<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Ed Jones, PMP, CHSP, Author at Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/author/ed-jones/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/author/ed-jones/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Thu, 21 Nov 2019 19:32:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Ed Jones, PMP, CHSP, Author at Third Rock</title>
	<link>https://thirdrock.com/blog/author/ed-jones/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Prevention is Cheaper than Correction</title>
		<link>https://thirdrock.com/blog/2019/11/22/prevention-is-cheaper-than-correction/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Fri, 22 Nov 2019 15:00:59 +0000</pubDate>
				<category><![CDATA[In the News]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA Security]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8681</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/11/22/prevention-is-cheaper-than-correction/">Prevention is Cheaper than Correction</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>The healthcare industry led the nation in regulations for information security. In an effort to protect private health information (PHI), healthcare organizations are required to protect patient data against <em>any reasonably anticipate threats or hazards</em>.  You are required to perform risk assessments, but knowing your risk is not enough. Steps must be taken to fix issues and prevent data loss. Most other industries and states are joining the bandwagon with regulations of their own. The basics are the same: do your due diligence to protect data or face the consequences.</p>
<p>&nbsp;</p>
<h2><em>The Breach</em></h2>
<p>The University of Rochester Medical Center (URMC) recently agreed to a $3,000,000 settlement with the Office of Civil Rights (OCR). URMC reported data loss in 2013 when an unencrypted flash drive was lost. They again reported a breach when a personal laptop with unencrypted ePHI was stolen from a treatment facility. The fine may seem steep when you think that only 43 patients’ data was on the stolen laptop. The bigger issue, however, was the lack of progress in breach prevention from the first to the second incident.</p>
<p><em style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">The Cost</em></p>
<p><span style="font-size: 14px;">Beyond the fine to the OCR, breaches can cost a company much more. According to the IBM Security Cost of a Data Breach Report 2019, healthcare is the industry with the highest average cost at $6.45 million, not including fines. Lost business was the largest contributing factor to this total, accounting for 36% of the total cost. Other factors include detection and reporting, notification of affected parties and post breach clean up.</span></p>
<p> <em style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">Corrective Action</em></p>
<p><span style="font-size: 14px;">The list of requirements mandated by the OCR look very similar to the actions that are expected to prevent the breach in the first place.</span></p>
<ul>
<li>Conduct a Risk Analysis</li>
<li>Implement a Risk Management Plan</li>
<li>Implement customized Policies and Procedures</li>
<li>Train your staff</li>
<li>Create and maintain a body of compliance evidence</li>
</ul>
<h2><em>Prevention is always cheaper</em></h2>
<p><span style="font-size: 14px;">URMC is facing a guaranteed loss of $3,000,000 plus other expenses in breach clean up, notification and potential loss of business. The cost of our cyber risk management from assessment, reporting and remediation starts at $699/year for a small organization. Our automated tool, CyberCompass™, puts you in charge of your cyber risk, cybersecurity and compliance. Addressing all the requirements listed above, we also save you 70% of the typical cost, time and effort. An easy to use dashboard prioritizes your corrective actions, allowing you to work through them at your own pace. With built in regulations for most industries, start your move toward Cyber Confidence® today.</span></p>
<p> <span style="font-size: 14px;">Contact Us for more details or visit thirdrock.cybercompass.co</span></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/11/22/prevention-is-cheaper-than-correction/">Prevention is Cheaper than Correction</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8681</post-id>	</item>
		<item>
		<title>IT Responsibly: Defend your Territory</title>
		<link>https://thirdrock.com/blog/2019/10/18/it-responsibly-defend-your-territory/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Fri, 18 Oct 2019 14:00:28 +0000</pubDate>
				<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[CyberAware]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8628</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/10/18/it-responsibly-defend-your-territory/">IT Responsibly: Defend your Territory</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In the days of old, people built giant walls to defend their land. It was easy to see the invading army approach. Pull up the drawbridge, light the arrows and defend your city. Today, the walls are digital and the invaders are invisible and often robots; sneaking in the back door or under the radar, pretending to be someone we trust or attacking out of nowhere. So how do we defend our territory in a modern technology age?</p>
<p>&nbsp;</p>
<h2><strong><em>Ditch the passwords</em></strong></h2>
<p>Passwords are the first line of defense in protecting your private information. The problem with passwords though is that if you make them strong, they can be hard to remember. And if you follow the sound advice to not use the same password on any site, you may think you have to remember 30 plus long, hard to remember passwords! To this I give you 2 suggestions:</p>
