<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Clint Eschberger, Author at Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/author/clint/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/author/clint/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Wed, 22 Jul 2020 18:29:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Clint Eschberger, Author at Third Rock</title>
	<link>https://thirdrock.com/blog/author/clint/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>New enhancement greatly simplify managing cyber risk</title>
		<link>https://thirdrock.com/blog/2019/12/02/new-enhancement-greatly-simplify-managing-cyber-risk/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Mon, 02 Dec 2019 17:13:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[CyberCompass]]></category>
		<category><![CDATA[upgrade]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9349</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/12/02/new-enhancement-greatly-simplify-managing-cyber-risk/">New enhancement greatly simplify managing cyber risk</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><span>We are pleased to announce six new enhancements that make using CyberCompass® even easier:</span></h2>
<p><span>As a main distributor of CyberCompass®, we are excited for how these new enhancements can help our customers better manage their cyber risk.</span></p>
<p><span></span></p>
<h3><span>Leading edge security</span></h3>
<ul>
<li><span>Added encryption means whether you’re just working in your account, uploading documents or downloading them, all your data is secure.</span></li>
</ul>
<h3><span>Encrypted Attachment Vault:</span><span>You asked, we delivered!</span><span></span></h3>
<ul>
<li><span>Seamless ability to upload multiple attachments with ease</span></li>
<li><span>More confidence while maintaining your required compliance documentation</span></li>
<li><span>Each file is encrypted for greater security</span></li>
<li><span>Electronically store and delete attachments at any time </span></li>
</ul>
<h3><span> </span><span>Expedite User Login</span></h3>
<ul>
<li><span>Token-based authentication for faster repeat logins</span></li>
</ul>
<h3><span> </span><span>New wider viewpoint with </span><span>more</span><span> pixels</span></h3>
<ul>
<li><span>The user view area is now wider on the web page</span></li>
<li><span>Increase the available real-estate on your screen</span></li>
<li><span>See more at one time</span></li>
</ul>
<h3><span> </span><span>New Remediation Issues List Layout</span></h3>
<ul>
<li><span>New redesigned issues layout provides more information at your fingertips. </span></li>
<li><span>Easier to interpret results with new graphs: provides you more information on true state of the issues at a glance</span></li>
<li><span>Updated Issues List provides more details including:</span>
<ul>
<li><span>Threat Rank</span></li>
<li><span>Last Activity</span></li>
<li><span>Assignment information</span></li>
<li><span>Notes Icon</span></li>
</ul>
</li>
<li><span>Simplified filtering to get to your information faster: format and filter to get to the issue that meets your business needs</span></li>
</ul>
<h3><span> </span><span>Issues View now has more flexibility to better manage</span></h3>
<ul>
<li><span>Traverse through issues using the “Previous” and “Next” buttons</span></li>
<li><span>Improved page layout for easier reading and updating.</span></li>
</ul>
<p><span>Are you looking for a solution to provide holistic coverage across your people, processes, technology and vendors? <a href="/contact-us">Contact us</a> today to start your journey toward cyber resilience.</span></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/12/02/new-enhancement-greatly-simplify-managing-cyber-risk/">New enhancement greatly simplify managing cyber risk</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9349</post-id>	</item>
		<item>
		<title>Is WannaCry still a threat?</title>
		<link>https://thirdrock.com/blog/2019/10/04/is-wannacry-still-a-threat/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Fri, 04 Oct 2019 16:45:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WannaCry]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8437</guid>

					<description><![CDATA[<p>WannaCry ransomware took the world by surprise in 2017, crippling systems worldwide. Do you think it's been eradicated? Think again.</p>
<p>The post <a href="https://thirdrock.com/blog/2019/10/04/is-wannacry-still-a-threat/">Is WannaCry still a threat?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><em>If it’s not broke, don’t fix it</em></h2>
<p>Many people think that as long as their computer is running at a good speed and everything is working, there is no need to upgrade. Why spend money when you don’t have to, right? Wrong! The technology world cannot run on the mantra “if it’s not broke, don’t fix it” because in reality, it is broken and you just don’t know it. The proof can be seen when WannaCry ransomware was unleashed on the world in May 2017.</p>
<p>It crippled over 300,000 machines in 150 countries by targeting vulnerabilities in Windows operating systems, hitting Windows 7 the most. While Windows patched many of these vulnerabilities, their focus was, and still is, on their active operating systems, primarily Windows 10. According to Windows “every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it&#8217;s no longer supported.”<a href="#_ftn1" name="_ftnref1"><span>[1]</span></a> What does this mean for your security?</p>
<table>
<tbody>
<tr>
<td width="126">Operating System</td>
<td width="138">Availability Date</td>
<td width="156">End of Life Date</td>
<td width="150">End of Mainstream Support Date</td>
<td width="150">End of Extended Support Date</td>
</tr>
<tr>
<td width="126">Windows XP</td>
<td width="138">October 25, 2001</td>
<td width="156">January 9, 2007</td>
<td width="150">April 14, 2009</td>
<td width="150">April 8, 2014</td>
</tr>
<tr>
