Cybersecurity Online Resources
Online Cybersecurity resources are provded for healthcare providers to minimize the risk of a cyber security attack.
-
TokioMarine CyberNET
The LHA Trust Funds Tokio Marine CyberNET Support provides continually updated information, on-demand advice and a wide range of cyber risk management resources. This member-only toolkit portal provides access to legal advice, email alerts, webinars and comprehensive online training for risk managers and employees.
Available on our CHER Online Education Portal.
-
The Office of the National Coordinator for Health Information Technology
The ONC provides resources in Health IT efforts and the promotion of health information exchange networks as a way to improve patient care.
-
National Cyber Awareness System
The National Cyber Awareness System provides realtime alerts, analysis reports and current activites in cyber security issues.
-
American Hospital Association: Cybersecurity
AHA provides resources in cybersecurity vulnerabilities for healthcare organizations.
-
TRACIE: Healthcare Emergency Preparedness Information Gateway
TRACIE provides resources in emergency preparedness for healthcare facilities in the area of cybersecurity.
-
RECOGNIZE How You Can Notice the Warning Signs of Violence
This form distinguishes changes in behavior, patterns that lead to this behavior, and how to identify them.
-
ASSESS How to Navigate the Risk When Someone is Escalating
This paper assists in knowing how to assess triggers, including self-presentation and early identification of changes in a patient’s behavior to de-escalate a situation and handle a threat.
-
PATHWAY TO VIOLENCE: WARNING SIGNS AND WHAT YOU CAN DO
This factsheet from CISA (Cybersecurity & Infrastructure Security Agency) provides a pathway related to warning signs, prevention, and interventions to handle violence.
A series on de-escalation, including recognizing, assessing, de-escalating, and reporting suspicious or escalating behaviors, including factors that trigger this type of behavior.
-
DE-ESCALATE How You Can Help Defuse Potentially Violent Situations
This attachment teaches how to manage these behaviors with appropriate responses through communication, gestures and the demeanor utilized to control the event.
-
REPORT How to Engage Your Organization and Community
This document assists in identifying a viable threat and using the proper channels to report an emergency incident to appropriate authorities.
-
CISA Releases Guidance on Credential Risks Associated with Potential Legacy Oracle Cloud Compromise
A guide on compromised credential material. It includes elements that help recognize risks and strategies to mitigate these risks.