<ol>
<li>Get a password manager – Don’t trust Google to save your passwords. (see previous blog) A password manager is a vault to place all those hard to remember passwords in a secure location. Read Consumer Advocate’s top ten choices in their article <a href="https://www.consumersadvocate.org/password-manager/a/best-password-manager?pd=true&amp;keyword=password%20manager%20reviews&amp;bca_campaignid=333237838&amp;bca_adgroupid=1217159630398009&amp;bca_matchtype=e&amp;bca_network=o&amp;bca_device=c&amp;msclkid=d7d70723a82d13ab59d85abdb5de1bb0&amp;utm_source=bing&amp;utm_medium=cpc&amp;utm_campaign=zh%20Password%20Manager&amp;utm_term=password%20manager%20reviews&amp;utm_content=Password%20Manager%20Reviews" target="_blank" rel="noopener noreferrer">here</a></li>
<li>Use passphrases – Instead of hard to remember letter, number and character combinations, use a full phrase as your password. Pick something you can remember and add modifications to in order to have a unique phrase for different sites. For example, “BobandSusan’sbankaccount!”</li>
</ol>
<p>&nbsp;</p>
<h2><strong><em>Multi-factor Authentication</em></strong></h2>
<p>Requiring 2 forms of verification is becoming a popular and simple way to secure data. Here’s an example one of my money accounts uses. I’m asked for the email, username, or phone number associated with my account. Once entered, I am then asked for a code that will be emailed or texted. This is very easy for me as a user. I don’t have another password to remember, the messages come through quickly and I can access my account. While it’s easy for me, it’s harder for a hacker. Someone would have to be able to access my phone or email to be able to access the original account.</p>
<p>&nbsp;</p>
<h2><strong><em>Recognize Imposters</em></strong></h2>
<p>A popular way for hackers to gain access to your data is called spoofing. They send an email from what appears to be a legitimate company claiming something to try and get you to give over your information. Your account has been compromised: type in your password. You’ve won a gift card: type in your password. You have been locked out: type in your password. We’ve seen suspicious activity: type in your password. You get the idea. Hackers use the logo of a trusted company to put you at ease, but when you click on the link it sends you to a spam site that is gathering your data, not resolving an issue. Here are things to look for:</p>
<ul>
<li>Is this normal behavior for the company in question? If not, don’t trust the link.</li>
<li>Check the email address against valid emails you have received from the company</li>
<li>Look at the link. If you click to a sign in page, check the website address. If you aren’t on the company’s main sign in page, do not put in any information.</li>
<li>When in doubt, go to your account. If you want to check activity, type in the website address you know and sign in that way. Most companies will post the notifications inside your account so you can verify.</li>
</ul></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/10/18/it-responsibly-defend-your-territory/">IT Responsibly: Defend your Territory</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8628</post-id>	</item>
		<item>
		<title>IT Responsibly: Check your settings</title>
		<link>https://thirdrock.com/blog/2019/10/11/it-responsibly-check-your-settings/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Fri, 11 Oct 2019 13:41:58 +0000</pubDate>
				<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[CyberAware]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[NCSAM]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8530</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/10/11/it-responsibly-check-your-settings/">IT Responsibly: Check your settings</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Have you recently purchased a new device? Smart phone, laptop, tablet or even a smart watch? Maybe you just downloaded the latest update to your computer or smart phone. Do you know what it did? Too many times we take for granted the base features technology and updates provide without checking that the privacy settings. Always check the settings represent what is best for you, not what is best for the company.</p>
<h2><strong>Location, Location, Location</strong></h2>
<p>Location services are very helpful. Let’s face it, who pulls out a paper map anymore when your navigation can tell you exactly how to get somewhere? However, your location does not need to be tracked at all times, so you should check the settings on all of your devices. Most apps have the option to only track while in use. When in doubt, it’s better to turn off location tracking until you find you need it. Phones are not the only devices that track location. Be sure to check settings on your laptop, tablets and smart watches.</p>
<p style="padding-left: 30px;"><em>“Checking in” on social media? Publicly announcing your location on a social media platform could potentially be dangerous. You are letting would be thieves and criminals know you are away from home, or informing an unwanted person how to find you.</em></p>
<p>&nbsp;</p>
<h2><strong>Just Click “No”</strong></h2>
<p>Having your passwords saved is extremely convenient, especially if you follow the rule to have different passwords for every site. Google/Chrome wants to automatically save all of these passwords for you which seems very nice of them. The issue is this is not actually secure, especially if you use public WiFi. A hacker could easily write a script to steal the saved data on your computer.</p>
<p style="padding-left: 30px;"><em>Do you do a lot of online shopping? When your browser asks to save your credit card information, be sure to choose “never”. If a hacker can get your passwords, they can also steal your credit card information.</em></p>
