<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Julie Rennecker, PhD, BSN, Author at Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/author/julie/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/author/julie/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Tue, 21 Jul 2020 11:48:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Julie Rennecker, PhD, BSN, Author at Third Rock</title>
	<link>https://thirdrock.com/blog/author/julie/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Am I a Data Processor or a Data Controller? &#8211; Check the GDPR glossary</title>
		<link>https://thirdrock.com/blog/2018/05/30/am-i-a-data-processor-or-a-data-controller-check-the-gdpr-glossary/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Wed, 30 May 2018 18:53:36 +0000</pubDate>
				<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[complete GDPR Assessment]]></category>
		<category><![CDATA[GDPR glossary page]]></category>
		<category><![CDATA[GDPR infographic]]></category>
		<category><![CDATA[GDPR risk assessment]]></category>
		<category><![CDATA[key terms]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5657</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/05/30/am-i-a-data-processor-or-a-data-controller-check-the-gdpr-glossary/">Am I a Data Processor or a Data Controller? &#8211; Check the GDPR glossary</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
							<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="padding-left: 120px;"><img data-recalc-dims="1" fetchpriority="high" decoding="async" class="aligncenter wp-image-5682" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/gdpr_3-D-word-cloud.jpg?resize=428%2C257&#038;ssl=1" alt="Dynamic GDPR infographic | GDPR Risk Assessment | key terms" width="428" height="257" /></p>
<p>Ok, so the GDPR &#8220;deadline&#8221; has passed, but many of you are still tying up loose ends &#8211; or perhaps just discovering that the law applies to you! Whatever the case, don&#8217;t let confusion over a few terms slow your progress. Some vendors got together to create a great <a href="https://www.eugdpr.org/glossary-of-terms.html">glossary page</a> that defines all the key terms.</p>
<p>If you&#8217;re still uncertain about what you need to <em>do</em>, the official GDPR page summarizes the key points in a dynamic <a href="https://ec.europa.eu/justice/smedataprotect/index_en.htm">infographic</a>.</p>
<p>Need to get GDPR compliant and don&#8217;t have time or expertise to learn all the rules? Third Rock can deliver a complete GDPR Assessment with a prioritized list of corrective actions in just 5-7 business days for any size organization. Plus, based on your assessment results, we can help you determine whether you need additional help from us or one of our technical partners.</p>
<p>Third Rock is all about Complete Cyber Confidence. <a href="https://thirdrock.com/contact-us/">Contact us</a> today to achieve Complete GDPR Confidence.</div>
			</div>
			</div>		
				
				
				
				
			</div>	
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/05/30/am-i-a-data-processor-or-a-data-controller-check-the-gdpr-glossary/">Am I a Data Processor or a Data Controller? &#8211; Check the GDPR glossary</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5657</post-id>	</item>
		<item>
		<title>The GDPR deadline is here &#8211; are you ready?</title>
		<link>https://thirdrock.com/blog/2018/05/25/the-gdpr-deadline-is-here-are-you-ready/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Fri, 25 May 2018 18:02:14 +0000</pubDate>
				<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[CyberCompass™]]></category>
		<category><![CDATA[first step]]></category>
		<category><![CDATA[GDPR risk assessment]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[Third Rock]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5665</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/05/25/the-gdpr-deadline-is-here-are-you-ready/">The GDPR deadline is here &#8211; are you ready?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" decoding="async" class="wp-image-5522 size-medium alignright" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=300%2C214&#038;ssl=1" alt="GDPR Deadline | Risk Assessment " width="300" height="214" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=300%2C214&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=768%2C549&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=1024%2C731&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" />If you are not yet GDPR-ready, you&#8217;re not alone. Many companies are still scrambling to meet the requirements. Some U.S.-based companies didn&#8217;t realize the law would apply to them. Others did not realize the full extent of the law &#8211;&nbsp;<em>or of their own data collection!&nbsp;</em></p>
<p>Don&#8217;t worry &#8211; whether starting from scratch or needing to document your current GDPR status, Third Rock&#8217;s CyberCompass™ streamlines the assessment process and automates the report generation, making it possible for Third Rock to give you a full report, including a prioritized list of action items, within a few days. Then, if needed, our consultants and technology partners can work with you to address the action items and come into compliance.&nbsp;<a href="https://thirdrock.com/contact-us/">Contact us</a> today to <strong>schedule a GDPR assessment</strong>, the<em> first step</em> in becoming compliant.</p>
