SlideShare a Scribd company logo
1 of 26
Disaster Recovery for
Healthcare Practices
and Facilities
Matt Gracey & Steve Whalen
800.966.2120
info@dannagracey.com
Disasters come in many forms, from cybersecurity emergencies and public relations to fires,
tropical storms and hurricanes. Not planning ahead can put your practice in physical and
legal jeopardy and expose your patients to sensitive information breaches and identity
theft.
 
Today we will discuss:
• What types of disasters your practice or facility are vulnerable to
• How to identify all the ways disasters can impact your practice
• Best practices for developing processes and checklists to avoid disasters
• Effective responses to quickly recover in the event of a disaster
Disasters and Your Practice
What are some the consequences
of lost data due to a disaster?
• Risk of losing data required for patient care that can have life-or-
death consequences
• Losing credibility and reputation. Your practice could be at
great risk of losing hospital/physician clients
• Financial losses from lost business and costly processes to
recover data
• Litigation costs can be significant if patients sue the healthcare
provider or a hospital sues its service providers
• HIPAA penalties for non-compliance
HIPAA Disaster Recovery Plan
(7) (i) Standard: Contingency plan. Establish (and implement as needed)
policies and procedures for responding to an emergency or other occurrence (for
example, fire, vandalism, system failure, and natural disaster) that damages
systems that contain electronic protected health information.
(ii) Implementation specifications:
(A) Data backup plan (Required). Establish and implement
procedures to create and maintain retrievable exact copies of electronic
protected health information.
(B) Disaster recovery plan (Required). Establish (and implement as
needed) procedures to restore any loss of data.
(C) Emergency mode operation plan (Required). Establish (and
implement as needed) procedures to enable continuation of critical
business processes for protection of the security of electronic protected
health information while operating in emergency mode.
(D) Testing and revision procedures (Addressable). Implement
procedures for periodic testing and revision of contingency plans.
(E) Applications and data criticality analysis (Addressable).
Assess the relative criticality of specific applications and data in support
of other contingency plan components.
•Fire
•Storms
•Floods
•Tropical Storms and
Hurricanes
Natural
Disasters
Prevention measures
• Follow manufacturers’ recommendations for maximum volt/wattage
load for surge protectors, power strips and adapters
• Replace frayed power cords; never run them under rugs or carpeting
• Unplug appliances and other equipment not in use at the end of the
day and over the weekend
• Store hazardous materials according to manufacturers’ instructions
and OSHA regulations
• Don’t prop fire doors open or block exits with furniture or boxes
• Don’t allow paper and other trash to accumulate outside of garbage
or recycling receptacles
• Never store paper or trash near hot equipment, electrical outlets or
designated smoking areas
• Don’t permit employees to burn candles, scented oils, etc.
• Test alarms and check extinguisher regularly; replace/recharge
immediately when indicated
• Use only licensed electricians if you are having any work done
Fire proof cabinets for medical records
All electronic data backed-up securely off site
Fire Prevention and Safeguarding
Hurricane Season – What to do and When to do it
Before hurricane season (started June 1st
)
• Beat the rush - stock up on non-perishable supplies
• Review procedural plans and checklists
• Review your post storm plan of action, modify as needed
When a storm hit seems likely
• Keep a watchful eye
• Cash, fuel, personal plans made
• Set a contingency plan and a time line for action
• Begin to go through procedural checklist, get things in order
When a storm watch is issued – Conditions are a threat within 48 hours
• Decide on your course of action.
• Notify patients on status of upcoming appointments