<td width="126">Windows Vista</td>
<td width="138">January 30, 2007</td>
<td width="156">October 22, 2010</td>
<td width="150">April 10, 2012</td>
<td width="150">April 11, 2017</td>
</tr>
<tr>
<td width="126">Windows 7</td>
<td width="138">October 22, 2009</td>
<td width="156">October 31, 2013</td>
<td width="150">January 13, 2015</td>
<td width="150">January 14, 2020</td>
</tr>
<tr>
<td width="126">Windows 8</td>
<td width="138">October 26, 2012</td>
<td width="156">October 31, 2014</td>
<td width="150">January 8, 2018</td>
<td width="150">January 10, 2023</td>
</tr>
<tr>
<td width="126">Windows 8.1</td>
<td width="138">October 18, 2013</td>
<td width="156">September 1, 2015</td>
<td width="150">January 8, 2018</td>
<td width="150">January 10, 2023</td>
</tr>
</tbody>
</table>
<h2><em>Windows Lifecycle</em></h2>
<p>According to Windows’ lifecycle policy<a href="#_ftn2" name="_ftnref2"><span>[2]</span></a>, a product is designed to have a 5 year mainstream support lifecycle followed by a 5 year extended support cycle. During the mainstream support, consumers have access to free incident support, security update support and the ability to request non-security updates. When a product moves to the extended support stage, security updates are still provided but no new features or design changes are available, and not all products are covered.</p>
<p>After the end of extended support, security updates greatly decrease. According to Microsoft, “the Extended Security Update (ESU) program is a last resort option for customers who need to run certain legacy Microsoft products past the end of support. It includes Critical and/or Important security updates for a maximum of three years after the product’s End of Extended Support date.” Who determines what is critical and important? Microsoft of course. It would have to be a huge security breach, such as WannaCry, to justify the amount of money it would take to push out an update.</p>
<p><img data-recalc-dims="1" fetchpriority="high" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Issues-with-XP.png?resize=595%2C248&#038;ssl=1" width="595" height="248" alt="" class="wp-image-8442 aligncenter size-full" scale="0" srcset="https://thirdrock.com/wp-content/uploads/Issues-with-XP.png 595w, https://thirdrock.com/wp-content/uploads/Issues-with-XP-480x200.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 595px, 100vw" /></p>
<p style="text-align: center;">Image from Windows end of XP Support<a href="#_ftn3" name="_ftnref3"><span>[3]</span></a></p>
<h2><em>What’s the risk?</em></h2>
<p>If you are running an antiquated system on your home computer, that is a risk to your security and your personal information. Not smart, but not a worldwide catastrophe. However, having one device on your work network running an old system could be devastating.</p>
<p>Though Windows created security updates to counter WannaCry, it is still active on over 145,000 devices worldwide according to a survey by Armis<a href="#_ftn4" name="_ftnref4"><span>[4]</span></a>. If even one device on your network is infected, it creates a gateway for hackers to breach your security.</p>
<p>Armis discovered that within the past 6 months, 60% of organization in the manufacturing industry and 40% in the healthcare industry experienced at least one WannaCry attack. Why? Because they tend to have older technology which makes them an easy target.</p>
<p style="text-align: center;"><em><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/tech-old-Windows-systems.png?resize=562%2C294&#038;ssl=1" width="562" height="294" alt="" class="wp-image-8440 aligncenter size-large" scale="0" /></em><em style="background-color: #ffffff; font-size: 12px; text-align: right;">Percentage of old Windows OS versions by industry type (Retail, Technology, Healthcare, Manufacturing)</em><span style="background-color: #ffffff; font-size: 12px; text-align: right;"><em style="font-size: 12px;">4</em></span></p>
<h2><em>What’s the cost?</em></h2>
<p>It is estimated that the global effort to counter the original WannaCry attack in 2017 cost around $4 billion, including $325 million paid out in ransoms. The combined efforts to stop the attacks created the false sense of security that WannaCry is no longer a threat. This is just not true.</p>
<p>In the same way that tech companies develop better, faster and more efficient software, the criminals do too. Hackers do not stay docile. If one means to infiltrate your system fails, they look for a different back door. Having the most up to date software means that Windows is fighting those battles for you. Keeping an unsupported operating system is the same as lowering the drawbridge to the attacking army.</p>
<p>According to IBM’s Cost of a Breach Report 2019, the average cost of a breach in the United States is $8.2 million. With the average size of a breach being 25,575 records, that equates to $242 per record. Lost business was the biggest contributor to this total cost, with the average business losing $1.42 million<a href="#_ftn5" name="_ftnref5"><span>[5]</span></a>. It is hard to recover from the lack of trust a customer feels when their information was stolen on your watch.</p>
<h2><em>Next steps</em></h2>
<p>Where do you go from here? Even with these numbers, you may be asking yourself, can we really afford to find and update every device that is out of date? The bigger question is, can your business survive the cost of a breach if you don’t?</p>
<p>Start with our Cyber Quick Check to see what your cybersecurity score is. Our Security Risk Assessment includes multiple scans that pinpoint weak areas that are most vulnerable, including a full inventory of what is on your network. Don’t let your records be held ransom. Fight back with the right security.  If you’re still running Windows XP, Windows 7 or Windows Vista start an upgrade program today.  Replace your computers that have the oldest versions of Windows with new computers with the latest version of Windows as you can afford it.</p>