<p style="text-align: center;"><strong>GDPR&nbsp;</strong><strong>&#8211; Automated. Simplified. Affordable.</strong></p>
<p style="text-align: center;"></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/05/25/the-gdpr-deadline-is-here-are-you-ready/">The GDPR deadline is here &#8211; are you ready?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5665</post-id>	</item>
		<item>
		<title>Key Themes at Texas Health Care Security &#038; Technology Conference</title>
		<link>https://thirdrock.com/blog/2018/05/08/key-themes-at-texas-health-care-security-technology-conference/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Tue, 08 May 2018 14:00:20 +0000</pubDate>
				<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[continuous improvement process]]></category>
		<category><![CDATA[cyber risk management]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[financial impact of a breach]]></category>
		<category><![CDATA[guidance and remedies]]></category>
		<category><![CDATA[holistic approach]]></category>
		<category><![CDATA[holistic cyber risk management]]></category>
		<category><![CDATA[incident response plan]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[team sport]]></category>
		<category><![CDATA[Texas Health Care Security & Technology Conference]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5529</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/05/08/key-themes-at-texas-health-care-security-technology-conference/">Key Themes at Texas Health Care Security &#038; Technology Conference</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5548 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/02C86071.jpg?resize=200%2C300&#038;ssl=1" alt="Hats off to Fernando Martinez and his team" width="200" height="300" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/02C86071.jpg?resize=200%2C300&amp;ssl=1 200w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02C86071.jpg?resize=768%2C1152&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02C86071.jpg?resize=683%2C1024&amp;ssl=1 683w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02C86071.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02C86071.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 200px) 100vw, 200px" /></p>
<p>Last month Robert Felps and I were fortunate to attend THA’s inaugural Texas Health Care Security &amp; Technology Conference. Great speakers, wonderful host and facility, collegiate atmosphere – a great learning experience overall. Hats off to Fernando Martinez, THA&#8217;s Chief Digital Officer, and his team for a great couple of days. Here&#8217;s a brief recap of the key takeaways.</p>
<p><strong>REALITY</strong></p>
<ol>
<li><strong>Cyber threats are dynamic. </strong><a href="https://www.linkedin.com/in/bvirtue">Bill Virtue</a> reminded us that there have been more than 4000 ransomware attacks per day since the beginning of 2016 (that’s 2,892,000 attacks in 2 years!), and <a href="https://www.linkedin.com/in/mechols">Michael Echols</a> reported that the cyber criminals are continually learning and sharing information.</li>
</ol>
<ol start="2">
<li><strong>Patient safety is at stake.</strong> <a href="https://www.linkedin.com/in/yatessecurity">Randy Yates</a>, <a href="https://www.linkedin.com/in/william-phillips-ab18047">Bill Phillips</a>, and <a href="https://www.linkedin.com/in/bobchaput">Bob Chaput</a> all gave examples of how the proliferation of medical IoT presents an increasing risk of patient harm if an attack shuts down or alters the performance of both diagnostic and treatment equipment, including CAT scanners, ultrasound machines, infusion pumps, and ventilators.<strong style="font-size: 12px;"> </strong></li>
</ol>
<ol start="3">
<li><strong>The real financial impact of a breach can be 10x the OCR fine!</strong> The hard costs of notifications can add up quickly, the most common being legal fees, lawsuits, technology support, forensics experts, increased marketing costs, and increased staff time. The less tangible costs of brand damage will be evident in the bottom line. The examples were sobering.</li>
</ol>
<p>Before everyone fell into complete despair, however, each speaker also offered guidance and remedies – as Bob Chaput of Clearwater put it, “No matter where you are, there <em><u>is</u></em> a path forward.” Below are key themes of the speakers’ recommendations, which I’ve labeled “reality <em>management</em>” because another key takeaway from the conference was that there is no such thing as being “done” with cybersecurity because cyber risk management is an ongoing process.</p>
<p><strong>REALITY MANAGEMENT</strong></p>
<ol>
<li><strong>Cybersecurity <em>is</em> risk management.</strong> This was the title of Michael Echols&#8217; presentation and pretty much sums up all the points that follow.</li>
<li><strong><strong>Cybersecurity is a team sport.</strong></strong> IT cannot and should not be managing cybersecurity in isolation. Everyone in the C-suite needs to understand the role they play in keeping patient data safe and the steps they need to take to get their managers and staff on board.</li>
