<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Cathy Diehl, Author at Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/author/cathy/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/author/cathy/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Mon, 20 Jul 2020 15:47:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Cathy Diehl, Author at Third Rock</title>
	<link>https://thirdrock.com/blog/author/cathy/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>CCPA enforcement has begun</title>
		<link>https://thirdrock.com/blog/2020/07/20/ccpa-enforcement-has-begun/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Mon, 20 Jul 2020 13:19:47 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[CCPA]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[enforcement]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9321</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/07/20/ccpa-enforcement-has-begun/">CCPA enforcement has begun</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>The California Attorney General’s office recently confirmed that July 1 remained the start of enforcement for the new California Consumer Privacy Act (CCPA). The office has already sent it’s first round of compliance letters to businesses, giving them 30 days to cure any violations before facing an investigation or lawsuit.</p>
<p>With the disruptions that occurred due to the COVID-19 pandemic in the United States, many may have thought CCPA would be pushed back to allow businesses to deal with other issues. However, with the exponential increase in cyber threats, better data protection is exactly what we need.</p>
<p>The focus of CCPA is giving consumers more control of their data. Consumers must be clearly notified when their data will be collected, have the option to opt out, request information about how their data is used and sold, and require their data to be deleted.</p>
<p>There is also a provision for consumers to bring allegations against a company if they feel their data was not properly managed. Though some small lawsuits have been filed, one of the largest to date was recently brought against Walmart by a San Francisco resident, claiming they “Failed to implement and maintain reasonable security procedures and practices”.</p>
<p>Will this set the tone for businesses to be sued by customers looking for a payout? Hard to say but no doubt there will be many more complaints and lawsuits. Is your business both complaint and protected? Our CCPA compliance <a href="https://thirdrock.com/ccpa/">packages</a> offer a range of services to meet your needs rapidly and protect your business. <a href="https://thirdrock.com/contact-us">Contact us</a> today.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/07/20/ccpa-enforcement-has-begun/">CCPA enforcement has begun</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9321</post-id>	</item>
		<item>
		<title>Cyber Safety for working at home</title>
		<link>https://thirdrock.com/blog/2020/04/23/cyber-safety-for-working-at-home/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Thu, 23 Apr 2020 18:20:32 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9042</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/04/23/cyber-safety-for-working-at-home/">Cyber Safety for working at home</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Our work environments have been turned upside down. We are all in a place of creating new work routines. Having left the cyber safety net of a central office designed to protect company cybersecurity, IT departments are juggling a dispersed workforce while maintaining cybersecurity standards that protect private data.</p>
<p>Before COVID-19 forced a remote workforce, anywhere from 60 – 90% of breaches were caused by human error. We are seeing cyber criminals take advantage of extra vulnerabilities created with employees working from home. Cybersecurity is no longer just an IT thing. Protecting your company and their private data has never been closer to home, literally. Mistakes that could hurt the company start on your own network, which could also affect your personal security. Your business, IT department and your family are relying on your vigilance to be cyber safe.</p>
<h2></h2>
<h2>Cyber safety habits to put into practice</h2>
<ol>
<li><strong> </strong><strong>Separate work and personal devices<br /> </strong>If your company provides you a device, use it only for work purposes. Have a separate device for family and personal use. If separate devices are not a possibility, create separate profiles with different security settings. Use your work profile only for work purposes. If you have children who need to use the same computer, create separate profiles with parental controls that limit their ability to access and/or download content that could infect your computer.</li>
</ol>
<ol start="2">
<li><strong> </strong><strong>Lockdown your device<br /> </strong>You may feel that your device is physically safe in your home office, but you still need to protect data safety. Set a unique password for your device and lock it every time you walk away. If you are using one device for multiple profiles, have a private, unique password for your work profile that no one in your household can access. This is good practice for after quarantine as well.</li>
