Workplace Violence Tabletop Exercise (TTX) for Long-Term Care Facilities
If you’re already a CHUG member, log in to the Member Portal to register.
If you’re already a CHUG member, log in to the Member Portal to register.
If you’re already a CHUG member, log in to the Member Portal to register.
If you’re already a CHUG member, log in to the Member Portal to register.
If you’re already a CHUG member, log in to the Member Portal to register.
If you’re already a CHUG member, log in to the Member Portal to register.
If you’re already a CHUG member, log in to the Member Portal to register.
Health Care Providers have repeatedly been the target of malicious ransomware attacks as well as programs that lurk in EMR systems, skimming patient information sometimes for years without going detected.
CMS “encourages providers to consider cyber-security as an element in the development of their emergency plans, risk assessments and annual training exercises.” This Full Scale Exercise focuses on the organization's ability to coordinate and implement prevention, preparedness, response and recovery plans and capabilities pertaining to a significant cyber incident or a series of incidents.
Health Care Providers have repeatedly been the target of malicious ransomware attacks as well as programs that lurk in EMR systems, skimming patient information sometimes for years without going detected.
CMS “encourages providers to consider cyber-security as an element in the development of their emergency plans, risk assessments and annual training exercises.” This Full Scale Exercise focuses on the organization's ability to coordinate and implement prevention, preparedness, response and recovery plans and capabilities pertaining to a significant cyber incident or a series of incidents.
Health Care Providers have repeatedly been the target of malicious ransomware attacks as well as programs that lurk in EMR systems, skimming patient information sometimes for years without going detected.
CMS “encourages providers to consider cyber-security as an element in the development of their emergency plans, risk assessments and annual training exercises.” This Table Top Exercise focuses on the organization's ability to coordinate and implement prevention, preparedness, response and recovery plans and capabilities pertaining to a significant cyber incident or a series of incidents.