{"id":123314,"date":"2017-10-18T10:42:43","date_gmt":"2017-10-18T10:42:43","guid":{"rendered":"http:\/\/tpgold.com\/?p=123314"},"modified":"2017-10-17T21:46:02","modified_gmt":"2017-10-17T21:46:02","slug":"cybersecurity-in-the-current-health-care-environment","status":"publish","type":"post","link":"https:\/\/tpgold.com\/?p=123314","title":{"rendered":"Cybersecurity in the Current Health Care Environment"},"content":{"rendered":"<p>DescriptionBond, Schoeneck &amp; King PLLC (Bond, we, or us), has prepared this communication to present only general information. This is not intended as legal advice, nor should you consider it as such. You should not act, or decline to act, based upon the contents. While we try to make sure that the information is complete and accurate, laws can change quickly. You should always formally engage a lawyer of your choosing before taking actions which have legal consequences.<br \/>\nFor information about our firm, practice areas and attorneys, visit our website, www.bsk.com. \u2022 Attorney Advertising \u2022 \u00a9 2016 Bond, Schoeneck &amp; King, PLLC<\/p>\n<div class=\"ytg-video-url\">\n<p><iframe loading=\"lazy\" title=\"Cybersecurity in the Current Health Care Environment\" width=\"660\" height=\"371\" src=\"https:\/\/www.youtube.com\/embed\/CD3wkkicK38?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>DescriptionBond, Schoeneck &amp; King PLLC (Bond, we, or us), has prepared this communication to present only general information. This is not intended as legal advice, nor should you consider it as such. You should not act, or decline to act, based upon the contents. While we try to make sure that the information is complete &hellip; <a href=\"https:\/\/tpgold.com\/?p=123314\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Cybersecurity in the Current Health Care Environment<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":123316,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"video","meta":{"footnotes":""},"categories":[1],"tags":[6421,1398],"class_list":["post-123314","post","type-post","status-publish","format-video","has-post-thumbnail","hentry","category-features","tag-cybersecurity","tag-health-care","post_format-post-format-video"],"_links":{"self":[{"href":"https:\/\/tpgold.com\/index.php?rest_route=\/wp\/v2\/posts\/123314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tpgold.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tpgold.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tpgold.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tpgold.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=123314"}],"version-history":[{"count":1,"href":"https:\/\/tpgold.com\/index.php?rest_route=\/wp\/v2\/posts\/123314\/revisions"}],"predecessor-version":[{"id":123315,"href":"https:\/\/tpgold.com\/index.php?rest_route=\/wp\/v2\/posts\/123314\/revisions\/123315"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tpgold.com\/index.php?rest_route=\/wp\/v2\/media\/123316"}],"wp:attachment":[{"href":"https:\/\/tpgold.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=123314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tpgold.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=123314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tpgold.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=123314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}