</ol>
<ol start="3">
<li><strong> </strong><strong>Be wary of add-ons and downloads<br /> </strong>There are many add-ons and extensions that promise to make your work run faster, smoother and better. Be cautious of downloading these onto your device. Many contain malware that give hackers access to the data on your computer. If you then link to your company network, they could gain access there as well. A good cyber safety practice is to research on trusted sites before downloading a new program or add-on.</li>
</ol>
<ol start="4">
<li><strong> </strong><strong>Use company approved sharing sites<br /> </strong>With your entire team working remotely, there is a greater need to communicate digitally. It may be more comfortable to use data sharing platforms you are used to, they may not be the most secure. Only send private data through company approved sharing sites.</li>
</ol>
<h2></h2>
<h2>Know signs of a breach</h2>
<p>Preventative measures are important to cyber safety, but breaches are still possible. It’s important to know what signs to look for in the event of a breach.</p>
<ol>
<li><strong> </strong><strong>Increase in unwanted pop-ups<br /> </strong>Pop-ups are a widely seen by-product of malware. If advertisements or system pop-ups begin appearing outside of any program, you may have been infected.</li>
</ol>
<ol start="2">
<li><strong> </strong><strong>Processing slows down<br /> </strong>Is it taking longer than usual for your computer to boot up or for programs to load? Viruses and malware run in the background, slowing down the programs you are attempting to run.</li>
</ol>
<ol start="3">
<li><strong> </strong><strong>New programs appear<br /> </strong>Computers do not add content on their own. If a new program, app or internet add-on appears on your computer, you may have a virus that inserted content onto your computer.</li>
</ol>
<h2></h2>
<h2>How do you handle a potential breach?</h2>
<ol>
<li><strong> </strong><strong>Report it!<br /> </strong>Inform your IT department of what you are experiencing. Send screen shots of error messages, pop-ups and other unwanted content. Be specific about when it started happening and what is going on.</li>
</ol>
<ol start="2">
<li><strong> </strong><strong>Don’t click<br /> </strong>Never click on suspicious content, even to try and close pop-up windows. Malware is the gateway for a virus. Clicking on the content can give them access to the data they are looking for.</li>
</ol>
<ol start="3">
<li><strong> </strong><strong>Scan with anti-virus software<br /> </strong>Company devices should be equipped with anti-virus software. If your company does not provide a device, get with your IT department about them providing access to anti-virus software. While it should do scans in the background, if you notice any of the above issues, tell it to run a full system diagnosis.</li>
</ol>
<ol start="4">
<li><strong> </strong><strong>Don’t access private data<br /> </strong>Until your issue has been resolved, do not attempt to access the company network or open any private data. If a hacker is monitoring your computer through malware, you run the risk of giving them access to that information.</li>
</ol>
<p>While human error will never be eliminated, we can all take steps to increase our awareness and cyber safety to lower our risk.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_2_3 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_center et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Want a reference to share with family, friends and coworkers? Download our checklist to make your most secure home office environment.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_button_module_wrapper et_pb_button_0_wrapper  et_pb_module ">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://thirdrock.com/wp-content/uploads/Third-Rock-Home-Office-Cybersecurity-Checklist-2020.pdf" target="_blank">Download your checklist</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2020/04/23/cyber-safety-for-working-at-home/">Cyber Safety for working at home</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9042</post-id>	</item>
		<item>
		<title>Cyber Protection as Your Business Deals with Social Distancing</title>
		<link>https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Tue, 10 Mar 2020 12:00:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Pandemic]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8918</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/">Cyber Protection as Your Business Deals with Social Distancing</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Cyber Safety Tips for Businesses When Employees Work from Home</h2>