<li><strong>A Security Risk Assessment is the essential first step.</strong> “You can’t secure your system if you don’t know where the vulnerabilities are.”</li>
<li><strong>Any device or equipment that connects to the network must be included in the SRA</strong>. Even devices that don’t tie directly into the EHR, such as a remote-controlled thermostat on the blood refrigeration unit – or the aquarium in the waiting area! – can be a point of entry for a malware attack.</li>
<li><strong>Cybersecurity requires a holistic, programmatic approach</strong>.<img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5551 size-medium" style="margin-left: 10px; margin-top: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/02F05316.jpg?resize=300%2C200&#038;ssl=1" alt="Cybersecurity is a team sport | tug of war" width="300" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/02F05316.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02F05316.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02F05316.jpg?resize=1024%2C683&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02F05316.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02F05316.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" /> A single, new cybersecurity technology will not make your organization secure. Once the vulnerabilities have been identified via the security risk assessment, addressing those vulnerabilities will require administrative action, process improvements, and staff education and reinforcement, as well as technology adjustments. See #2 – <em>cybersecurity is a team sport.</em></li>
<li><strong>Establish an incident response plan – and practice it regularly.</strong> Organizations that prepare recover faster and incur fewer costs – hard and soft costs &#8211; in the event of a ransomware attack or other breach.</li>
<li><strong>Bottom line: Start now – and continue! </strong>Cyber risk management is a continuous improvement process.</li>
</ol>
<p>In summary: (1) the threat is real and persistent; (2) technology alone won&#8217;t solve the problem.</p>
<p>If you’ve been an active cybersecurity player, there are few surprises here. Hopefully, however, it is reassuring to hear that you’re on the right path, and you’re not alone – hospital executives across the state and across the country are working hard to get out of the fire-fighting business and into holistic cyber risk management.</p>
<p style="text-align: center;"><strong>Building a CyberConfident™ World</strong></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/05/08/key-themes-at-texas-health-care-security-technology-conference/">Key Themes at Texas Health Care Security &#038; Technology Conference</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5529</post-id>	</item>
		<item>
		<title>National Nurses Week 2018 &#8211; Nurses: Inspire. Innovate. Influence</title>
		<link>https://thirdrock.com/blog/2018/05/08/national-nurses-week-2018-nurses-inspire-innovate-influence/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Tue, 08 May 2018 12:00:42 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber hygiene]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber-threats]]></category>
		<category><![CDATA[device hacking]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Third Rock]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5584</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/05/08/national-nurses-week-2018-nurses-inspire-innovate-influence/">National Nurses Week 2018 &#8211; Nurses: Inspire. Innovate. Influence</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="size-medium wp-image-5585 aligncenter" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ANA_NNW2018_Logo_Color.jpg?resize=300%2C205&#038;ssl=1" alt="" width="300" height="205" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/ANA_NNW2018_Logo_Color.jpg?resize=300%2C205&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ANA_NNW2018_Logo_Color.jpg?resize=768%2C524&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ANA_NNW2018_Logo_Color.jpg?resize=1024%2C698&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ANA_NNW2018_Logo_Color.jpg?w=1571&amp;ssl=1 1571w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>Third Rock would like to take this chance to salute the nation&#8217;s Nurses for their role in patient safety &#8211; clinical safety, physical safety, <em>and cyber safety.&nbsp;</em>It&#8217;s nurses of all types who are on the front lines of protecting patients from cyber threats &#8211; such as identity theft. ransomware, and device hacking &#8211;&nbsp; by practicing good &#8220;cyber hygiene.&#8221;&nbsp; Good job, nurses &#8211; THANKS for all you do to keep all of us cyber safe!</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/05/08/national-nurses-week-2018-nurses-inspire-innovate-influence/">National Nurses Week 2018 &#8211; Nurses: Inspire. Innovate. Influence</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5584</post-id>	</item>
		<item>
		<title>Are you Cyber Confident?</title>
		<link>https://thirdrock.com/blog/2018/03/27/are-you-cyber-confident/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Tue, 27 Mar 2018 14:00:01 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[building cyber confidence]]></category>
