X
GO
Search HITEQ Resources
Strategic Cybersecurity Breach Protection and Incident Response

Strategic Cybersecurity Breach Protection and Incident Response

Guidance and Resources for Health Centers

General cybersecurity guidance would suggest that Health IT breach should not be considered a matter of “if”, but rather a matter of “when”. How an organization prepares and responds to an episode of breach is just as important as defending itself from breach. Unfortunately, Health Centers are perceived as a domain with high potential for data breach, and consequently it is critical for Health Center leadership to embrace breach mitigation and incident response planning across their entire organization vs being a matter to be addressed by their Health IT team. Breach can occur through both internal and external network leaks, through malware such as ransomware and through physical means on site. This is Part 2 of the Health Center Defense Against the Dark Web presentation series. This presentation provides general knowledge about breach mitigation and planning strategies for incident response.

Learning objectives:

-          Increased understanding of key aspects of breach incidence, notification requirements, and response

-          Improved ability to document security incidences and plan for effective breach response situations

-          Identification of 1-3 specific resources from the HITEQ Center knowledgebase that can improve their ability to plan, mitigate, and respond to incidences of breach

Previous Article Health Center Defense Against the Dark Web Presentation
Next Article Advancing HIV Screening and Treatment: A Health Center’s Experience
Print
13059
Intended AudienceHealth Center IT Leadership, All Health Center Staff, Health IT Staff, Privacy & Security Staff

Documents to download

Leave a comment

This form collects your name, email, IP address and content so that we can keep track of the comments placed on the website. For more info check our Privacy Policy and Terms Of Use where you will get more info on where, how and why we store your data.
Add comment