When a medical practice replaces its billing system or electronic medical record (EMR), it’s automatically at risk.  The risk lies in how legacy patient data from the retired system is handled.  While it is common for demographics and other basic key data points to be converted to a new system, complexity and cost often prohibit line item details from migrating.  That leaves protected health information (PHI) in the legacy system, or legacy PHI, and, therein lies the risk.

If healthcare providers value PHI, how can cyber criminals steal it so easily? Here, Lisa Williams, VP of Business Development for Triyam, discusses common PHI security holes, how legacy systems cause problems, and why only complying with minimum HIPAA requirements affects your ability to avoid and react to breaches effectively.

Watch the webinar to learn what to do with legacy PHI and the plans for a successful transition to a new EHR.

Watch the Webinar

Check out our past webinar recordings:

Can’t make it? Contact us by email or phone or schedule an appointment for a personalized free webinar.

Phone: 855-663-2684

Email: Info@triyam.com