<p>&nbsp;</p>
<h2><strong>Public WiFi</strong></h2>
<p>Do you deal with sensitive data for work, bank online or simply enjoy online shopping? Accessing private accounts with private data on public WiFi puts you at extreme risk. It only takes one person with the know-how and malicious intent on the same WiFi to remotely access the information on your computer. Save sensitive work for private networks.</p>
<p style="padding-left: 30px;"><em>If you are a business owner, be sure to have separate WiFi networks for guests, non-sensitive  data and sensitive data. Limit access to the network for sensitive data to those who need access.</em></p>
<p style="padding-left: 30px;"><span style="color: #0000ff;"><em>PRO TIP: Consider using one computer to “surf” the web and one computer to ONLY access sensitive data web sites such as banking, financial services, stock trading, healthcare and insurance.</em></span></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/10/11/it-responsibly-check-your-settings/">IT Responsibly: Check your settings</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8530</post-id>	</item>
		<item>
		<title>Business Associates bad for business?</title>
		<link>https://thirdrock.com/blog/2019/05/21/business-associates-bad-for-business/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 21 May 2019 14:00:26 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[Business Associates]]></category>
		<category><![CDATA[cyber security]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=7509</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/05/21/business-associates-bad-for-business/">Business Associates bad for business?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In January 2019, Spiceworks surveyed 600 IT and security decision makers over a wide variety of companies, all with one thing in common: their use of third-party vendors or Business Associates (BAs). Their findings should have everyone looking more closely at their BAs. Some of the key findings were:</p>
<ul>
<li>90% of companies with third-party policies review them annually</li>
<li>81% consider their policies effective</li>
<li>44% of the companies experienced “a significant, business altering data breach caused by a vendor”</li>
<li>15% of breached companies were notified by the vendor of the breach</li>
</ul>
<p><img data-recalc-dims="1" fetchpriority="high" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=423%2C282&#038;ssl=1" width="423" height="282" alt="" class="wp-image-7512 aligncenter size-medium" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=1024%2C682&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=1080%2C720&amp;ssl=1 1080w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?w=1334&amp;ssl=1 1334w" sizes="(max-width: 423px) 100vw, 423px" /></p>
<p>These statistics are startling, highlighting the chasm between the BA risk management process and the reality of vendor incident response. The most disturbing findings came after the breach. Almost 70% of the breached companies made no change to their obviously faulty risk policies and procedures, with only half of them discontinuing the vendor relationship! The negative, business altering consequences include a combination of increased operational cost and complexity, disrupted operations, financial loss and reputational damage. Reason would move to making changes, but many don’t know where to start.</p>
<p><strong>Evaluate Your Vendors</strong></p>
<p>Companies need to take decisive steps with their business associates to protect their customers’ data. At a minimum, a “trust by verify” approach is required, while many companies are moving to a “zero trust” model. Some options include:</p>
<ul>
<li>Contractually obligate vendors to security and privacy practices</li>
<li>Review your vendors’ security and privacy policies and procedures including their risk management plan</li>
<li>Require security risk assessments be performed annually</li>
<li>Conduct a joint risk management review focusing on data exchange and management, prior to enabling the BA access to your data</li>
<li>Request historical review and references</li>
</ul>
<p><strong style="font-size: 12px;">Security should be a joint effort</strong></p>
<p>It is essential to keep an inventory of all third-parties who can access and share your data, but that is not enough. This study found over two thirds of the companies were not confident that their vendors notify them when sharing data with other subcontractors. Properly vetting your BAs may increase the trust relationship, but additional steps should be taken.</p>
<ul>
<li>Coordinate responsibilities between both parties</li>
<li>Require and review breach notification protocol</li>
<li>Require insurance and other forms of indemnification</li>
<li>Maintain regular communication of security expectations and execution</li>
</ul>
<p>The need for vendors and BAs will always be present in our ever changing, collaborative world. Take the steps necessary to protect your company, your clients and your vendors.</p>
<p>&nbsp;</p>
<p><u>Reference</u></p>
<p>Nearly half of firms suffer data breach at hands of vendors. Mark Sangster. 6 March 2019. <a href="https://www.esentire.com/blog/nearly-half-of-firms-suffer-data-breach-at-hands-of-vendors/">https://www.esentire.com/blog/nearly-half-of-firms-suffer-data-breach-at-hands-of-vendors/</a></p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/05/21/business-associates-bad-for-business/">Business Associates bad for business?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7509</post-id>	</item>
		<item>
		<title>Security starts with knowing your weaknesses</title>