		<category><![CDATA[business data]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[Compliance Office]]></category>
		<category><![CDATA[culture change]]></category>
		<category><![CDATA[cyber threat response]]></category>
		<category><![CDATA[healthcare practice managers]]></category>
		<category><![CDATA[information security policies & procedures]]></category>
		<category><![CDATA[IT department]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[risk management process]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[staff education and monitoring]]></category>
		<category><![CDATA[workforce training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5267</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/03/27/are-you-cyber-confident/">Are you Cyber Confident?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5306" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/02J81382.jpg?resize=133%2C200&#038;ssl=1" alt="fear, lack of confidence, scared," width="133" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/02J81382.jpg?resize=200%2C300&amp;ssl=1 200w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02J81382.jpg?resize=768%2C1152&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02J81382.jpg?resize=683%2C1024&amp;ssl=1 683w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02J81382.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02J81382.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 133px) 100vw, 133px" />In our conversations with healthcare practice managers and CIOs &#8211; whether at small-to-medium practices, dental offices, outpatient facilities, or hospitals &#8211; we&#8217;ve found that few leaders feel confident in their organization&#8217;s ability to protect against and respond to cyber threats. Managers of smaller organizations have told us &#8220;It&#8217;s like a monster out there just waiting to get us, and there&#8217;s nothing we can do about it.&#8221;</p>
<p>Even CIOs at larger organizations who feel confident about having the right technologies and procedures in place admit that they have little interaction with the Compliance Office that manages staff education and little control over mobile devices. The result &#8211; they feel exposed, just waiting to see/hear where a breach has occurred.</p>
<p>As a general rule, frightening already frightened people does not promote the kind of thoughtful, proactive behavior required for a sustainable approach to cybersecurity. To get that kind of behavior, organizational leaders and their staff need to feel <em>cyber confident</em> &#8211; not just that the IT department is doing its job, but that they themselves feel knowledgeable about the threats they are facing and how to defend against them. So what can leaders do to increase their own cyber confidence and promote a culture of cyber confidence within their organizations?</p>
<ol>
<li><strong><span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;">Complete a Security Risk Assessment </span></strong><span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;">&#8211; Trying to secure your organization without a thorough assessment of its particular vulnerabilities is like trying to diagnose a patient&#8217;s illness based on the survey results of &#8220;the most common illnesses for men age 35-50.&#8221; Organizations face many of the same threats, but the <em>vulnerabilities </em>vary significantly from one organization to the next. The formal Security Risk Assessment is typically a coordinated assessment of all departments in an organization at the same time. </span></li>
<li><span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;"><strong>Locate &#8211; and document the location &#8211; of all your business data.</strong> Your business data &#8211; customer records, employee records, financial transaction data &#8211; should be inventoried as carefully as any other business assets. To ensure that it is protected, you must first know where it is! Again, this is NOT just a job for IT. Mobile devices, printers and fax machines (yes fax machines are still alive and well), medication dispensing machines, and the computer workstations scattered around every department in your organization are all likely repositories of business data. Note the location, serial number, and data types on each device.</span></li>
<li><span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;"><strong>Train your workforce</strong> &#8211; Cybersecurity is now part of <em>everyone&#8217;s</em> job.<span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;"> Be sure every member of your workforce &#8211; including student interns, volunteers, clerical staff, and managers &#8211; receives cybersecurity training and can demonstrate the correct procedures for safeguarding customer data. See Ed Jones&#8217; post on <a href="https://thirdrock.com/blog/2018/03/01/how-to-grow-cyber-security-awareness-heroes/">How to Grow Cyber Security Awareness Heroes</a> for more detail on this topic. </span></span></li>