<p>Check your cyber score at <a href="https://cyberquickcheck.com/thirdrock">here</a></p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1"><span>[1]</span></a> <a href="https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet">https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet</a></p>
<p><a href="#_ftnref2" name="_ftn2"><span>[2]</span></a> <a href="https://support.microsoft.com/en-us/help/14085">https://support.microsoft.com/en-us/help/14085</a></p>
<p><a href="#_ftnref3" name="_ftn3"><span>[3]</span></a> <a href="https://www.microsoft.com/en-us/microsoft-365/windows/end-of-windows-xp-support">https://www.microsoft.com/en-us/microsoft-365/windows/end-of-windows-xp-support</a></p>
<p><a href="#_ftnref4" name="_ftn4"><span>[4]</span></a> <a href="https://armis.com/wannacry/">https://armis.com/wannacry/</a></p>
<p><a href="#_ftnref5" name="_ftn5"><span>[5]</span></a> IBM Security and Ponemon Institute. Cost of a Data Breach Report 2019. <a href="https://www.ibm.com/downloads/cas/ZBZLY7KL">https://www.ibm.com/downloads/cas/ZBZLY7KL</a></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2019/10/04/is-wannacry-still-a-threat/">Is WannaCry still a threat?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8437</post-id>	</item>
		<item>
		<title>CyberCompass® integrates CIS Top 20 Controls</title>
		<link>https://thirdrock.com/blog/2019/10/02/cybercompass-integrates-cis-top-20-controls/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Wed, 02 Oct 2019 18:24:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[CIS 20]]></category>
		<category><![CDATA[CyberCompass]]></category>
		<category><![CDATA[regulations]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9355</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/10/02/cybercompass-integrates-cis-top-20-controls/">CyberCompass® integrates CIS Top 20 Controls</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
<div class="et_pb_text_inner">
<div>CIS Controls were designed to help companies follow a workflow of best practices to proactively defend againt the most common attacks known on the market. With CIS’ recent release of version 7.1, <a href="https://cybercompass.co">CyberCompass®</a> now integrates these Top 20 controls . Our automated cyber risk management platform simplifies and reduces the effort for our clients needing to comply with CCPA, CIS-20, GDPR, HIPAA, NIST SP800-171, NYDFS and SECURETexas assessments.</div>
<div></div>
<div>Our risk management plan provides:</div>
<ul>
<li>multiple assessments</li>
<li>prioritized corrective actions</li>
<li>step-by-step guides</li>
<li>cyber training</li>
<li>policies and procedures</li>
<li>strategic plans</li>
<li>vendor compliance</li>
</ul>
<div>These and other great features will empower your organization to reduce your cyber risk.</div>
<div></div>
<div><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/20-chart.png?resize=646%2C854&#038;ssl=1" width="646" height="854" alt="" class="wp-image-9356 aligncenter size-full" srcset="https://thirdrock.com/wp-content/uploads/20-chart.png 646w, https://thirdrock.com/wp-content/uploads/20-chart-480x635.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 646px, 100vw" /></div>
<div></div>
<div>
<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
<div class="et_pb_text_inner">
<p><span>CyberCompass®</span><span> has implemented all three implementation groups, IG1, IG2 and IG3 of the CIS Top 20 Controls in the platform. We have also created IG1.5 for companies in between the IG1 and IG2 needs</span></p>
<p><span><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/implementation-groups.png?resize=1016%2C297&#038;ssl=1" width="1016" height="297" alt="" class="wp-image-9357 aligncenter size-full" srcset="https://thirdrock.com/wp-content/uploads/implementation-groups.png 1016w, https://thirdrock.com/wp-content/uploads/implementation-groups-980x286.png 980w, https://thirdrock.com/wp-content/uploads/implementation-groups-480x140.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1016px, 100vw" /></span></p>
<div><span>If your company is expected to comply with the framework of CIS-20, <a href="/contact-us">call us</a> today to plan your assessment and begin your journey toward cyber resilience.</span></div>
<div><span></span></div>
<div><span>About CIS</span></div>
<div><span>CIS</span><sup>®</sup><span> (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. The CIS Controls</span><sup><span> </span></sup><span>and CIS Benchmarks</span><sup><span> </span></sup><span>are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. These proven guidelines are continuously refined and verified by a volunteer, global community of experienced IT professionals. Our CIS Hardened Images</span><span>™</span><span> are virtual machine emulations pre-configured to provide secure, on-demand, and scalable computing environments in the cloud. CIS is home to both the Multi-State Information Sharing and Analysis Center</span><sup>®</sup><span> (MS-ISAC</span><sup>®</sup><span>), the go-to resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial government entities, and the Elections Infrastructure Information Sharing and Analysis Center™ (EI-ISAC™), which supports the cybersecurity needs of U.S. State, Local and Territorial elections offices. </span><span> To learn more, visit </span><a href="https://www.cisecurity.org/" target="_blank" rel="noopener noreferrer">CISecurity.org</a><span> or follow us on Twitter: </span><a href="https://twitter.com/CISecurity" target="_blank" rel="noopener noreferrer">@CISecurity</a><span>.</span></div>
</div>
</div>
</div>
</div>
</div></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2019/10/02/cybercompass-integrates-cis-top-20-controls/">CyberCompass® integrates CIS Top 20 Controls</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9355</post-id>	</item>
		<item>
		<title>The Most Common Mistakes in Cybersecurity are Preventable</title>