		<link>https://thirdrock.com/blog/2019/03/26/security-starts-with-knowing-your-weaknesses/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 26 Mar 2019 14:00:58 +0000</pubDate>
				<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[phishing scam]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5914</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/03/26/security-starts-with-knowing-your-weaknesses/">Security starts with knowing your weaknesses</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>One of the biggest challenges in data and information security is knowing your threat level. IBM security recently released their 2018 X-Force Threat Intelligence Index. They monitor daily security events in 130 countries throughout the year for a comprehensive understanding of trends in cyber threats.</p>
<p>One of the most prominent ways organizations were found to be inadvertently open to attacks was due to improper configuration of cloud services. Misconfigured cloud servers accounted for 43% of more than 2.7 billion compromised records. This is an increase of 20% over recorded incidents in 2017.  According to the survey, “misconfiguration is now the single-biggest risk to cloud security, with 62% of surveyed IT and security professionals noting it as a problem”. While most of these breaches appear to be the result of inadvertent actions, it is possible for an insider to maliciously expose data and hide it as an accident.</p>
<p>No matter the style of attack, financial gain is almost always the motivation. Over the past few years, ransomware became a popular choice for cyber criminals. In 2018, however, we actually see a decrease in the use of ransomware by 45%. Why? Because cryptojacking is proving far more lucrative for criminals, thus increased in use by 450%! Without the need of any hardware of their own, a cyber criminal can install a cryptocurrency miner virtually undetected. Once installed, not only is the criminal gaining valuable coin at the owner’s expense, but they are also opening the door for other kinds of breaches.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5909" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/chart-e1553564411692-300x115.png?resize=410%2C157&#038;ssl=1" alt="" width="410" height="157" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/chart-e1553564411692.png?resize=300%2C115&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/chart-e1553564411692.png?resize=768%2C294&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/chart-e1553564411692.png?w=777&amp;ssl=1 777w" sizes="(max-width: 410px) 100vw, 410px" /></p>
<p>The number of recorded vulnerabilities has exponentially increased in the last 3 years. This is due to the “ever-expanding attack surface as new players such as IoT devices, and other smart technologies enter the fray.” The attack surface references the span by which an organization has entry points for a cyber criminal to infiltrate. Finance and Insurance registered as the highest targeted industry, due to their access to Personal Identifiable Information (PII) links directly to bank account and credit card data that can be monetized quickly. Professional services, such as legal, CPAs and consulting, is the third most targeted industry with the second highest likelihood of a breach. Valuable customer data combined with limited security budgets and staff makes it “as vulnerable as it is lucrative”.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5910" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/chart2-e1553564465916-300x205.png?resize=404%2C276&#038;ssl=1" alt="" width="404" height="276" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/chart2-e1553564465916.png?resize=300%2C205&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/chart2-e1553564465916.png?resize=768%2C524&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/chart2-e1553564465916.png?w=844&amp;ssl=1 844w" sizes="(max-width: 404px) 100vw, 404px" /></p>
<p>With all of this seemingly troubling news, you may be asking: what can we do to protect ourselves? As IBM states, we must “make security an integral part of culture and overall structure”. This is done by changing your threat landscape to reduce your risk of exposure. And that starts with knowing your risks. Our Cyber Quick Check is the first step to understanding your risk, and takes less than 5 minutes. Based on your Cyber score, discover the recommended next steps. With dedicated action and your part and the use of our automated cyber risk management system, CyberCompass™, we can increase your protection to 80% in only 90 days. The threats are real, but protection is available. Don’t wait in the dark any longer. Protect yourself and your business from threats today.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/03/26/security-starts-with-knowing-your-weaknesses/">Security starts with knowing your weaknesses</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5914</post-id>	</item>
		<item>
		<title>Are you Safe?</title>