• All employees should be on a calling tree or notification system
• Begin preparations for the approaching storm
• Gather all important documents, licenses, insurance info, etc.
When a storm warning is issued – Conditions expected within 36 hours
• Contingency plan in action
• Have your post-storm plan of action, share with staff
Computers, Telephones, Fax machines, printers, copiers
and other Electronic Equipment
•Disconnect computer, monitor, keyboard, mouse, from each
other and unplug the network cable and wall power outlets.
•Unplug the network cable and wall power outlets on all devises.
•If not already mounted above the floor, move any PC equipment
off the floor at least 10 feet from a window.
•Wrap each device in plastic and mark it with an identifiable
name.
Miscellaneous desktop items
•Remove all papers, books, and loose items from your desk.
•Place these materials in a box or Rubbermaid type container
marked with your name and store it off the floor in a safe place.
Storm Prep Example:
Preparing Your
Workspace
Post-Disaster Checklist
 Contact employees regarding short-term and future actions
 Secure all business and medical records
 In the event of loss of records requiring compliance with HIPAA
breach notification — notify medmal carrier, patient, ad in paper
and within 1 year notify government
 http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotifica
 Damage assessment
 Not significant enough to cause a major business disruption
 Significant – relocation options
 Reroute mail and phone calls
 Notify your insurance carrier with an initial assessment.
 Keep an accounting of all damage-related costs. Such costs
might include:
 Mileage driven by employees
 Long-distance phone calls
 Equipment
 Mailing
 Leasing equipment
Post-Disaster Checklist continued
 Contact accountant or billing service and bank to
reconstruct financial records
 Conduct salvage operations. Keep damaged items until
seen by an insurance adjuster. Take pictures and record
everything
 Once the extent of the damage is known call a meeting of
all employees. Topics to be discussed should include:
 Damage assessment
 Status of employees
 Medical records access
 Financial resources
 Information processing
 Office space needs — temporary/permanent
 Immediate equipment needs
 Contacting patients and suppliers
 The next step - obtain temporary/permanent office space to
get up and running
 Address equipment needs for temporary office space
 Contact patients with operational status
Data
Disasters
• Data Breach
• Cyber Attacks
• PR/Reputation
• Data stolen from a bank quickly becomes useless once the breach
is discovered.
• Healthcare industry data can live a lifetime, including:
 Social Security numbers
 Patient health histories
 Up-to-date patient information
• Used for medical identity theft
• Fraudulent claims for valuable prescription drugs and medical
equipment
• Stolen patient data can fetch up to 50 times more than a social
security or credit card number
• The healthcare sector is uniquely vulnerable:
 Government regulations forced healthcare operations to adopt
electronic health records and other advances under the Patient
Protection and Affordable Care Act even if they weren't ready
to adequately invest in security
 Medical data are now being shared with many different types of
entities, extending access to medical records
Why Medical Records?
Theft
Trusted Users
• Careless Operators
• Hijacked Credentials
Mobile Devices
• Smart phones
• Tablets
Outsourced Providers
New Web 2.0 Technologies
• Blogs
• Social Media
• Networking Sites
Data Breach
Email Attachments
Portable Media
Visiting Malicious Websites
Downloading Files
Social Networking Sites
Social Engineering Attacks
Not Following Security Guidelines
and Policies
Cyberattacks
• October 2015 – A Florida-based cancer treatment
provider reported the theft of 2,213,597 patients’
medical records
• 13 Separate federal class-action lawsuits have
been filed
• November 2015 – A laptop containing 599 patient
records, which contained their PHI was stolen from an
unlocked hospital room at Lahey Hospital in
Massachusetts, The Department of Health and Human