		<link>https://thirdrock.com/blog/2017/10/12/the-most-common-mistakes-in-cybersecurity-are-preventable/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Thu, 12 Oct 2017 14:00:59 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[human firewall]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[strong passwords]]></category>
		<category><![CDATA[training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4664</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/10/12/the-most-common-mistakes-in-cybersecurity-are-preventable/">The Most Common Mistakes in Cybersecurity are Preventable</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4665 size-medium" style="margin-bottom: 5px; margin-right: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/laptop_lock.jpg?resize=300%2C225&#038;ssl=1" alt="" width="300" height="225" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/laptop_lock.jpg?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/laptop_lock.jpg?w=500&amp;ssl=1 500w" sizes="(max-width: 300px) 100vw, 300px" />Many of the issues we see in cybersecurity, whether you are in healthcare, retail, finance, etc., are by and large preventable. It is not about having a big budget or a large team of experts. No, some of it is just common sense. It is not unlike driving a car. When driving a car you take several basic, yet important, steps to try and lower your risk of an accident. You look both ways at a stop sign, you drive safely to avoid losing control, you keep your car in working condition, and just in case you are in an accident, you&#8217;re protected by your auto insurance.</p>
<p>Nothing really difficult. Does it mean you will never have an accident? Of course not, but you significantly <em>lower your risk</em>.</p>
<p>When trying to protect your organization&#8217;s information, some of the worst &#8211; and most common &#8211; information security errors are also the ones that are the most preventable. Let&#8217;s take a look&#8230;</p>
<p><strong>Vigilance</strong> is often the first step. What do I mean, by vigilance? It is simply not taking security for granted. Far too often I hear, &#8220;The chances something will happen to us are so small.&#8221;  That always sounds good, <em>until something happens</em>.</p>
<p><strong>Antivirus</strong> is something that is surprisingly overlooked. It is not always that organizations forget to install it, it is that they forget to keep it updated and the license renewed. If your Antivirus is outdated, for any reason, it is almost as bad as having no protection.</p>
<p><strong>Email security</strong> is often overlooked, even though it is one of the easiest targets for hackers and cyber-thieves. Whether it is due to lack of end-user training or lack of security in place, it is a huge target for hackers. First and foremost your email users should be trained on proper email safety, such as how to avoid phishing messages.</p>
<p><strong>Firewalls</strong> these days are often the first line of defense and for smaller shops they are often setup by the internet service provider. The bad thing about that is the provider often leaves the default username and password in place which allows hackers to easily gain access to the firewall and let themselves in the door without knocking. This is generally a very easy change that takes only a few minutes to correct.</p>
<p>Speaking of <strong>passwords</strong>! I hate to break it to you, &#8220;1234&#8221; or &#8220;password&#8221; is a really, really poor password.</p>
<p>Finally, one of the most common mistakes in cybersecurity is&#8230;</p>
<p><strong>Backups</strong>! I know some are saying, &#8220;What do backups have to do with cybersecurity?&#8221;</p>
<p>EVERYTHING!</p>
<p>Not unlike having insurance for your car, it is only important when you need it the most. Backups are your insurance for bad things happening, whether it is a cybersecurity issue, an accidental file deletion, or a disaster. Having backups that are stored securely offsite are <em>one of the most important steps to protect your business</em>. There are many options to fit all budgets and organizations.</p>
<p>The biggest thing from all of this is to simply not overlook cybersecurity. I know it is easy to say, &#8220;It won&#8217;t happen to me.&#8221; but the odds are it will.</p>
<p>So, buckle up!</p>
<p>In recognition of October being <strong>National Cybersecurity Awareness Month</strong>, Third Rock is offering a <a href="http://cyberquickcheck.com/">FREE mini-Risk Assessment</a> to promote the role cybersecurity plays in protecting your patients, your practice and yourself.  In addition, we welcome you to visit our HIPAA and Cybersecurity <a href="https://thirdrock.com/resources/">Resources page</a>.  Do you have a cybersecurity question you&#8217;d like answered?  Email us at <a href="mailto:info@thirdrock.com?subject=National%20Health%20IT%20Week" target="_blank" rel="noopener noreferrer">info@thirdrock.com</a> or give us a call at 512.310.0020.  We&#8217;d be more than happy to help!</p>
<p style="text-align: center;"><strong>Protect Your Patients.  Protect Your Practice.  Protect Yourself.™</strong></p>
<h2></h2></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/10/12/the-most-common-mistakes-in-cybersecurity-are-preventable/">The Most Common Mistakes in Cybersecurity are Preventable</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4664</post-id>	</item>
		<item>
		<title>Think you can take your time when breached? Think Again!</title>
