Skip to Content

Blogs By Michele Tran

Top 5 Types of Data Breaches in Healthcare – Not from Hacking

Healthcare is now the top industry for cyber attacks. Health records, much of which remain valid and exploitable for years, contain valuable information for hackers. Credit card data, email addresses, social security numbers, employment information and medical history records can be used in many instances of fraud or identity theft. But healthcare data breaches are  Continue Reading »

5 Questions to Ask About your Cyber Security Insurance to Reduce Losses After a Cyber Attack

Cyber security placed first in a list of emerging casualty risks among insurance buyers according to a survey of 135 insurance professionals conducted by London-based specialty lines broker RKH Specialty. 70 percent of respondents put cyber risk in the top spot. According to a Best’s News Service Article* about the survey, healthcare and retailers have  Continue Reading »

5 Common Mistakes Made by Healthcare Facilities after a Cyber Breach

Most healthcare entities do not have a plan in place to respond to and handle a cyber breach. There is a lot of confusing information going around – by people who may not be experts. Here are the most common errors made by healthcare organizations when secure data is compromised: Mistake #1 Hiring an attorney who lacks  Continue Reading »

5 Steps Healthcare Providers Can Take to Protect Their Computer Systems

As the healthcare industry adopts electronic medical records and increasingly relies on technology, providers and facilities face new challenges in protecting patient information and minimizing their exposure to cyber risks. The healthcare industry is the most targeted and the least prepared industry when it comes to cyber attacks. Criminal hacking is now the leading cause  Continue Reading »

5 Dangerous Misconceptions About Cyber Liability Exposures

Misconception #1 Cyber breaches are mostly a result of foreign offshore sophisticated hackers who are only targeting large retail and healthcare systems. In reality, the most common types of breaches are: Lost, stolen or missing electronic assets Improper disposal of data Paper documents not shredded File cabinets with sensitive contents Prescription bottles X-Ray images Electronic  Continue Reading »