		<link>https://thirdrock.com/blog/2018/08/17/are-you-safe/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Fri, 17 Aug 2018 15:07:28 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[personal safety]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5811</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/08/17/are-you-safe/">Are you Safe?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5813" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?resize=300%2C172&#038;ssl=1" alt="" width="300" height="172" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?resize=300%2C172&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?w=609&amp;ssl=1 609w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>Safety. Such an important word with so many different connotations. We ask safety questions constantly. Is my family safe? Will my house be safe? Is this a safe neighborhood? Are our schools safe? Many technologies are designed to specifically pacify our desire to feel safe.  We can track our child&#8217;s cellphone. We buy alarms for our homes and doorbells with cameras. Schools install cameras and specially locking doors to protect the children.  But one area most people neglect, is cyber safety. Why?  Because it is such an abstract issue.  I check the locks on my doors each night before I go to bed.  I can <em>see and confirm</em> they are locked. None of my physical senses will tell me if my PC is being hacked, until it’s too late and the ransomware notice covers the screen.  As an executive, are you doing what it takes to keep your clients safe? Is their information secure within your care? Do you even know where to start looking? Take this short quiz to see if you are on the right path. We can help you answer &#8220;Yes&#8221; to all of your security questions.</p>
<p style="text-align: center;"><strong>Protect your Patients. Protect your Organization. Protect Yourself.</strong>™</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/08/17/are-you-safe/">Are you Safe?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5811</post-id>	</item>
		<item>
		<title>GDPR &#8211; the &#8220;Undo&#8221; Button for Personal Data?</title>
		<link>https://thirdrock.com/blog/2018/05/15/gdpr-the-undo-button-for-personal-data/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 15 May 2018 13:15:34 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR deadline]]></category>
		<category><![CDATA[GDPR risk assessment]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Protect yourself]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5594</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/05/15/gdpr-the-undo-button-for-personal-data/">GDPR &#8211; the &#8220;Undo&#8221; Button for Personal Data?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5522 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=300%2C214&#038;ssl=1" alt="GDPR deadline 25 May 2018 | &quot;undo&quot; button" width="300" height="214" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=300%2C214&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=768%2C549&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=1024%2C731&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" /><strong>The European Union’s General Data Protection Regulation (GDPR) goes into effect May 25<sup>th</sup>, about two weeks from now. </strong> In the news it is often being called &#8220;overreaching&#8221; and &#8220;impractical,&#8221; but its objective is to<em> place control of personal data back in the hands of the EU citizens.</em>  Maybe I’m “old school” (aka dinosaur), but I believe in privacy and the ability to protect my data.  Why? Look at these recent events.</p>
<p><strong>Let’s start with the Facebook breach of 85 million users.</strong>  Most people joined Facebook to maintain relationships with family and friends.  It’s free and convenient.  But that old saying, “There is no such thing as a free lunch” is really true. <em>Facebook is “free” because they are collecting and selling your data: your likes, dislikes, preferences, habits, and on and on.</em>  No one who joined FB ever thought their data would be illegally used to alter a presidential election.  Or that foreign nations would use the platform to influence our election process using fake news.</p>
<p><strong>A few weeks ago, the news reported that the major DNA testing services such as AncestryDNA and 23AndMe are all collecting their customer’s DNA information and creating massive databases.</strong>  People haven’t paid attention to &#8211; or chose to ignore &#8211; the privacy agreement included in the kit.  And yes, <em>they do state that they can keep and use your data</em>.  What are their plans for the data and these databases? Time will tell.  But if they choose to use your data improperly, the chances of you finding out about it are slim.</p>
<p><strong>Probably the highest profile news item this past month is the possible capture of the Golden State Killer, the most prolific unsolved crime spree in U.S. history.</strong>  Why is this included in this blog?  GEDmatch, a very small genetics matching service was key to cracking this case.  People can upload their DNA analysis results into GEDmatch to locate possible relatives.  The police uploaded the DNA information of the Golden State Killer into GEDmatch and searched for possible relatives.  The police traced family trees back to people who lived in the 1800s and reviewed genetic data of several thousand people to arrive at the suspect.  Think about that!  <em>If the police can do that, anyone can, including cyber criminals.</em>  The value and impact of your genetic “fingerprint” has yet to be determined, but I’m confident it will increase over time.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5608 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Undo-button-on-keyboard.jpg?resize=300%2C225&#038;ssl=1" alt="&quot;Undo&quot; button on keyboard " width="300" height="225" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Undo-button-on-keyboard.jpg?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Undo-button-on-keyboard.jpg?resize=768%2C576&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Undo-button-on-keyboard.jpg?resize=1024%2C768&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Undo-button-on-keyboard.jpg?w=2160&amp;ssl=1 2160w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p><strong>Ten years ago, I could not have imagined how hard I work now to protect my personal information.</strong>  I have no doubt in the future I will have to work even harder to protect personal data including my genetic information.  