played a part in the exposure of data. However, hackers were still responsible for stealing the most records.
Many companies have taken out insurance policies to cover cyberattacks, but they will not always cover the considerable costs of data breaches. Health plan and healthcare patients also have to pay for a breach of their data. Hacker steal healthcare data and use the information to commit identity theft or sell the records on the black market to identity thieves. All too often healthcare data breach victims are stuck holding the bill with no remedy to claim back losses.
In this live online training by experienced security expert David Forrestall, you will receive clear guidance on the security standards and risks that inform how you should set forth, train and enforce HIPAA compliance and practical security policies. These policies will protect you and your employees legal consequences of a breach while protecting health plan members and patients from the financial consequences.
- Identify the most likely sources of privacy breaches
- Understand the policies and procedures to prevent the most common privacy breaches experienced
- Describe the necessity of involving staff to decrease the possibility of a HIPAA breach
- Gain familiarity with contractual terms to be used in business associate agreements to reduce the risk of a privacy breach occurring at the vendor level
A cybersecurity expert that will show you vulnerabilities of your organization's security and how to fix it.
- Two Types of Security with regards to HIPAA - Building Security and Electronic Security
- 3 Phases of Security - Prevention, Detection and Response
- Security Rule Compliance
- The Breach Process
- Sample of Reported Cases
- Sample Breach Cases
- Employer’s HIPAA Compliance Checklist
You Also Receive
- 1.25 hours continuing education credit
- Structured interactive experience to help you learn and retain
- Join from any computer or mobile device with Internet connection
- Handouts and references to print and share
- Complimentary lifetime updates on this topic
Your Avant Expert
David Forrestall is the founder of SecuIT360, an independent, cyber-only security consulting firm. He is a Business Professional with proven expertise in technology, security, finance, and operations. He has over 20 years of IT and business consulting experience, and has worked with clients in a wide range of industries. He has extensive experience working with all levels of management and staff. David has a strong history of helping clients identify areas for improvement and implement processes and technology leading to increased corporate efficiency and profitability.