Ransomware Protection & Response for Clinical Labs, Hospitals, and Pathology Groups: Effective Steps for Protecting Your LIS, EHR, and Other IT from an Encryption Attack
How serious is the threat of a ransomware attack to your clinical lab or pathology group?
The lack of awareness and information about what is really happening puts clinical labs and pathology groups at great risk and underprepared. This is why the Dark Daily webinar, Ransomware Protection & Response for Clinical Labs, Hospitals, and Pathology Groups: Effective Steps for Protecting Your LIS, EHR, and Other IT from an Encryption Attack, is a must-attend—not only for you, but for everyone in your hospital, health system, or clinical laboratory that will be working to prevent a ransomware attack or involved in restoring digital services following such an attack. The 90-minute webinar takes place on Thursday, August 19, 2021, at 1 p.m. Eastern, and will be available on-demand after.
- Legal issues triggered by a ransomware attack: What to do both when an incident is not a breach and when it is a breach.
- Your obligations in response to a ransomware attack: HIPAA privacy and other regulatory rules, contractual arrangements (e.g., reference labs), and crisis communication to patients and other stakeholders
- Forensic investigations: What happens after an incident and/or breach and when to conduct a risk analysis walkthrough
- Three essential proactive breach mitigation strategies
- Effective policies, procedures, and training that providers—particularly clinical laboratories and anatomic pathology practices—should have in place now
- Signs of an incident and methods of intrusion
- Data and analytics from real-world ransomware cases
- Approaches to information technology response and resources providers will need following encryption of IT systems
- How to establish an effective ransomware attack incident response team and incident response
- Legal analysis and case study of a ransomware attack on a clinical laboratory and the decision-making steps involved
- Best practices for responding to and negotiating with the ransomware perpetrators—including the expected “etiquette” in dealing with cybercriminals—and collaborating with consultants who are experienced with how to deal with ransomware demands