Services fined them $850,000 after an investigation
uncovered a series of poor electronic PHI procedures.
• February 2016 – A Florida-based radiology practice
reported a breach of 483,063 patients’ medical records.
• April 2016 - A stolen laptop containing unsecured
medical records was reported by an Indiana-based
practice resulting in the loss of 205,748 patient records.
• Major Cyberattacks on healthcare grew 63% in 2016
It’s Only Going
to Get Worse
• Customer Notification: $1 - $2 (per person)
• Consulting Help for Forensic Research and Data
Recovery: $250 - $300 (per hour)
• Legal Fees: $400 - $600 (per hour)
• Credit Monitoring Subscriptions: $10 – $20 (per
person)
• Credit Card Reissuance Fee: $20 - $30 (per card)
• Information Hotlines for Customer Support: $5 +
(per call)
• In 2016, Healthcare Data Breach Was Calculated to
be $402 Per Record*
The Cost of a Breach
*Ponemon Institute's 2016 annual study
• Malicious software that encrypts data so
the user is blocked, and then requires a
ransom payment to unlock the data  
• Payment is typically made via virtual
currencies such as bitcoins 
• Simple ransomware may unlock the data
upon payment of the ransom demand,
but more vicious variants may never
unlock the data 
• Organizations typically incur business
interruption expenses that are
significantly greater than the ransom
payment itself
• Trigger for HIPAA violations 
Ransomware
• February 2016 – Hollywood Presbyterian Medical Center paid $17,000 in bitcoins
to hackers to regain network access after the criminals encrypted the hospital’s files
and demanded payment to allow the hospital to return to normalcy. The hospital’s
operations were disrupted for roughly 10 days.
• March 2016 – MedStar Health – A ransomware virus spread on MedStar Health’s
network, causing the 10 hospitals in MedStar and its 250 outpatient facilities to work
with paper records. They were forced to shut email and systems offline to prevent
the virus from spreading.
• May 2017 – “WannaCry” – Ransomware attack spread across hospitals, schools and
businesses in 150 countries. The “WannaCry” virus was the most dispersed attack of
its kind. Most notably, shutting down hospitals and resorting back to paper files,
slowing the flow of admitting patients by several hours and can present a potential
contingent bodily injury exposure.
Business Interruption Strategy
“Even the lowest-level staff can’t
communicate with anyone. You can’t
schedule patients, you can’t access records,
you can’t do anything,”
• Offsite routine secure backup – “The Cloud”
• 24/7/365 Security Monitoring
• Maintaining updated software and operating Systems
• Strict password policy
• Computer Acceptable Use policy
• Training employees to be aware of fake emails
• Endpoint Security & Encryption
• Network Security Policies
• Comprehensive Cyber Risk Insurance
What can you do
for protection?
What Does Cyber Insurance Cover?
• Claims Made by clients or employees
• Regulatory procedures
• Fines and penalties relating to privacy laws
• Cost to notify affected Individuals
• Cost to restore data/computer programs
Damaged by hackers/virus
• Business interruption and extra expense Due to a
breach
• Some policies include loss of money due to
hacking
• Your reputation is everything
PR and
Reputaion
Munoz was hoping his tweet would smooth
things over.
It didn’t go quite as well as he had hoped:
Oscar Munoz
 Weigh your response
 Don’t overreact
 Ask for equal time
 Use facts and figures and cite third party sources
 Let your advocates defend you
 Generate positive content where possible
 Ask yourself, is this an opportunity?
Managing Negative
Publicity
Be Prepared
You must ensure that critical systems are
identified and that there are plans in place
to recover if hit with a natural disaster or
a cyber attack.
Regulatory, technological and
environmental factors are raising the
importance of a comprehensive disaster
recovery strategy.
Resources at dannagracey.com
The consequences and risks are too great
to ignore.
Summary
Matt Gracey & Steve Whalen
800.966.2120 info@dannagracey.com
Disaster Recovery for Healthcare
Practices and Facilities