<p>With the threat of the Coronavirus, many companies are allowing or requiring employees to work from home. If your company deals with protected information such as healthcare, financial, consumer or personal, you should have policies and procedures in place to protect that data within your normal work environment. However, having your work force suddenly need to access this information from home may not be normal. Systems may be overloaded, sensitive information distributed in a way that you never anticipated and lines of communication disrupted. Do your policies and procedures cover such a situation, like a pandemic? Here are 6 tips to best protect your business and your clients.</p>
<h3>Train Your Employees</h3>
<p>We are not talking about the once a year standard, boring videos people half heartedly watch so they can print off a certificate proving they did it. Your employees <u>must</u> know key elements of cyber safety that they are regularly reminded of. If nothing else, make sure they know these 3 things.</p>
<ol>
<li><u>Anticipate phishing and spear phishing attacks</u>. Word will travel fast that everyone is working from home. Hackers will recognize you are vulnerable and try to take advantage of it. Tell your workforce to anticipate phishing and spear phishing attacks that will attempt to take advantage of pandemic fears. Give visual examples, have your IT on high alert searching for phishing attempts and contact employees immediately when one gets through your firewall.</li>
<li><u>Do not access sensitive information on unauthorized devices</u>. The biggest culprit: cell phones. Have policies about what devices they are allowed to use to remotely access information and make sure they know. Never store sensitive information unencrypted on a portable device.</li>
<li><u>Do not access sensitive information on unsecure networks</u>. Like working from Starbucks because they have free WiFi? That may be fine for personal use, but not when you’re accessing sensitive information. Public WiFi makes it easy for a hacker to infiltrate your computer, stealing the information you accessed.</li>
</ol>
<h3>Determine Critical Processes and Access Control</h3>
<p>This is a key component to any Pandemic plan. Who is authorized to access sensitive information, and how do you ensure they can actually access sensitive information in a highly distributed environment? Minimize your exposure by controlling access to data. Not everyone working from home needs access to sensitive information. Make sure you lock down access to only essential employees. Follow through by monitoring who is accessing data, what they are accessing and why.</p>
<h3>Multifactor Authentication</h3>
<p>For those employees who need to access sensitive information, require multifactor authentication every time they remotely access a private server. This is an easy step to implement that can have a big impact on keeping cyber criminals out.  Explain to your employees why the two-factor authentication is an important safety capability.</p>
<h3>Network Access Control</h3>
<p>While you should train your employees not to access sensitive information on unsecure networks (see tip #1), you can implement access controls that actually block a user if they do not meet a certain level of security. You should implement a Virtual Private Network (VPN) which provides higher security for your workers using their home and/or public internet that are not secure.   It’s fairly easy and inexpensive to implement. For more information on VPNs, <a href="https://www.techradar.com/vpn/best-vpn">click here</a>.</p>
<h3>Encrypt Data</h3>
<p>If information is stored locally on a device, make sure it is encrypted. Portable devices are often stolen that contain sensitive information. A simple step of encryption protects your clients’ information and protects you from hefty breach costs and fines.</p>
<h3>Provide Company Devices</h3>
<p>Laptops and cell phones should always be running the most up to date version of an operating system available (i.e. Windows 10 vs Windows 8). They should also have up to date firewall protections and antivirus software. If employees are permitted to use personal devices, it is difficult to ensure these protections stay up to date. Providing company devices that are properly configured and regularly updated help strengthen the barrier against cyber criminals.</p>
<p>Protection doesn’t have to be complicated, but it does have to be intentional. Simple steps taken by the company and the employees can go a long way. While we want to stay physically safe through this wave of the Coronavirus, let’s make sure we stay cyber safe too.</p>
<p> Concerned if you have the right precautions and planning in place? Contact Third Rock at info@thirdrock.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/">Cyber Protection as Your Business Deals with Social Distancing</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8918</post-id>	</item>
		<item>
		<title>Announcing CyberCompass, LLC</title>