Many companies are building extensive databases on all of us through our day to day activities, such as Facebook and Equifax.  Should I have the right to understand the data being collected about me and how it will be used?  Should I have the right to have my data deleted by a company I choose not to support?  I say yes!  And that is what the European Union General Data Protection Regulations (GDPR) strives to deliver.  By today’s technology standards, GDPR seems far reaching and overbearing because some requirements may not be practical to implement.  Over time however, technology will evolve to solve these limitations.  Facebook has publicly stated it will be GDPR compliant.  As a result of the breach, I requested my Facebook account be deleted and discovered<em> it could take two weeks to delete my account! </em> That means the deletion is not automatic &#8211; people are involved, and it&#8217;s possible that all data won’t be deleted.  <strong>Yes, I think we need a personal data “undo” button!</strong></p>
<p>If your organization is concerned about GDPR and how it can affect your business, don’t hesitate to contact us at: <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a>.  We&#8217;ve recently added GDPR readiness assessments to our CyberCompass™ software.  Third Rock&#8217;s CyberCompass™ software automates and simplifies cyber risk management for companies of all types and sizes.</p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3>
<p style="text-align: center;"></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/05/15/gdpr-the-undo-button-for-personal-data/">GDPR &#8211; the &#8220;Undo&#8221; Button for Personal Data?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5594</post-id>	</item>
		<item>
		<title>The Right Cyber-Talk</title>
		<link>https://thirdrock.com/blog/2018/03/29/the-right-cyber-talk/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 29 Mar 2018 14:00:36 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[building cyber confidence]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security terms]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[definitions]]></category>
		<category><![CDATA[glossary of cyber security terms]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[ISC2 lexicon]]></category>
		<category><![CDATA[terminology]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5271</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/03/29/the-right-cyber-talk/">The Right Cyber-Talk</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5284" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training-on-street-sign.jpg?resize=194%2C145&#038;ssl=1" alt="cyber security training class | this is the right way | right this way" width="194" height="145" /></p>
<p>I recently taught a cyber security class to a large medical practice.  The goals were to better protect the organization from cyber-attacks and to improve their HIPAA compliance.  This medical practice is a well-run and well-managed business that invests in its employees and is clearly one of the most security conscious practices I have worked with.  The hour-long course covered the cyber security basics including password management, safe Internet practices, phishing, malvertising, and incident response.  I wanted to build their cyber confidence such that they quickly knew how to recognize and respond appropriately to a potential cyber threat.</p>
<p>Overall the course went very well; although, I took the class to areas they were not familiar with nor comfortable with.  Discussions at times were lively and lengthy, which was great as they were really engaged.  There was a common thread in our discussions and that was <strong>people are not using the correct terminology concerning cyber security and threats, and this causes confusion and misunderstandings.</strong>  Let’s face it, in today’s world, we are bombarded daily by the news media about hacking incidents and new cyber threats.  It is part of our daily lives and conversations.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-5285" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Definition-in-chalk-on-blackboard.jpg?resize=200%2C133&#038;ssl=1" alt="Definition in white chalk on blackboard " width="200" height="133" /></p>
<p>So, I was really pleased when a colleague, Mike Moran, returned from a cyber security conference and brought our team copies of a new lexicon recently published by (ISC)<sup>2</sup>.  This is by far the best glossary of cyber security terms I have seen.  It was published by John McCumber in February and you can download a copy from his <a href="http://blog.isc2.org/isc2_blog/2018/02/welcome-to-the-lexicon-project.html">blog</a>.  John is the Director of Advocacy for the North American Region of (ISC)<sup>2</sup>.  And who is (ISC)<sup>2</sup>? The International Information System Security Certification Consortium is the largest and best recognized association of cyber security professionals.  Mike is certified by (ISC)<sup>2</sup> and helps our customers improve their cyber security.</p>
<p>I recommend you download a copy of the (ISC)<sup>2</sup> lexicon and review it.  Post it in your office and distribute it to your team.  It sends the message your organization is serious about cyber security and enables everyone to speak more accurately.  It is another step in building your organization’s cyber confidence.</p>
<p>If you have concerns about your cyber security or would like to improve your cyber confidence and compliance, contact us at: info@thirdrock.com</p>
<h3 style="text-align: center;"><strong></strong></h3>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/03/29/the-right-cyber-talk/">The Right Cyber-Talk</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5271</post-id>	</item>