More Related Content

What's hot

Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1jhietala
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementNada G.Youssef
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Health IT Conference – iHT2
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...Health IT Conference – iHT2
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control ManagementNada G.Youssef
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance Dovetail Software
 

What's hot (9)

Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
Keynote Presentation "Building a Culture of Privacy and Security into Your Or...
 
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
CHIME LEAD Fourm Houston - "Case Studies from the Field: Putting Cyber Securi...
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control Management
 
#HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance #HR and #GDPR: Preparing for 2018 Compliance
#HR and #GDPR: Preparing for 2018 Compliance
 

Similar to Danna-Gracey Disaster Management for Health Care Practices

Executive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceExecutive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceThomas Bronack
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to KnowBoyarMiller
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118robint2125
 
Chapter 7 Assuring Safety and Security in Healthcare Insti.docx
Chapter 7  Assuring Safety and Security in Healthcare Insti.docxChapter 7  Assuring Safety and Security in Healthcare Insti.docx
Chapter 7 Assuring Safety and Security in Healthcare Insti.docxmccormicknadine86
 
How CMMS Supports Healthcare Facilities
How CMMS Supports Healthcare FacilitiesHow CMMS Supports Healthcare Facilities
How CMMS Supports Healthcare FacilitiesMicroMain Corporation
 
Use of mobile device in health care setting
Use of mobile device in health care settingUse of mobile device in health care setting
Use of mobile device in health care settingDr. Samir Sawli
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareDoug Copley
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...Accellis Technology Group
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...Blancco
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Designbradley_g
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...- Mark - Fullbright
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBsMary Brophy
 
2 tools to identify and control patient safety risks
2 tools to identify and control patient safety risks2 tools to identify and control patient safety risks
2 tools to identify and control patient safety risksMohamed Mosaad Hasan
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Lisa Abe-Oldenburg, B.Comm., JD.
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)Jan Wong
 
To Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeTo Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeBoyarMiller
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a bytelgcdcpas
 

Similar to Danna-Gracey Disaster Management for Health Care Practices (20)

Executive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry complianceExecutive Presentation on adhering to Healthcare Industry compliance
Executive Presentation on adhering to Healthcare Industry compliance
 
Final copy 7
Final copy 7Final copy 7
Final copy 7
 
What Every Attorney Needs to Know
What Every Attorney Needs to KnowWhat Every Attorney Needs to Know
What Every Attorney Needs to Know
 
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
BoyarMiller – What Every Attorney Needs to Know Regarding Document Retention,...
 
Hipaa overview 073118
Hipaa overview 073118Hipaa overview 073118
Hipaa overview 073118
 
Chapter 7 Assuring Safety and Security in Healthcare Insti.docx
Chapter 7  Assuring Safety and Security in Healthcare Insti.docxChapter 7  Assuring Safety and Security in Healthcare Insti.docx
Chapter 7 Assuring Safety and Security in Healthcare Insti.docx
 
How CMMS Supports Healthcare Facilities
How CMMS Supports Healthcare FacilitiesHow CMMS Supports Healthcare Facilities
How CMMS Supports Healthcare Facilities
 
Use of mobile device in health care setting
Use of mobile device in health care settingUse of mobile device in health care setting
Use of mobile device in health care setting
 
Cybersecurity Challenges in Healthcare
Cybersecurity Challenges in HealthcareCybersecurity Challenges in Healthcare
Cybersecurity Challenges in Healthcare
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
 
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
IAPP Canada Privacy Symposium- "Data Retention Is a Team Sport: How to Get It...
 
Avoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by DesignAvoid Privacy by Disaster by Adopting Privacy by Design
Avoid Privacy by Disaster by Adopting Privacy by Design
 
Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...Introduction to Data Security Breach Preparedness with Model Data Security Br...
Introduction to Data Security Breach Preparedness with Model Data Security Br...
 