		<link>https://thirdrock.com/blog/2020/01/01/announcing-cybercompass-llc-2/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Wed, 01 Jan 2020 16:45:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[CyberCompass]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9326</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/01/01/announcing-cybercompass-llc-2/">Announcing CyberCompass, LLC</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Since 1995, Third Rock has been leading in improving privacy compliance and cybersecurity affordably. Starting with HIPAA compliance and seeing how healthcare was strapped with only spreadsheets as their only tool, Third Rock developed automation tools with built-in expertise to move their clients to faster and more complete cyber risk management.</p>
<p>“Healthcare organizations are highly-targeted by cyber threats yet have the lowest utilization of risk management software to help manage their risks.” stated Robert Felps, Third Rock CEO.    </p>
<p> <a href="https://cybercompass.co">CyberCompass®</a> cloud-based platform was born as a solution to automate the workflow and provide the navigation needed for businesses to protect themselves today and stay current as the cyber landscape and privacy laws evolve. Third Rock quickly saw that its solution was adopted by Texas Medical Liability Trust, the largest insurer of physicians in the country, Texas Health Services Authorization with its SecureTexas certification, and Texas Medical Association.</p>
<p>With the enactment of privacy laws and the expansion of the tool into other industries, CyberCompass has gone through significant and more user-friendly enhancements to save companies up to 70% of work hours.  The most powerful enhancement is the capability to do multiple regulations with one streamline assessment.  Excess Line Association of New York is currently offering CyberCompass as a free membership benefit so insurance brokers can meet New York Department of Finance 500 cybersecurity compliance certification. CyberCompass includes the following privacy and cybersecurity regulations: CCPA, CIS-20 GDPR, HIPAA, NAIC 668, NYDFS 500, NIST 171 800, and numerous state regulations.</p>
<p>Seeing the increased demand for the software and its ability to simplify cyber risk management, streamline privacy compliance and improve cybersecurity holistically, CyberCompass, LLC becomes effective on January 1, 2020. Spinning off as a separate entity, CyberCompass as well as its other tools such as CyberQuickCheck, will have greater flexibility to establish various distribution opportunities through resellers, value added resellers, strategic alliances, and partnerships. </p>
<p>“With CyberCompass as a separate legal entity, we have simplified the ability for our partners so we can develop more focused leadership and meet changing market demand faster,” stated Felps.</p>
<p>Do you have clients in need of holistic risk management across people, processes, technology and vendors? Learn more about <a href="https://cybercompass.co/partners/">partnering</a> with CyberCompass today to provide the most affordable and complete solution.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/01/01/announcing-cybercompass-llc-2/">Announcing CyberCompass, LLC</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9326</post-id>	</item>
		<item>
		<title>Travel Cyber Safe</title>
		<link>https://thirdrock.com/blog/2019/11/26/travel-cyber-safe/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Tue, 26 Nov 2019 15:21:23 +0000</pubDate>
				<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[juice jacking]]></category>
		<category><![CDATA[travel]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8689</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/11/26/travel-cyber-safe/">Travel Cyber Safe</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><!-- divi:paragraph --></p>
<p>The holidays get busy. Traveling is stressful and we aren’t always as vigilant as we should be. In today’s world of data breaches, identity theft and cybercrime, there are many things we know to be cautious about. You wouldn’t give away your credit card number or let a stranger have access to your driver’s license. But are cyber safe with your phone? We have become so dependent on our phones to store sensitive and private data. Sometimes forget that we need to protect it too.</p>
<h2><!-- /divi:paragraph --> <!-- divi:paragraph -->Let’s take a look at a scenario that could happen to any of us:</h2>
<p><!-- /divi:paragraph --></p>
<p><span style="font-size: 14px;"><em>T</em></span><em style="font-size: 14px;">he morning was a rush and you made it to the airport on time, thankfully. After getting through security, there is a little time to breath. You grab some coffee, check your phone and realize you forgot to charge it. Ugh. Your phone needs to be charged to last the whole flight and still have juice when you land. You notice a charging station near your gate. There are even cords already plugged in, so you don’t have to dig yours out of your mess of a bag. Score!</em></p>
<p><!-- /divi:paragraph --><!-- divi:paragraph --></p>
<p>You may not be as lucky as you feel. Cyber criminals are taking advantage of how dependent we are on our devices and their need to be charged. This new scam, known as “juice jacking” takes advantage of your connection to your phone.</p>
