Describe cybersecurity measures related to HIPAA.
Description should include
-
- HHS guidance for covered entities
- OCR monthly newsletter
- threat of medical identity theft
- threat of ransomware
- FACT SHEET: Ransomware and HIPAA (https://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf?language=es Links to an external site.)
- HHS Cybersecurity Newsletter Archives (https://www.hhs.gov/hipaa/for-professionals/security/guidance/cybersecurity/cybersecurity-newsletter-archive/index.html Links to an external site.)
- Cyber-Attack Checklist (https://www.hhs.gov/sites/default/files/cyber-attack-checklist-06-2017.pdf Links to an external site.)
- Cyber-Attack Quick Response (https://www.hhs.gov/sites/default/files/cyber-attack-quick-response-infographic.gif Links to an external site.)
- Federal Trade Commission’s FAQ on Medical Identity Theft (https://www.ftc.gov/system/files/documents/plain-language/bus75-medical-identity-theft-faq-health-care-health-plan.pdf Links to an external site.).
Teacher Resources:
- Links to an external site.The hospital held hostage by hackers (https://www.cnbc.com/2016/02/16/the-hospital-held-hostage-by-hackers.html Links to an external site.), CNBC
- Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem (https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4516335 Links to an external site.), Dove Press
- The biggest healthcare data breaches of 2018 (so far) (https://www.healthcareitnews.com/projects/biggest-healthcare-data-breaches-2018-so-far Links to an external site.), Healthcare IT News
Process/Skill Questions:
-
-
- What are dumpster diving, shoulder surfing, social engineering, and tweaking?
- What are the cyber risks related to the use of personal devices in the healthcare setting?
- What are the steps to securing transactions on personal devices?
-