Cyber Response and Planning for SMBs
Cyber Response and Planning for SMBsCyber Response and Planning for SMBs
Cyber Response and Planning for SMBs
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
2 tools to identify and control patient safety risks
2 tools to identify and control patient safety risks2 tools to identify and control patient safety risks
2 tools to identify and control patient safety risks
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)
 
To Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital AgeTo Shred or Not to Shred: Spoliation in the Digital Age
To Shred or Not to Shred: Spoliation in the Digital Age
 
Don't let them take a byte
Don't let them take a byteDon't let them take a byte
Don't let them take a byte
 

Recently uploaded

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 

Recently uploaded (20)

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 

Danna-Gracey Disaster Management for Health Care Practices

  • 1. Disaster Recovery for Healthcare Practices and Facilities Matt Gracey & Steve Whalen 800.966.2120 info@dannagracey.com
  • 2. Disasters come in many forms, from cybersecurity emergencies and public relations to fires, tropical storms and hurricanes. Not planning ahead can put your practice in physical and legal jeopardy and expose your patients to sensitive information breaches and identity theft.   Today we will discuss: • What types of disasters your practice or facility are vulnerable to • How to identify all the ways disasters can impact your practice • Best practices for developing processes and checklists to avoid disasters • Effective responses to quickly recover in the event of a disaster Disasters and Your Practice
  • 3. What are some the consequences of lost data due to a disaster? • Risk of losing data required for patient care that can have life-or- death consequences • Losing credibility and reputation. Your practice could be at great risk of losing hospital/physician clients • Financial losses from lost business and costly processes to recover data • Litigation costs can be significant if patients sue the healthcare provider or a hospital sues its service providers • HIPAA penalties for non-compliance
  • 4. HIPAA Disaster Recovery Plan (7) (i) Standard: Contingency plan. Establish (and implement as needed) policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, and natural disaster) that damages systems that contain electronic protected health information. (ii) Implementation specifications: (A) Data backup plan (Required). Establish and implement procedures to create and maintain retrievable exact copies of electronic protected health information. (B) Disaster recovery plan (Required). Establish (and implement as needed) procedures to restore any loss of data. (C) Emergency mode operation plan (Required). Establish (and implement as needed) procedures to enable continuation of critical business processes for protection of the security of electronic protected health information while operating in emergency mode. (D) Testing and revision procedures (Addressable). Implement procedures for periodic testing and revision of contingency plans. (E) Applications and data criticality analysis (Addressable). Assess the relative criticality of specific applications and data in support of other contingency plan components.
  • 6. Prevention measures • Follow manufacturers’ recommendations for maximum volt/wattage load for surge protectors, power strips and adapters • Replace frayed power cords; never run them under rugs or carpeting • Unplug appliances and other equipment not in use at the end of the day and over the weekend • Store hazardous materials according to manufacturers’ instructions and OSHA regulations • Don’t prop fire doors open or block exits with furniture or boxes • Don’t allow paper and other trash to accumulate outside of garbage or recycling receptacles • Never store paper or trash near hot equipment, electrical outlets or designated smoking areas • Don’t permit employees to burn candles, scented oils, etc. • Test alarms and check extinguisher regularly; replace/recharge immediately when indicated • Use only licensed electricians if you are having any work done Fire proof cabinets for medical records All electronic data backed-up securely off site Fire Prevention and Safeguarding
