
Sign up to save your podcasts
Or


Jeffery Daigrepont and Dan Stewart join Mark to discuss healthcare information technology (HCIT) and the current state of cybersecurity for the healthcare industry. Jeffery and Dan describe the cybersecurity landscape in healthcare, why cybercriminals are targeting healthcare providers, and the importance of security risk assessments and security programs.
Contact Information
Subscribe to our feed in Apple Podcasts, Google Podcasts, Spotify, or your preferred podcast provider. Like what you hear? Leave a review! Not there? Let us know!
We welcome all feedback from our listeners. Please submit questions on any of the topics we discuss or about issues that interest you. You can also recommend topics for future episodes.
Episode Synopsis
Jeffery and Dan cover ten questions about healthcare cybersecurity and security risk assessments for healthcare providers.
Cybersecurity Extras
What is Your Battle Plan to Fight Cybercrime?
Podcast: How to Adopt Cybersecurity Best Practices
Blog: Five Tips to Keep Your Data Safe
Blog: 3 Critical Elements for Building an Effective Human Firewall
By Coker5
99 ratings
Jeffery Daigrepont and Dan Stewart join Mark to discuss healthcare information technology (HCIT) and the current state of cybersecurity for the healthcare industry. Jeffery and Dan describe the cybersecurity landscape in healthcare, why cybercriminals are targeting healthcare providers, and the importance of security risk assessments and security programs.
Contact Information
Subscribe to our feed in Apple Podcasts, Google Podcasts, Spotify, or your preferred podcast provider. Like what you hear? Leave a review! Not there? Let us know!
We welcome all feedback from our listeners. Please submit questions on any of the topics we discuss or about issues that interest you. You can also recommend topics for future episodes.
Episode Synopsis
Jeffery and Dan cover ten questions about healthcare cybersecurity and security risk assessments for healthcare providers.
Cybersecurity Extras
What is Your Battle Plan to Fight Cybercrime?
Podcast: How to Adopt Cybersecurity Best Practices
Blog: Five Tips to Keep Your Data Safe
Blog: 3 Critical Elements for Building an Effective Human Firewall