Iinformation Security In A Healthcare Setting - Safeguarding Electronic Protected Health Information From
Ransomware And Other Threats
Could your organization operate if all of your data was inaccessible? Ransomware, a form of malware, encrypts files such as documents and photos, and requires a ransom be paid in order to decrypt the files. Harvard Business Review says, “The Best Cybersecurity Investment You Can Make Is Better Training. Spending millions on security technology can certainly make an executive feel safe. But the major sources of cyber threats aren’t technological. They’re found in the human brain, in the form of curiosity, ignorance, apathy, and hubris. These human forms of malware can be present in any organization and are every bit as dangerous as threats delivered through malicious code.” And since it’s impossible to prevent every attack, we’ll also discuss how to respond to an incident.
Topics:
Risk Management
Information Security Policy
Securing Electronic Protected Health Information (ePHI)
Software Patch Management
Password Management
Mobile Device Security
Endpoint Security
Data Backup & Recovery
Securing Cloud Services
Secure Web Browsing
Securing Email
Securing Social Media
Securing Remote Employees
Incident Response
Business Continuity Planning
Secure Software Development
Securing IT Infrastructure
Securing Medical Devices
Securing Industrial Control Systems
Physical Security
Security Awareness