<p><strong style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">How does it work?</strong></p>
<p><span style="font-size: 14px;">Phone cords are designed for 2-way communication. Data can come in, but data also goes out. This can be seen every time you attach an iPhone to your computer and iTunes wants to download your data. Convenient when you want it, but bad when the criminals want it. Criminals download malware into the charging station or physically alter the charging station installing a cable connected to a virus laden device, and wait until you connect. They then have access to everything on your phone. What do you keep saved?</span></p>
<ul>
<li>Passwords?</li>
<li>Credit card information?</li>
<li>Communications?</li>
<li>Photos?</li>
</ul>
<p><span style="font-size: 14px;">Depending on the malware, they could download your data or install malware on your phone that will continue to monitor your usage. They might even lock you out of your phone completely. The biggest concern; you may never know. A week later you’re seeing fraudulent charges on an account and trying to figure out what happened. This is very similar to the card skimmers installed at gas stations.</span></p>
<p><strong style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">What can you do?</strong></p>
<p><span style="font-size: 14px;">Thankfully there are easy ways to avoid this scam.</span></p>
<ul>
<li>Use your own AC adapter and cord</li>
<li>Plug into a wall outlet, not a charging station</li>
<li>Use a “charge only” cord at a charging station</li>
<li>Use personal car chargers</li>
<li>Use a portable charger</li>
</ul>
<p> <strong style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">Be cyber safe this holiday season</strong></p>
<p><!-- divi:paragraph --></p>
<p>Physical security is important and easy to remember. We see our wallet; we protect our wallet. This holiday season, let’s also remember our cyber safety.<span style="font-size: 14px;"> </span></p>
<hr class="wp-block-separator" />
<p>&nbsp;</p>
<p><!-- /divi:separator --></p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2019/11/26/travel-cyber-safe/">Travel Cyber Safe</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8689</post-id>	</item>
		<item>
		<title>Brand Impersonation</title>
		<link>https://thirdrock.com/blog/2019/05/01/brand-impersonation/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Wed, 01 May 2019 14:00:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[brand impersonation]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[phishing scam]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=7156</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/05/01/brand-impersonation/">Brand Impersonation</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Have you ever received an email from a trusted company saying that your account needs maintenance? The only problem, you don’t have an account with that company. So why are they sending you an email? Most likely, it’s scammers using a popular technique called brand impersonation.</p>
<p>Brand impersonation has become so popular that 83% of all spear phishing attacks use this tactic. A scammer sends a very legitimate looking email, complete with logo and, what appears to be, legitimate email address. The goal is to get you to give up credentials or click on a malicious link. Some links take you to, again, what looks like a real website asking you to enter your login information to “fix” your account. These websites are actually hosted by the cybercriminal, and once you enter in your data, they have it. Nearly 1 in 5 attacks involve the impersonation of a financial institution, in order to gain access to your login, account numbers and other personal information. The highest impersonated company though is Microsoft, being used for 32% of known attacks.[1] If the cybercriminal can gain access to your email, they can monitor it without you knowing. Then they can learn details about you, send password resets from you valuable accounts and capture the email to login.</p>
<p><img data-recalc-dims="1" fetchpriority="high" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/brand-impersonation.jpg?resize=476%2C301&#038;ssl=1" width="476" height="301" alt="" class="wp-image-7159 aligncenter size-full" style="display: block; margin-left: auto; margin-right: auto;" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/brand-impersonation.jpg?w=679&amp;ssl=1 679w, https://i0.wp.com/thirdrock.com/wp-content/uploads/brand-impersonation.jpg?resize=300%2C189&amp;ssl=1 300w" sizes="(max-width: 476px) 100vw, 476px" /></p>
<p><strong>What to look for</strong><strong> </strong></p>
<p><strong> </strong></p>
<ul>
<li>Misspellings or questionable domain name in sender’s email</li>
<li>Misspellings or questionable domain name in any of the hyperlinks</li>
<li>Vague description of the “issue” with your account</li>
<li>If you click a link, check the web address it sends you to</li>
<li>Is this normal practice for the company to communicate with you?</li>
</ul>
<p><strong>Best practices to protect yourself</strong></p>
