HITEQ Center, March 2025
The exercise cards in this set present scenarios and response-related questions designed to provide a quick (5–10 minute) method for health center staff to: Refresh knowledge of the content in their emergency and cyber incident response plans; Examine and troubleshoot procedures in their emergency and cyber incident response plans; Identify improvements to their emergency and cyber incident response plans; and Increase staff capacity to operationalize the actions outlined in their...
NCTRC Webinar
This presentation from NCTRC will introduce Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), the Health Sector Coordinating Council, and the joint CISA/HHS Cybersecurity Toolkit. We’ll cover cybersecurity resources available to telehealth providers, including vulnerability scanning, cyber risk assessments, and training at no cost.
Updated January 2025
Ready to take the next step towards enhanced IT preparedness? The resources linked below, organized by topic, share actionable strategies that health centers can implement to move towards greater resilience.
A Case Study of the Family Health Center of Worcester’s Ransomware Incident, February 2024
The use of ransomware — malicious software that restricts access to computer systems with financial demands — has escalated, targeting health centers and putting countless lives at risk. This dire reality came to the forefront during the alarming ransomware attack on the Family Health Center of Worcester, Inc. (FHCW), where the personal health information and care continuity for thousands of patients were compromised. This resource uses FHCW's experience as a case study to demonstrate the...
HITEQ Highlights Webinar
In this HITEQ Highlight, we aim to strengthen Health Centers' capacity to build their cyber-resiliency. We will cover risk management tools, methods for guarding against cybersecurity assaults, operationalizing cybersecurity to mitigate risks, and breach mitigation tactics. Participants will focus on safeguarding data across the entire enterprise and examine approaches to implementing cybersecurity infrastructure through risk management frameworks and strategic risk assessment. This...