Jay Harmon (@jaybharmon) 's Twitter Profile
Jay Harmon

@jaybharmon

We Help our clients stay out of the press, protect their clients privacy and prepare in advance for business disruption. #healthIT #cybersecurity #hipaa

ID: 1250164104

linkhttp://www.borderhawk.com calendar_today07-03-2013 22:28:13

621 Tweet

1,1K Followers

2,2K Following

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

Even if you’re feeling a little sluggish 😬, you can still make it across the finish line. Never let obstacles determine your path! #finish, #goals, #perservere lnkd.in/eQUfrcU

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

@aharrison_73 HIPAA defines Risk Assessments. Healthcare vendors who handle PHI, fall under HIPAA. What's Your plan for RA?

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

@BKasey57 ePHI Risk! How the Dark Web, Internet of Things and Ransomware align to extract over $1 Billion in ransom paid in 2016?

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

@GladDlsease Many Hospitals, Physicians and Vendors STILL have not performed HIPAA required Risk Assessment! Need a plan?

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

@nawfsideboy86 ePHI secure? Encrypted? Whole disk or file level? Who maintains the keys? Internal, external or both? How do you decide?

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

@JhosellnAponte ePHI secure? Encrypted? Whole disk or file level? Who maintains the keys? Internal, external or both? How do you decide?

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

@ShaneTheP241 Purchased Cyber Liability Insurance? Fill out an application stating implemented security controls? If asked, can you verify?

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

@Karois5G In Healthcare? Prepared for a cyber disruption? Can you recover from a flood, a protest or ransomware? I'd love to hear your plan.

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

@erixcutlxxxx Purchased Cyber Liability Insurance? Fill out an application stating implemented security controls? If asked, can you verify?

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

@MsIndlanSummer Ransomware's costly healthcare impact. Don't be found without an effective, tested plan to detect and respond!

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

@BrianKGllmore HIPAA defines Risk Assessments. Healthcare vendors who handle PHI, fall under HIPAA. What's Your plan for RA?

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

@StephenTh0mason ePHI secure? Encrypted? Whole disk or file level? Who maintains the keys? Internal, external or both? How do you decide?

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

@Bluestonedlning Many Hospitals, Physicians and Vendors STILL have not performed HIPAA required Risk Assessment! Need a plan?

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

@compconmezal191 Risk Assessments required by HIPAA, MACRA and MIPS. To learn how this impacts you, msg to schedule no obligation call!

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

@samsquirrel92 Many Hospitals, Physicians and Vendors STILL have not performed HIPAA required Risk Assessment! Need a plan?

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

It will be very interesting to see how the scoring systems address risk and how they quantify threat and vulnerabili…lnkd.in/e8BWg8d

Jay Harmon (@jaybharmon) 's Twitter Profile Photo

conta.cc/2xEMUBW Join us at our webinar on "Developing a Cyber Security Resilience Strategy" Friday, Oct. 19 1:00-2:00 est.