		<link>https://thirdrock.com/blog/2017/09/13/think-you-can-take-your-time-when-breached-think-again/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Wed, 13 Sep 2017 19:13:02 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[PHI]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4493</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/13/think-you-can-take-your-time-when-breached-think-again/">Think you can take your time when breached? Think Again!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1055" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/money-trash.jpg?resize=200%2C271&#038;ssl=1" alt="" width="200" height="271" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/money-trash.jpg?resize=221%2C300&amp;ssl=1 221w, https://i0.wp.com/thirdrock.com/wp-content/uploads/money-trash.jpg?w=250&amp;ssl=1 250w" sizes="(max-width: 200px) 100vw, 200px" />In January of this year, the <a href="https://www.hhs.gov/ocr/index.html">HHS Office of Civil Rights</a> levied a $475,000 fine against Presence Health for taking too long to notify their patients &#8211; as well as the OCR &#8211; after discovering the breach of PHI (protected health information).&nbsp;The incident occurred in October 2013 when Presence Health, based in Illinois, discovered that hundreds of physical documents containing patient names, birth dates, medical record numbers, and surgery details for 836 patients were missing. &nbsp;They did not report the breach to the OCR until Jan, 31, 2014 — 100 days after the incident occurred.</p>
<p>This was the first HIPAA fine &#8220;<em>solely based on an unnecessary delay to breach notification</em>&#8221; (<a href="https://www.hipaajournal.com/475000-settlement-delayed-hipaa-breach-notification-8640/">HIPAAJournal</a>).</p>
<p>Now, CoPilot Provider Support Services, Inc., a business associate based in New York, is under investigation for delayed reporting of a breach of ePHI (electronic protected health information). An unauthorized person accessed and downloaded 221,178 individuals&#8217; sensitive information in October 2015, but CoPilot didn&#8217;t involve the FBI until February 2016 and didn&#8217;t issue breach notifications to patients or the media until January 2017.&nbsp;Oops! The OCR is still investigating whether CoPilot is a HIPAA-covered entity, but the NY State Attorney General levied a $130,000 fine in June for violation of state law, according to an <a href="https://ag.ny.gov/press-release/ag-schneiderman-announces-settlement-healthcare-services-company-illegally-deferred">announcement </a>from the Attorney General&#8217;s Office.</p>
<p>Healthcare entities cannot <em>afford</em> to delay breach notification. Here&#8217;s a summary of the basic notification requirements outlined in the&nbsp;<a href="https://www.hhs.gov/hipaa/for-professionals/breach-notification">Breach Notification Rule:</a></p>
<ul>
<li>A covered entity <span style="text-decoration: underline;">must</span> notify the Secretary of Health and Human Services (via their portal) if it discovers a breach of <em>unsecured</em> protected health information.
<ul>
<li>&nbsp;If the breach affects <span style="text-decoration: underline;">500 or more</span> individuals, the covered entity must notify HHS/OCR &#8220;without unreasonable delay and in no case later than 60 calendar days from the discovery of the breach.&#8221; (HHS.gov)</li>
<li>If a breach affects <span style="text-decoration: underline;">fewer than 500 individuals</span>, the covered entity must notify HHS/OCR&nbsp;&#8220;within 60 days of the end of the calendar year in which the breach was discovered.&#8221; It is NOT necessary to wait until the end of the calendar year.</li>
</ul>
</li>
<li>Regardless of the size of the breach, a covered entity <span style="text-decoration: underline;">must</span> notify patients &#8220;in written form by first-class mail&#8230;or by e-mail&#8221; (if an individual has agreed to email communication)&nbsp;&#8220;without unreasonable delay and in no case later than 60 days following the discovery of a breach.&#8221;</li>
<li>If a breach affects more than 500 individuals, the covered entity <span style="text-decoration: underline;">must</span> also notify the media.</li>
</ul>
<p>More detailed instructions for dealing with incomplete or out of date contact information can be found on the HHS website.</p>
<p>These incidents and resulting fines should serve as a wake-up call to the industry &#8211; take action sooner rather than later!</p>
<p style="text-align: center;">Join our free monthly&nbsp;<a href="http://thirdrock.us3.list-manage2.com/subscribe?u=1649a45c35ac1a873bb99bdb8&amp;id=7d7bf2b255">newsletter</a>&nbsp;to stay up-to-date on HIPAA and cybersecurity.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/09/13/think-you-can-take-your-time-when-breached-think-again/">Think you can take your time when breached? Think Again!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4493</post-id>	</item>
		<item>
		<title>What happens when someone submits a HIPAA complaint?</title>
		<link>https://thirdrock.com/blog/2017/08/24/what-happens-when-someone-submits-a-hipaa-complaint/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Thu, 24 Aug 2017 14:00:49 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[culture of compliance]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA fines]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4289</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/08/24/what-happens-when-someone-submits-a-hipaa-complaint/">What happens when someone submits a HIPAA complaint?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p class="alignnone" style="margin-top: 5px; margin-right: 10px;"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-816" style="margin-right: 10px; margin-top: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/angry_auditor-hhs-audit-723x484.jpg?resize=250%2C167&#038;ssl=1" alt="" width="250" height="167" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/angry_auditor-hhs-audit-723x484.jpg?resize=300%2C201&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/angry_auditor-hhs-audit-723x484.jpg?resize=723%2C484&amp;ssl=1 723w" sizes="(max-width: 250px) 100vw, 250px" />You may not realize how easy it is for someone to submit a complaint about your organization. However, if you are not prepared, what happens after that submission is not something you will soon forget!</p>