<ul>
<li>Make sure the information presented in the email actually matches your use of that product. (i.e. if you receive an email about an iTunes purchase, but haven’t made any purchases)</li>
<li>If you want to check your account, do not follow links in the email. Go to the company’s website directly to log in</li>
<li>When in doubt, call the company to ask about your account</li>
<li>Send the fake email to the legitimate company. Many companies invest in the protection of their customers and will investigate brand impersonations.</li>
<li>If you do make a mistake and type in your user id and password to an impersonating web site, immediately go to your real account and change the password.</li>
</ul>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1"><span>[1]</span></a> SPEAR PHISHING: TOP THREATS AND TRENDS • US 1.0 • Copyright 2019 Barracuda Networks, Inc. • barracuda.com</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2019/05/01/brand-impersonation/">Brand Impersonation</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7156</post-id>	</item>
		<item>
		<title>Is that email really from your boss?</title>
		<link>https://thirdrock.com/blog/2019/04/25/is-that-email-really-from-your-boss/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Thu, 25 Apr 2019 14:00:21 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[email spoof]]></category>
		<category><![CDATA[phishing scam]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=7129</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/04/25/is-that-email-really-from-your-boss/">Is that email really from your boss?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Email spoofs and phishing have greatly evolved in the last few years, with criminals upping their game to trick you. Instead of casting a wide net, criminals are utilizing Spear Phishing, a highly personalized attack. Attackers research their targets and craft a carefully designed message impersonating a seemingly trustworthy person or company. According to Beazley’s 2019 Breach Briefing, business email compromise increased 133% with financial institutions, healthcare and education being the top targets. While it only accounts for 6% of all spear phishing attacks, it has proven very lucrative for criminals.</p>
<p>Business email compromise (BEC) occurs when a cybercriminal uses a compromised email account or spoofs a legitimate email address to trick an employee into transferring money or sensitive data. The financial industry is the highest targeted due to their easy access to funds. An employee gets an email from a “senior executive” requesting a wire transfer, giving this attack its nickname of CEO fraud. Attackers use a sense of urgency in their emails to encourage quick action by the receiver without investigation. The FBI reports a loss of $12.5 billion since 2013 due to BEC.</p>
<p><span style="font-size: 14px;">Criminals must do their research to pull off a BEC attach successfully. They must learn names of employees, hierarchy of the company and who controls the funds. Then, using a spoofed or compromised attack, they send an email requesting a wire transfer with a fraudulent account number or sensitive data with financial information. These tend to not have any links or malicious attachments so they are hard to detect through email security. An email may look similar to this:</span></p>
<p><span style="font-size: 14px;"></span></p>
<p><span style="font-size: 14px;">                     From: Jane Johnson &lt;jane.johnson@conp.com&gt;</span></p>
<p>To: Michael Blake &lt;michael.blake@corp.com&gt;</p>
<p>Subject: Request</p>
<p>&nbsp;</p>
<p>Hey Michael,</p>
<p>Are you in the office? I need to process a bank transfer for me.</p>
<p>Give me a quick reply when you can get it done.</p>
<p>&nbsp;</p>
<p>Regards,</p>
<p>Jane Johnson</p>
<p>CEO, Corp Corporation</p>
<p>Cell: 408-292-2020</p>
<p>&nbsp;</p>
<p><span style="font-size: 14px;">On first glance it looks legitimate and has a sense of urgency. On closer inspection, you see the sender is using a spoof account of @conp.com instead of @corp.com. If this money is sent, it’s almost impossible to get back. This criminal did his research.</span></p>
<p><strong style="font-size: 14px;">Hard to Defend</strong></p>
<ul>
<li>
<p><strong> </strong><span style="font-size: 14px;">Targeted attacks that are not mass produced, so they aren’t flagged as spam</span></p>
</li>
<li>
<p>Emails come from reputable email services (gmail.com is used for 1 in 3 attacks)</p>
</li>
<li>
<p>No malicious links or attachments</p>
</li>
<li>
<p>Domain and display name spoofing make convincing impersonations</p>
</li>
<li>
<p>Compromised accounts used to send requests are even harder to trace</p>
</li>
<li>
<p>Social engineering tactics such as brevity, urgency, personalization and pressure increase chances of success</p>
</li>
</ul>
<p><strong>Steps to Protect your business</strong></p>
<ul>
<li>
<p>Enable multi-factor authentication for remote access to systems and apps</p>
</li>
<li>
<p>Implement regular anti-fraud training for your employees</p>