		<item>
		<title>How to Grow Cyber Security Awareness Heroes</title>
		<link>https://thirdrock.com/blog/2018/03/01/how-to-grow-cyber-security-awareness-heroes/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 15:00:18 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[2017 State of Privacy and Security Awareness Report]]></category>
		<category><![CDATA[2017 Verizon Breach Report]]></category>
		<category><![CDATA[awareness campaign]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security awareness heroes]]></category>
		<category><![CDATA[cyber security training]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybersecurity training]]></category>
		<category><![CDATA[emerging threats]]></category>
		<category><![CDATA[positive cyber security habits]]></category>
		<category><![CDATA[risky behavior]]></category>
		<category><![CDATA[training classes]]></category>
		<category><![CDATA[training delivery methods]]></category>
		<category><![CDATA[training frequency]]></category>
		<category><![CDATA[workforce training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5201</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/03/01/how-to-grow-cyber-security-awareness-heroes/">How to Grow Cyber Security Awareness Heroes</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-1377" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/cyber_security_200x.jpg?resize=200%2C150&#038;ssl=1" alt="Cyber Security | Cybersecurity | red letters" width="200" height="150" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/cyber_security_200x.jpg?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/cyber_security_200x.jpg?w=533&amp;ssl=1 533w" sizes="(max-width: 200px) 100vw, 200px" />The top threat facing any organization today is the staff member working from a computer!  Not because this person intends to do malicious harm to the organization, but because of lack of cyber security awareness and training.  Confirmation of this is MediaPro’s <a href="https://pages.mediapro.com/2017-State-of-Privacy-Security-Awareness.html#survey">2017 State of Privacy and Security Awareness Report</a> in which they surveyed over 1,000 people and rated their responses to real-world cyber security questions.</p>
<p>Respondents were grouped into 3 “risk profiles” based on their correct answers; Hero (93-100%), Novice (77-92%) and Risks (76% and lower).  In summary, 70% of those surveyed scored at the Novice level.  You might say well, 77% is a solid “C” grade in school and 92% is an “A-“.  Well if you consider one instance of risky behavior, clicking on that link in an email can infect your organization with ransomware, that is pretty frightening!  Consider that 70% of your organization is at the “Novice” level of cyber security awareness! The odds of being breached are relatively good!</p>
<p>The <a href="http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/">2017 Verizon Breach Report</a> provides some sobering breach statistics;</p>
<ul>
<li style="text-align: left;">62% were the result of hacking</li>
<li style="text-align: left;">81% hacking related breaches involved stolen or weak passwords</li>
<li>66% malware installed via malicious email attachment</li>
<li style="text-align: left;">75% were conducted by outsiders (25% insiders)</li>
<li style="text-align: left;">73% were financially motivated</li>
<li style="text-align: left;">51% involved criminal groups</li>
<li style="text-align: left;">27% discovered by 3<sup>rd</sup> parties</li>
</ul>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5204" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_19064_04857-300x300.jpg?resize=200%2C200&#038;ssl=1" alt="Cyber Security Awareness Heroes" width="200" height="200" /></p>
<p>How do you make your entire staff Cyber Security Awareness Heroes?  Here are some easy steps that will substantially improve cyber security awareness.</p>
<ol>
<li>Make cyber security awareness a priority in your organization. Discuss it in staff meetings and company-wide meetings regularly.</li>
<li>Increase training frequency and delivery methods. Taking the same training class year after year does not improve awareness and clearly tells staff it isn’t a priority.  Require two new and different training classes per year, preferably once a quarter.</li>
<li>Hold an awareness campaign where emerging threats are reviewed and positive cyber security habits are encouraged.</li>
<li>Encourage reporting of security incidents as learning opportunities. Investigate and document security incidents and then review them with the workforce to learn from them.  Revise policies and procedures as needed to address process issues.</li>
<li>If you have access to the data from your IT support organization, publish or post the statistics on the attempts to hack into your network. We all are nice and comfortable behind firewalls and forget how many bad actors are out there.</li>
<li>Conduct email phishing campaigns to improve workforce email awareness, use and habits.</li>
</ol>
<p>Your cyber security training program should continue to evolve to keep pace with the rapidly changing cyber threats.  If you are a smaller organization, a job role should be assigned the responsibility to keep your training current and fresh.</p>
<p>Our dependence on computers and the Internet will only increase, as will the threats wanting to steal our sensitive data or damage our reputations or ability to do business.  It is a small investment to train your workforce to protect your organization.</p>
<p>If your organization needs a security risk assessment, compliance management plan, or cyber security plan, please contact us at:  <a href="mailto:info@thirdrock.com">info@thirdrock.com</a></p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/03/01/how-to-grow-cyber-security-awareness-heroes/">How to Grow Cyber Security Awareness Heroes</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5201</post-id>	</item>