<p>This is why HIPAA compliance must be a <em>culture</em> and not just a piece of paper. While someone WILL submit a complaint against you at some point, if you have a <em>culture of compliance</em> in place, there should be little to no effect on your business. If you just run through a simplified checklist once a year, however, and do not enforce the policies and procedures, you will be putting your patients &#8211; and your organization &#8211; at serious risk.</p>
<h4>First, who can submit a HIPAA complaint to the OCR?</h4>
<p>This is the scary part &#8211; a<em>nyone</em> who believes a covered entity is not complying with HIPAA in any way can submit a complaint! The complaint can be submitted directly to the OCR or to the Compliance Officer at the covered entity.</p>
<h4>Next, a high level overview of what happens next&#8230;</h4>
<p><strong>I. Review</strong></p>
<p>During this step the OCR will review the complaint. They will decide, based on the criteria listed below, if they can or will take action:</p>
<ul>
<li>Did the activity occur after HIPAA’s effective dates:  April 14, 2003 for violations of the Privacy Rule and<br />
April 20, 2005 for violations of the Security Rule?</li>
<li>Is the healthcare organization a Covered Entity that is required to comply with HIPAA’s Privacy Rule and Security Rule?</li>
<li>If the complaint is accurate, would the alleged activity be a violation of HIPAA’s Privacy or Security Rules?</li>
<li>Was the complaint filed within 180 days of the date the complainant knew (or should have known) of the violation?  The OCR has discretion to waive this requirement for good cause.</li>
</ul>
<p>During this review, if the complaint includes a possible criminal violation, the OCR can report the complaint to the U.S. Department of Justice (DOJ) for review. See the <a href="https://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/examples/what-OCR-considers-during-intake-and-review/index.html">OCR website</a> for more detail about this step in the process.</p>
<p><strong>II. Investigation</strong></p>
<p>During the Investigation step, the OCR will notify the complainant if their complaint has been accepted. The reported organization will also be notified. The OCR will contact both the complainant and the reported organization with follow-up questions about the incident. They will also work to gather evidence about the reported incident and ask for a copy of the organization&#8217;s policies and procedures, required risk assessments, and other related documents.</p>
<p><strong>III. Resolution</strong></p>
<p>After the OCR completes the investigation, they will review the gathered information and make a decision on how to move forward. They may attempt to resolve the case in several ways which may include a combination of the following:</p>
<ul>
<li>Voluntary Compliance</li>
<li>Corrective Action Requirements</li>
<li>Resolution Agreement</li>
<li>Civil Monetary Penalties</li>
</ul>
<p>Entities who may be facing Civil Monetary Penalties may have additional rights, such as the right to a hearing before an administrative law judge to determine whether the penalties are supported by the evidence.</p>
<p><em><strong>It&#8217;s not over yet! Once you go through this process, you will be audited by the OCR.</strong> </em></p>
<p>When the audit happens, the OCR can and will likely find other non-compliance issues. This will add to the penalty and can cost your company 100&#8217;s of thousands of dollars or well into the million dollar range.</p>
<p>The question is not IF, but WHEN someone submits a complaint. There are many reasons a patient or family member might submit a complaint. Once that complaint has been submitted, the OCR will have their eye on your organization.</p>
<p>If you need assistance establishing a <em>culture of compliance</em> please contact us at <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a></p>
<p style="text-align: center;"><strong>Protect Your Patients.  Protect Your Practice.  Protect Yourself.™</strong></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/08/24/what-happens-when-someone-submits-a-hipaa-complaint/">What happens when someone submits a HIPAA complaint?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4289</post-id>	</item>
		<item>
		<title>Focus on Security: In plain sight</title>
		<link>https://thirdrock.com/blog/2017/07/27/focus-on-security-in-plain-sight/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Thu, 27 Jul 2017 14:00:58 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=4110</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/07/27/focus-on-security-in-plain-sight/">Focus on Security: In plain sight</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/secure_doc1.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4111" style="margin-bottom: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/secure_doc1.jpg?resize=225%2C150&#038;ssl=1" alt="" width="225" height="150" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/secure_doc1.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/secure_doc1.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/secure_doc1.jpg?w=933&amp;ssl=1 933w" sizes="(max-width: 225px) 100vw, 225px" /></a>Sometimes we tend to focus strictly on the technical side of security and compliance and fail to notice the very important issues hiding in plain sight. While a hacker breaking into your network and stealing ePHI is the threat that is being talked about the most, it is sometimes the overlooked old-fashioned threats that present the greater risk.</p>
<p>Think about how many times a patient record has been sitting somewhere and how long does it actually take for someone to pick it up and walk off? What about allowing easy access to documents or equipment that contain sensitive data? Over the years we have seen clients forget some of the simple things that they could do to protect patient information.</p>