</li>
<li>
<p>Establish a process for employees who travel and need to request funds. Do not document the process in the network.</p>
</li>
<li>
<p>Limit the employees who have the authority to submit or approve wire transfers</p>
</li>
<li>
<p>Verify any vendor requests to change account details with verbal confirmation</p>
</li>
<li>
<p>Utilize artificial intelligence technology that recognizes when an account has been compromised</p>
</li>
</ul></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/04/25/is-that-email-really-from-your-boss/">Is that email really from your boss?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7129</post-id>	</item>
		<item>
		<title>Third Rock Crushed OCR Audit in less than 14 days</title>
		<link>https://thirdrock.com/blog/2018/08/29/third-rock-crushed-ocr-audit-in-less-than-14-days/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Wed, 29 Aug 2018 07:00:21 +0000</pubDate>
				<category><![CDATA[CyberCompass]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cyber risk assessment]]></category>
		<category><![CDATA[HIPAA audits]]></category>
		<category><![CDATA[OCR]]></category>
		<category><![CDATA[OCR audits]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5833</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/08/29/third-rock-crushed-ocr-audit-in-less-than-14-days/">Third Rock Crushed OCR Audit in less than 14 days</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" decoding="async" class="aligncenter size-medium wp-image-5731" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Screen-Shot-2018-06-06-at-10.02.14-AM.png?resize=300%2C161&#038;ssl=1" alt="" width="300" height="161" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Screen-Shot-2018-06-06-at-10.02.14-AM.png?resize=300%2C161&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Screen-Shot-2018-06-06-at-10.02.14-AM.png?resize=768%2C413&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Screen-Shot-2018-06-06-at-10.02.14-AM.png?w=801&amp;ssl=1 801w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>Do you have a looming cybersecurity compliance audit with a seemingly unrealistic deadline? This case study shows how Third Rock, using CyberCompass<strong>™</strong>, was able to meet a tight OCR deadline for a healthcare client. Our Rapid Response Team, using our automated risk management platform, CyberCompass<strong>™, </strong>delivered in less than 2 weeks what competitors claimed would take at least 10.  If you are facing a cybersecurity compliance audit, recently experienced a breach, <em>or</em> are in need of an information security checkup, contact us today to see what we can do for you: info@thirdrock.com | 512.310.0020.</p>
<p style="text-align: center;">Protect your Clients. Protect Your Organization. Protect Yourself.<strong>™</strong></p>
<p>Download the Case Study for more details.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/08/29/third-rock-crushed-ocr-audit-in-less-than-14-days/">Third Rock Crushed OCR Audit in less than 14 days</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5833</post-id>	</item>
		<item>
		<title>Meet Hayden</title>
		<link>https://thirdrock.com/blog/2018/08/24/meet-hayden/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Fri, 24 Aug 2018 16:00:11 +0000</pubDate>
				<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HIPAA Privacy]]></category>
		<category><![CDATA[patient health information]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5815</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/08/24/meet-hayden/">Meet Hayden</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>&nbsp;</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5816" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?resize=1024%2C683&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p><span style="margin: 0px; line-height: 107%; font-family: 'Calibri',sans-serif; font-size: 11pt;"><span style="color: #000000;">Meet Hayden. He was born at 7:23 am on May 3. He started breathing too soon and swallowed liquid which caused him to struggle to breath.  Within an hour of being born, he was taken to the NICU. For 2 days he received amazing care from the doctors and nurses. He was discharged, happy and healthy, ready to take on the world. His future is bright and open to all possibilities.  Or is it? While the hospital protected his body, are they protecting his personal information? Can someone steal his identity, potentially jeopardizing his future? Children are a common target of identity theft because there is a false belief they are too young to have any “valuable” credentials.  What are you doing to make sure the Hayden&#8217;s in your hospital are protected? Be cyber confident so your patients (and their parents) can be confident in you.</span></span></p>
<p style="text-align: center;"><strong>Protect your Patients. Protect your Organization. Protect Yourself.</strong>™</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/08/24/meet-hayden/">Meet Hayden</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5815</post-id>	</item>
	</channel>
</rss>
