Two replays

Description

I need two responses for these two discussions. 1-Data breaches can occur to anyone and happen mostly everywhere. This includes hospitals, clinics, large corporations, banks and many more places. A data breach is a violation of security containing sensitive and private information that has been stolen, copied, sent, altered, and used by someone that is not authorized to do so. There are many types of data breaches, but the most common include ransomware, phishing, and malware. A ransomware attack uses a malware system to encrypt and lock the victims system, files, data, and devices until the attacker receives the ransom payment. There was a recent ransomware attack that took place on February 21. This attack was called “The Feb. 21 Change Healthcare ransomware attack carried out by the ALPHV/Black-cat hacking gang has delayed prescription fillings and led to cash crunches at clinics and other facilities” (Dimolfetta, 2024). This ransomware attack affected health insurance and the American Healthcare Association reported that 94% of the hospitals faced a financial impact of 1 billion per day in revenues. A strategy that could be used to prevent such breaches and protect the privacy of Electronic Health Records (EHR) and Personal Health Information (PHI) is having monthly seminars on techniques to reduce the chance of getting hacked. This strategy could work in a real setting by having professional’s teach about how to spot fake and fraudulent emails and much more. 2- Data breaches are very critical and can become detrimental extremally quick. The topic being discussed is a healthcare data breach, this can come from inside the healthcare workforce or even from a third party. The incident being provided is the Pharmerica Corporation, this is a long term care pharmacy network. This incident was reported on March 14th, 2023 for suspicious activity later learning that an unknown party obtained personal information of 5.8 million people. The data compromised by this unknown party included names, social security numbers, addresses, birthdays, medication information, and health insurance information. During the investigation of this breach it was later found that some of the information stolen was taken from deceased individuals. One strategy that could be used to prevent such breaches could include a strong password that only is known by the individual creating it. Another prevention factor could include security awareness training for all healthcare professionals including IT facilities working with hospitals. These two options can definitely be applied in the real world, majority of the time when something requires a password update, the site will create one for you that is random numbers and letters so then it is not guessable. Utilizing security awareness would train each worker to avoid fraudulent emails, and avoid manipulation. Some employees don’t know how to recognize and respond to these issues, by implementing security awareness it will equip employees to avoid fraudulent emails and manipulation.

Don't use plagiarized sources. Get Your Custom Assignment on
Two replays
From as Little as $13/Page

Unformatted Attachment Preview

U N I V E RS I TY
1847
NURS 309-41 Discussion Question Grading Rubric
Good
Needs Improvement
Unacceptable
1 point
0.5 points
0 points
Participates on a minimum
Participates on a minimum
Participates on only 1
of 2 calendar days meaning
of 3 calendar days meaning
calendar day meaning only Participates on no
Frequency
the initial and peer response
the initial and peer response
an initial post or all posts
calendar days
posts are on 2 different
posts are on different days.
completed on same day.
days.
Demonstrates synthesis of Demonstrates analysis of Post demonstrates
assigned material, and
assigned material, and
comprehension of assigned
incorporates both assigned incorporates either
material, and incorporates
textbook/course content
assigned textbook/course neither the assigned
readings and evidencecontent readings or
textbook/course content
based information from a
evidence-based information readings reading nor an
Initial Posting scholarly article into the
from a scholarly article into additional current,
No post
content of the posting.
the content of the posting. evidence-based article for
Thoughts are organized,
Information is accurate, but information. Information is
thoughtful, analyze content, only summarized;
superficial and/or off topic;
and stay on topic; pose
incorporates opinions and no connections made
insightful ideas that clearly personal experiences;
between topics and
connect to the topic.
marginal effort
literature; minimal effort
Demonstrates an
understanding of topic,
Demonstrates analysis of
elaborates with
peer’s post and assigned
Minimal information
minimal integration of
topic; incorporates at least
provided that is off-topic,
Peer
assigned material, and
one (1) supporting current,
irrelevant, opinionated, or
Response
content is mostly opinions
No posts
evidence-based article or
incorrect; does not include
Posting
and/or personal
support from the textbook;
any supporting
experiences; includes
builds on peer’s post in a
information/articles
additional supporting
significant manner.
articles that are outdated
and/or not scholarly
Initial post is a minimum of
Initial post or peer response Neither the initial post nor
200 words and peer
posts do not meet the
the peer response posts
Posting
response posts are
minimum required word
meet the minimum required NA – due to no posts
Requirements minimum of 100 words. All
count. Post do not all
word count. Posts do not all
posts contain scholarly
contain scholarly sources. contain scholarly sources.
reference
No errors with in- text
APA (includes
citations or references;
1-2 errors with
3-4 errors with
grammar,
correct grammar and
citations/references,
citations/references,
punctuation,
NA – due to no posts
punctuation demonstrated; grammar/punctuation, or grammar/punctuation, or
& sentence
proficient sentence
sentence structure
sentence structure
structure)
structure
Criteria
Excellent
2 points
CR SP24
1

Purchase answer to see full
attachment