<p><strong>Below is a simple walk-through checklist</strong> that you can use to recognize and fix security issues that may be hiding in plain sight&#8230;</p>
<ol>
<li>Have any documents been left on the counter face up when not in use?</li>
<li>Have patient documents been left on a surface that is accessible to patients, visitors, vendors, etc.?</li>
<li>Have paper charts been left unattended where someone could grab them while walking down a hall?</li>
<li>Are all discarded documents containing PHI shredded or placed in a locked container to await shredding?</li>
<li>Have security cameras been installed to track unauthorized access to anywhere patient data could be found?</li>
<li>When calling a patient from the waiting room, do staff use only the patient&#8217;s name, and preferably only a first name?</li>
<li>Have staff logged out of all unattended computers, especially those in exam rooms and publicly-accessible hallways?</li>
<li>Do you and your staff lock unattended rooms that could provide access to the network or computer equipment?</li>
<li>Is the back door (or other secondary entrance) ever left open or unlocked for any reason?</li>
<li>Do you and your staff lock offices when unattended?</li>
</ol>
<p>Sometimes, just by walking through on a weekly basis you can find simple issues that need to be addressed. We recommend doing this during business hours as you want to see what your visitors see. Not only will this help you be more vigilant in your security, but it will allow visitors to rest easier seeing that you are actively taking steps to protect them and their health information.</p>
<p style="text-align: center;"><strong>Protect Your Patients.  Protect Your Practice.  Protect Yourself.™</strong></p>
<p style="text-align: center;"><a href="mailto:info@thirdrock.com">info@thirdrock.com</a> | 512.310.0020</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/07/27/focus-on-security-in-plain-sight/">Focus on Security: In plain sight</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4110</post-id>	</item>
		<item>
		<title>Closing the Cybersecurity Gap</title>
		<link>https://thirdrock.com/blog/2017/07/06/closing-the-cybersecurity-gap/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Thu, 06 Jul 2017 14:00:45 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber criminals]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[hipaa]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=4022</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/07/06/closing-the-cybersecurity-gap/">Closing the Cybersecurity Gap</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4024" style="margin-right: 10px; margin-top: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/bridge_gap-500.jpg?resize=235%2C217&#038;ssl=1" alt="" width="235" height="217" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/bridge_gap-500.jpg?resize=300%2C277&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/bridge_gap-500.jpg?w=500&amp;ssl=1 500w" sizes="(max-width: 235px) 100vw, 235px" />As we hear more and more about breaches and ransomware in businesses and especially healthcare, it is becoming an even greater concern for healthcare business owners. <em>It is no longer&nbsp;<strong>if</strong> you will be attacked, but <strong>when</strong> and <strong>how often</strong>.</em></p>
<p><strong>The first step </strong>in closing the cybersecurity gap is to realize that<strong> you can&#8217;t do it on your own.</strong> Cybersecurity is not finding your basic &#8220;IT guy&#8221; that &#8220;can fix it&#8221;. <strong>It is about obtaining the right resource</strong> whether that is a full time hire or a managed service.</p>
<p><strong>The next thing</strong> to realize with cybersecurity is that <strong>it is not a one time fix</strong>, but is ongoing and continually changing to meet the new challenges coming out every day. This is not just adding a firewall, anti-virus, patches, etc. <strong>It is a plan</strong>, a mentality that evolves over time.</p>
<p><strong>HIPAA is actually a good start towards good cybersecurity, <em>but it is not everything.</em> </strong>We all like to complain about HIPAA, but it is actually a great guide to getting your business far more secure and ready to be secure. However, to truly close the cybersecurity gap, no static documents and processes will keep you continuously secure by themselves.</p>
<p><strong>Why worry?</strong></p>
<p><strong>One breach can close your business!</strong> Think about your business being down for days, weeks, or even longer. How long can you survive? What about a breach where patient data gets stolen and leaked!! Now you have to go through notifying the government <em>and</em> the public, HIPAA audits, and major fines.</p>
<p><strong>Keep in mind there are 4 tiers of HIPAA fines.</strong> If you have a proper HIPAA risk assessment and cybersecurity plan, those fines will be significantly reduced. If not, you could see fines of $50,000 PER PATIENT RECORD.</p>
<p><strong>Time to close that GAP!!</strong></p>
<p style="text-align: center;"><strong>Protect Your Patients. &nbsp;Protect Your&nbsp;Practice. Protect Yourself™.</strong></p>
<p style="text-align: left;">If you have questions concerning establishing a cybersecurity plan or about HIPAA, including how to conduct a Security Risk Assessment or how to best remediate identified risks, please contact us:&nbsp;<a href="mailto:info@thirdrock.com">info@thirdrock.com</a>; 512.310.0020. &nbsp;We&#8217;d be happy to help!</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/07/06/closing-the-cybersecurity-gap/">Closing the Cybersecurity Gap</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4022</post-id>	</item>
		<item>
		<title>HIPAA &#8211; Standard Operations for Business</title>
		<link>https://thirdrock.com/blog/2017/06/08/hipaa-standard-operations-for-business/</link>