  • 7. Hurricane Season – What to do and When to do it Before hurricane season (started June 1st ) • Beat the rush - stock up on non-perishable supplies • Review procedural plans and checklists • Review your post storm plan of action, modify as needed When a storm hit seems likely • Keep a watchful eye • Cash, fuel, personal plans made • Set a contingency plan and a time line for action • Begin to go through procedural checklist, get things in order When a storm watch is issued – Conditions are a threat within 48 hours • Decide on your course of action. • Notify patients on status of upcoming appointments • All employees should be on a calling tree or notification system • Begin preparations for the approaching storm • Gather all important documents, licenses, insurance info, etc. When a storm warning is issued – Conditions expected within 36 hours • Contingency plan in action • Have your post-storm plan of action, share with staff
  • 8. Computers, Telephones, Fax machines, printers, copiers and other Electronic Equipment •Disconnect computer, monitor, keyboard, mouse, from each other and unplug the network cable and wall power outlets. •Unplug the network cable and wall power outlets on all devises. •If not already mounted above the floor, move any PC equipment off the floor at least 10 feet from a window. •Wrap each device in plastic and mark it with an identifiable name. Miscellaneous desktop items •Remove all papers, books, and loose items from your desk. •Place these materials in a box or Rubbermaid type container marked with your name and store it off the floor in a safe place. Storm Prep Example: Preparing Your Workspace
  • 9. Post-Disaster Checklist  Contact employees regarding short-term and future actions  Secure all business and medical records  In the event of loss of records requiring compliance with HIPAA breach notification — notify medmal carrier, patient, ad in paper and within 1 year notify government  http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotifica  Damage assessment  Not significant enough to cause a major business disruption  Significant – relocation options  Reroute mail and phone calls  Notify your insurance carrier with an initial assessment.  Keep an accounting of all damage-related costs. Such costs might include:  Mileage driven by employees  Long-distance phone calls  Equipment  Mailing  Leasing equipment
  • 10. Post-Disaster Checklist continued  Contact accountant or billing service and bank to reconstruct financial records  Conduct salvage operations. Keep damaged items until seen by an insurance adjuster. Take pictures and record everything  Once the extent of the damage is known call a meeting of all employees. Topics to be discussed should include:  Damage assessment  Status of employees  Medical records access  Financial resources  Information processing  Office space needs — temporary/permanent  Immediate equipment needs  Contacting patients and suppliers  The next step - obtain temporary/permanent office space to get up and running  Address equipment needs for temporary office space  Contact patients with operational status
  • 11. Data Disasters • Data Breach • Cyber Attacks • PR/Reputation
  • 12. • Data stolen from a bank quickly becomes useless once the breach is discovered. • Healthcare industry data can live a lifetime, including:  Social Security numbers  Patient health histories  Up-to-date patient information • Used for medical identity theft • Fraudulent claims for valuable prescription drugs and medical equipment • Stolen patient data can fetch up to 50 times more than a social security or credit card number • The healthcare sector is uniquely vulnerable:  Government regulations forced healthcare operations to adopt electronic health records and other advances under the Patient Protection and Affordable Care Act even if they weren't ready to adequately invest in security  Medical data are now being shared with many different types of entities, extending access to medical records Why Medical Records?
  • 13. Theft Trusted Users • Careless Operators • Hijacked Credentials Mobile Devices • Smart phones • Tablets Outsourced Providers New Web 2.0 Technologies • Blogs • Social Media • Networking Sites Data Breach
  • 14. Email Attachments Portable Media Visiting Malicious Websites Downloading Files Social Networking Sites Social Engineering Attacks Not Following Security Guidelines and Policies Cyberattacks
