TITLE: Healthcare Cyberattacks: A Uniquely Vulnerable Industry
LEARNING OBJECTIVES
Upon completion of this activity, participants should be able to:
• Describe several types of Social Engineering Attacks
• Provide examples of healthcare data breaches
• Define an Extended Network Downtime (END) event
• Identify how this might occur due to a cyberattack
• Acknowledge and activate END protocols to continue immediate patient care needs if our network is compromised
• Contribute substantively to improving the efficiency of our response during an END event.
ATTENDANCE / CREDIT
Text the session code (provided only at the session) to 507-200-3010 within 48 hours of the live presentation to record attendance. All learners are encouraged to text attendance regardless of credit needs. This number is only used for receiving text messages related to tracking attendance. Additional tasks to obtain credit may be required based on the specific activity requirements and will be announced accordingly. Swiping your badge will not provide credit; that process is only applicable to meet GME requirements for Residents & Fellows.
TRANSCRIPT
Any credit or attendance awarded from this session will appear on your Transcript.
For disclosure information regarding Mayo Clinic School of Continuous Professional Development accreditation review committee member(s) and staff, please go here to review disclosures.

Facebook
X
LinkedIn
Forward