		<item>
		<title>Cloud or Not-to-Cloud; The Allscripts Breach</title>
		<link>https://thirdrock.com/blog/2018/02/06/cloud-or-not-to-cloud-the-allscripts-breach/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 06 Feb 2018 15:00:30 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Allscripts' data breach]]></category>
		<category><![CDATA[Business Associate Agreement]]></category>
		<category><![CDATA[data backup]]></category>
		<category><![CDATA[data corruption]]></category>
		<category><![CDATA[data integrity]]></category>
		<category><![CDATA[EHR systems]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[FISMA]]></category>
		<category><![CDATA[HIPAA Security Risk Assessment]]></category>
		<category><![CDATA[performance guarantees]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[redundant data centers]]></category>
		<category><![CDATA[SamSam virus]]></category>
		<category><![CDATA[SSAE 16/18 audit]]></category>
		<category><![CDATA[standard useful format]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5104</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/02/06/cloud-or-not-to-cloud-the-allscripts-breach/">Cloud or Not-to-Cloud; The Allscripts Breach</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Allscripts’ Electronic Health Records service was the first major cloud-based EHR to be significantly disrupted by a ransomware attack.  Close to 1,500 practices were affected by the EHR outage for about a week; essentially shutting down those practices.  Allscripts was hit by the SamSam virus which was launched in December 2016, crippling two of their North Carolina data centers.  Angry customers voiced their displeasure on social media and a class-action lawsuit has been filed.</p>
<p>Hackers have been relatively successful using the SamSam virus by taking advantage of RDP connections; remote desktop protocol.  An independent source who works with companies who suffered breaches told me that over 65% of the breaches he has recently dealt with are the result of RDP hacks.</p>
<p>So, what is an RDP hack?  If you have ever let your IT person or technical support person remotely take control of your computer to fix something, that is done via an RDP connection.  It is the same as you logging on to your computer and then letting the technician sit at your desk and work on your PC.  Hackers use sophisticated search engines to detect open RDP connections.  When one is located, they use password programs to hammer the PC in an attempt to gain access.  If a weak password is breached, the hackers just got the keys to the kingdom, and your data!</p>
<p>So, should you use a cloud-based EHR system, or not?  For small to medium sized practices, I would recommend a cloud EHR system <em>with the requirement</em> that you must do your homework first!  A worthy cloud EHR provider should deliver greater security than an on-site server and typical security measures implemented by internal IT support or an MSP.  It should also provide improved contingency capabilities and disaster recovery ability, although in this case, Allscripts is the disaster.</p>
<p>Here are the steps I would recommend in selecting a cloud-based EHR system.</p>
<ol>
<li>Confirm that the candidate EHR system meets the requirements of the providers and staff. A simple statement but it requires a significant investment to make the right choice.  I have seen a lot of practices that are on their second or third EHR system.</li>
<li>Written confirmation that the ePHI is fully encrypted during transmission and storage. Transmission not only includes between your practice and the cloud, but within the cloud between physical facilities.</li>
<li>Regularly (daily) data backup services are provided that are to at least one other physical facility. Thus, if there is a disruptive event at one location, you can quickly recover and deliver healthcare. In fact, they should be providing redundant data centers, so you would not know if one data center or server farm failed.  This greatly improves your HIPAA “Availability” requirement and simplifies your disaster recovery planning, which is another HIPAA requirement.</li>
<li>Written performance guarantees that include minimum up time and recovery times.</li>
<li>Data integrity assurances confirming that the EHR system will not corrupt your data. There is a substantial lawsuit against a cloud EHR vendor for data corruption.</li>
<li>Documented ability to export your data in a <em>standard useful format</em> should you elect to terminate your relationship.</li>
<li>Proof that they successfully passed an SSAE 16/18 audit, FISMA and have other appropriate third-party certifications. These will address cybersecurity and physical security requirements.</li>
<li>Proof they performed a HIPAA Security Risk Assessment in the past year.</li>
<li>Execute a current Business Associate Agreement with the vendor. They may require you to sign their BAA, and if they do, it is worth the investment to have your legal counsel review the BAA and the contract with the vendor.</li>
</ol>
<p>These steps will help ensure that your practice is properly protected and your patient data is safe.</p>
<p>If you have questions about the information provided, or need HIPAA or cybersecurity guidance, don’t hesitate to contact us at: <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a></p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/02/06/cloud-or-not-to-cloud-the-allscripts-breach/">Cloud or Not-to-Cloud; The Allscripts Breach</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5104</post-id>	</item>
	</channel>
</rss>