  • 15. • October 2015 – A Florida-based cancer treatment provider reported the theft of 2,213,597 patients’ medical records • 13 Separate federal class-action lawsuits have been filed • November 2015 – A laptop containing 599 patient records, which contained their PHI was stolen from an unlocked hospital room at Lahey Hospital in Massachusetts, The Department of Health and Human Services fined them $850,000 after an investigation uncovered a series of poor electronic PHI procedures. • February 2016 – A Florida-based radiology practice reported a breach of 483,063 patients’ medical records. • April 2016 - A stolen laptop containing unsecured medical records was reported by an Indiana-based practice resulting in the loss of 205,748 patient records. • Major Cyberattacks on healthcare grew 63% in 2016 It’s Only Going to Get Worse
  • 16. • Customer Notification: $1 - $2 (per person) • Consulting Help for Forensic Research and Data Recovery: $250 - $300 (per hour) • Legal Fees: $400 - $600 (per hour) • Credit Monitoring Subscriptions: $10 – $20 (per person) • Credit Card Reissuance Fee: $20 - $30 (per card) • Information Hotlines for Customer Support: $5 + (per call) • In 2016, Healthcare Data Breach Was Calculated to be $402 Per Record* The Cost of a Breach *Ponemon Institute's 2016 annual study
  • 17. • Malicious software that encrypts data so the user is blocked, and then requires a ransom payment to unlock the data   • Payment is typically made via virtual currencies such as bitcoins  • Simple ransomware may unlock the data upon payment of the ransom demand, but more vicious variants may never unlock the data  • Organizations typically incur business interruption expenses that are significantly greater than the ransom payment itself • Trigger for HIPAA violations  Ransomware
  • 18. • February 2016 – Hollywood Presbyterian Medical Center paid $17,000 in bitcoins to hackers to regain network access after the criminals encrypted the hospital’s files and demanded payment to allow the hospital to return to normalcy. The hospital’s operations were disrupted for roughly 10 days. • March 2016 – MedStar Health – A ransomware virus spread on MedStar Health’s network, causing the 10 hospitals in MedStar and its 250 outpatient facilities to work with paper records. They were forced to shut email and systems offline to prevent the virus from spreading. • May 2017 – “WannaCry” – Ransomware attack spread across hospitals, schools and businesses in 150 countries. The “WannaCry” virus was the most dispersed attack of its kind. Most notably, shutting down hospitals and resorting back to paper files, slowing the flow of admitting patients by several hours and can present a potential contingent bodily injury exposure. Business Interruption Strategy “Even the lowest-level staff can’t communicate with anyone. You can’t schedule patients, you can’t access records, you can’t do anything,”
  • 19. • Offsite routine secure backup – “The Cloud” • 24/7/365 Security Monitoring • Maintaining updated software and operating Systems • Strict password policy • Computer Acceptable Use policy • Training employees to be aware of fake emails • Endpoint Security & Encryption • Network Security Policies • Comprehensive Cyber Risk Insurance What can you do for protection?
  • 20. What Does Cyber Insurance Cover? • Claims Made by clients or employees • Regulatory procedures • Fines and penalties relating to privacy laws • Cost to notify affected Individuals • Cost to restore data/computer programs Damaged by hackers/virus • Business interruption and extra expense Due to a breach • Some policies include loss of money due to hacking
  • 21. • Your reputation is everything PR and Reputaion
  • 22. Munoz was hoping his tweet would smooth things over. It didn’t go quite as well as he had hoped: Oscar Munoz
  • 23.
  • 24.  Weigh your response  Don’t overreact  Ask for equal time  Use facts and figures and cite third party sources  Let your advocates defend you  Generate positive content where possible  Ask yourself, is this an opportunity? Managing Negative Publicity
  • 25. Be Prepared You must ensure that critical systems are identified and that there are plans in place to recover if hit with a natural disaster or a cyber attack. Regulatory, technological and environmental factors are raising the importance of a comprehensive disaster recovery strategy. Resources at dannagracey.com The consequences and risks are too great to ignore. Summary
  • 26. Matt Gracey & Steve Whalen 800.966.2120 info@dannagracey.com Disaster Recovery for Healthcare Practices and Facilities