					<comments>https://thirdrock.com/blog/2017/06/08/hipaa-standard-operations-for-business/#comments</comments>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Thu, 08 Jun 2017 14:00:20 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[standard operating procedures]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3885</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/06/08/hipaa-standard-operations-for-business/">HIPAA &#8211; Standard Operations for Business</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3887" style="margin-bottom: 5px; margin-right: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/procGears-300x294.jpg?resize=225%2C221&#038;ssl=1" alt="" width="225" height="221" /></p>
<p>HIPAA gets a bad rap &#8211; and deservedly so. However, most of that bad rap is because it is set up in a typical government fashion that is hard to understand and make sense of. When you look at the HIPAA laws and guidelines, it is not long before you become more perplexed than you were before.</p>
<p>However, once you get past the government&#8217;s idea of light reading, or by using our CompassDB tool which translates it into a humanly readable language, you realize that the HIPAA guidelines are not really all that cumbersome. In reality, they are your standard operating procedures for your business in a template that can cover many different types of organizations.</p>
<p>If you think about it, we should all want our business to continue no matter what happens. We all want to be resilient to threats, both internal and external, as they can affect our way of life. The Security Risk Analysis required by HIPAA (and MACRA and Meaningful Use) helps you identify security threats to your business. The other HIPAA requirements guide you on how to become more resilient when dealing with the threats.</p>
<p>By following the standards set forth by HIPAA, you drastically reduce your liability and your risk of business disruption.</p>
<p><strong>Protect Your Patients.  Protect Your Practice. Protect Yourself™.</strong></p>
<p>If you have questions about HIPAA, including how to conduct a Security Risk Assessment or how to best remediate identified risks, contact us: <a href="mailto:info@thirdrock.com">info@thirdrock.com</a>; 512.310.0020.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/06/08/hipaa-standard-operations-for-business/">HIPAA &#8211; Standard Operations for Business</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://thirdrock.com/blog/2017/06/08/hipaa-standard-operations-for-business/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3885</post-id>	</item>
		<item>
		<title>Best Defense Against Ransomware is a Good Backup</title>
		<link>https://thirdrock.com/blog/2017/05/16/best-defense-against-ransomware-is-a-good-backup/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Tue, 16 May 2017 07:00:00 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[backup & recovery]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3764</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/05/16/best-defense-against-ransomware-is-a-good-backup/">Best Defense Against Ransomware is a Good Backup</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3765" style="margin-right: 10px; margin-top: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/wannacry_05-300x227.png?resize=275%2C208&#038;ssl=1" alt="" width="275" height="208" /></p>
<p>By now, most have heard or been affected by the WannaCry ransomware that has spread to over 150 countries at last count.</p>
<p>The WannaCry ransomware started taking over users&#8217; files on Friday, demanding $300 to restore access.</p>
<p>Hundreds of thousands of computers have been affected so far. Computer giant Microsoft said the attack should serve as a wake-up call.</p>
<p>The first line of defense in this is always having a <strong><em>properly maintained firewall</em></strong> both on your network and on each individual computer system. However, as we all know, your network can and will be breached at some point, whether or not it is due to WannaCry or some other ransomware or virus; it will happen.</p>
<p><strong>What is the best defense against ransomware and other malware?</strong></p>
<p><em><strong>A good backup!</strong></em></p>
<p>It sounds simple, but amazingly most either are not doing backups or not verifying that the backup works. I worked with an organization that had been backing up for several years, but had never tested restoring the files. Well, they got hit with a bad virus, and it was determined that restoring the previous day&#8217;s backup would be the best way to recover. Unfortunately, the backup was corrupted and would not work. We went back to previous days and weeks, and <em>none</em> of their backups were good.</p>
<p>Having a backup is not good for anything if you can&#8217;t actually recover the data when you need it.</p>
<ol>
<li> To get started, <em><strong>investigate business level backup systems</strong></em> that will work in your environment. It truly is a case by case basis on which backup system is right for your organization; depending on size, speed, hours, etc.</li>
<li><strong><em>Schedule restore tests</em></strong> on a regular basis to make sure that you have a valid backup that you can recover from in the case of an attack.</li>
<li><strong><em>Maintain the backup system</em></strong> to ensure that it is considered &#8220;mission critical&#8221; as it is the last line of defense for your entire business.</li>
</ol>
<p><strong>Bottom line:  Stay ahead of ransomware by maintaining complete, working backups!</strong></p>
<p>For questions about how to evaluate and improve your own backup practices or for a comprehensive Security Risk Assessment, contact us at info@ThirdRock.com.</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/05/16/best-defense-against-ransomware-is-a-good-backup/">Best Defense Against Ransomware is a Good Backup</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3764</post-id>	</item>
	</channel>
</rss>