Editor's Notes

  1. Some you have some advance warning on, others you do not. Fire most often strikes without warning. Fortunately we rarely have to deal with Tornadoes, but when we do the news stations seem to have a pretty good hand at tracking systems. Flooding is most often associated with Tropical storms or hurricanes, but we have had some soakers that have caused some havoc. The big one – Tropical storms and hurricanes. These pose the biggest threat, and fortunately, there are a lot of things that we can do to be ready for them.
  2. Get water, canned goods, batteries, peanut butter, and other items that will last several months. As hurricane season comes to a close, you can start to use them or even donate to charity in time for Thanksgiving. Either way, nothing goes to waste and you are not caught up in the madness of storm prep. Start getting things in order. Put some cash aside, monitor your fuel usage so you can keep a full tank and are not stuck in gas station lines. Make possible plans to evacuate through, just in case. The practice should have a tentative idea of what they will do at this stage. Decide if you ar egoing to play it better “safe than sorry.” Basically, at this point you should know what your plan is and be ready to act on it. Go time. Complete Emergency Preparedness Guide is available on our Website, we will be sending you the link following this Webinar
  3. This is just one example of what we have in our Emergency prep guide. This will safeguard your office equipment in the event of a water breach.
  4. Here is a ”suggested” list of actions to take following a natural disaster. Our hope is that you never need to use them, but if you do, it should provide a road map to get back up and running and seeing patients as quickly as possible.
  5. While often used together, there is a difference between “breach” and Cyber attack”. Breach – A spill of confidential data, usually released due to mistake, negligence, or some other unintentional cause Cyber Attack – A malicious unauthorized access to a protected computer And finally, in this digital world, a negative PR hit could be disastrous for a doctor.
  6. Credit card numbers can sell on the dark web for roughly $15.
  7. Stolen lap tops X Employees that may access company data remotely, if their systems are not up to date and protected, this could open a doorway. Your 3rd party vendors and suppliers – Are they up to date with secure measures?? “Second generation web-based technologies” – allow anyone to upload content, making them very susceptible to hacking. Many of the social sites URL’s are determined as “Trusted Sites” by firewall filtering. A lot of information is shared on social media. Take Facebook for example, when you do the “Which super hero aAre You” quiz, you are granting some software programmer to access your personal data on your device to tell give yoy some made up name that has nothing to do with the information that you just traded them for.
  8. Cyberattacks, in a nut shell, is a virus. There are many different types, but we won’t get into defining them today. But they all have the same purpose – to take root in your system and wreak havoc. One of the most common methods. You open an “invoice” attached to an email, and a program will run itself and install the virus in your system. If in doubt, delete the message. Sharing thumb drives is an easy way for a computer virus to move from computer to computer Any legitimate website can be the victim of an attack, and it can be done easily. Most browsers these days will let you know if bad code is detected, but often if goes unnoticed. Just visiting an infected site opens the door to an attack. Always know the source of what you are downloading. A good antivirus program will actually scan file you download and warn you of any threats. Be weary of what stories you read and link to from social media. The top ten list can take you to a malicious website. Different than Social Media, these are tricks that lure users into giving up their information. Most have seen an email from the IRS saying you owe money or threatening jail if you do not act quickly. People actually will take it seriously and go to the site. Bypassing filters, using unauthorized outside storage devices, blocking software updates, using non-approve software clients, etc
  9. It seems we read about breaches daily.
  10. There are a lot of costs attached to a stolen data record. A credit card number goes for around $15
  11. Exactly what the name implies – your computer is seized and held for ransom. A bitcoin is new currency created in 2009, transactions are made with no middle man – which means the bank is not involved. No transaction fees and no need to give your real name. They are not tied to any country and have no regulation. It is digital currency. You set up a virtual wallet online, link it to your bank account, then find a place to purchase the digital bitcoin. Currently, one bitcoin is equal to $2,850 US dollars. The current value of the Bitcoin market is $100 billion dollars.
  12. The hacker is counting on you wanting to pay the ransom rather than have down time and the loss of revenue associated with it.
  13. MATT Cyber Risk Insurance can provide financial resources to help with the recovery from a ransomware attack, and some comprehensive Cyber Risk insurers provide access to expert resources to quickly assist in the recovery effort.  Note that Cyber Risk Insurance policies vary widely, so a thorough review is essential to ensure that coverage is in place.
  14. MATT
  15. MATT
  16. MATT
  17. MATT His words only fueled the Internet’s fire – many users taking to Twitter and sharing memes imagining what United really means when they say they want to “re-accommodate” someone.
  18. MATT
  19. As a Boy Scout, our motto is Be Prepared. It is actually pretty great words to live by. Have a plan… try to stay a step ahead of things. We have a very comprehensive Emergency Preparedness guide on our Website under the Toolbox section. We will be sending that direct link, along with this presentation out to you. Don’t ignore it. It is not going to go away. It is no longer a matter of if, but when.