<li><span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;"><strong>Implement up-to-date Information Security Policies &amp; Procedures</strong> &#8211; If you purchase templates, be sure to customize them to accurately reflect the data management practices and technologies at your organization. And purchasing them is not enough &#8211; each Policy and Procedure must be implemented. That means making sure every member of the workforce is aware of and understands the policies and procedures that apply to their respective role and that managers or members of the compliance team follow up, observe, and retrain as necessary to ensure they are being followed.</span></li>
<li><span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;"><strong>Implement a Risk Management Process</strong> &#8211; A Risk Management Plan is exactly what it sounds like &#8211; a plan for addressing each of the risks identified in the Security Risk Assessment. It should cover all departments and be reviewed regularly to assess progress on any corrective actions. We recommend reviewing the plan at least monthly. Integrating the review into monthly staff meetings, if you have them, is a good way to build cybersecurity and risk management into your standard operating procedures. </span></li>
</ol>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5305" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_2419_04489.jpg?resize=133%2C200&#038;ssl=1" alt="confident female healthcare doctor" width="133" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_2419_04489.jpg?resize=200%2C300&amp;ssl=1 200w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_2419_04489.jpg?resize=768%2C1152&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_2419_04489.jpg?resize=683%2C1024&amp;ssl=1 683w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_2419_04489.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_2419_04489.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 133px) 100vw, 133px" /></p>
<p><span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;">It&#8217;s true that IT plays a significant role in assessing and securing your organization&#8217;s data stores, but everyone plays a role in keeping your organization&#8217;s business data secure. Taking these steps to secure the data and address the risks under your own control will have the added benefit of increasing your own cyber confidence and building a culture of cyber confidence.</span></p>
<p>If your organization needs a security risk assessment, compliance management plan, or cyber security plan; or you have concerns about your cyber security and would like to improve your cyber confidence and compliance, please contact us at:  <a href="mailto:info@thirdrock.com">info@thirdrock.com</a></p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/03/27/are-you-cyber-confident/">Are you Cyber Confident?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5267</post-id>	</item>
		<item>
		<title>Overcoming Organizational Roadblocks to Cyber Security </title>
		<link>https://thirdrock.com/blog/2018/02/22/overcoming-organizational-roadblocks-to-cyber-security/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Thu, 22 Feb 2018 15:10:56 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA["Ignorance is no excuse."]]></category>
		<category><![CDATA[audit log]]></category>
		<category><![CDATA[breach remediation budget]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HIPAA training courses]]></category>
		<category><![CDATA[medical devices]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5185</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/02/22/overcoming-organizational-roadblocks-to-cyber-security/">Overcoming Organizational Roadblocks to Cyber Security </a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: 12px;">In many organizations, cyber security is perceived as one of those “important-but-not-urgent” issues that keep getting put off in deference to the pressing issues of the day – insurance denials, staffing, readmissions, patient no-shows, supply shortages…the list goes on.  It’s not that organizational leaders are doing nothing. In most organizations, the basic pieces, such as a HIPAA-compliant EHR, firewall, anti-virus software, and staff training, are all in place. It is these very safeguards, though, that can give leaders a false sense of security, making them complacent about day-to-day risk management. For instance, how vigilant are you about each of the following:</span></p>
<ol>
<li>Reviewing the audit log from your EHR system for suspicious activity – and following up?</li>
<li>Reviewing the network activity log and addressing any suspicious patterns?</li>
<li>Ensuring that system and facility access for all departing employees is completed at the time of departure?</li>
<li>Ensuring that all software patches are implemented asap after release?</li>
<li>Regularly reviewing and addressing the issues identified in your Security Risk Assessment (we recommend at least monthly)?</li>
<li>Conducting <em>ongoing</em> security training for all members of the workforce (not just once per year)?</li>
<li>Applying sanctions to members of the workforce – including physicians – who put information security at risk with unsafe practices?</li>
<li>Ensuring the security of new medical devices before deploying them on the network?</li>
<li>Documenting and periodically reviewing all “security incidents”?</li>
<li>Completing a new Security Risk Assessment after a major organizational, facility or IT change?</li>
</ol>
<p>Don’t get me wrong – I know it’s hard to do all of this! It requires time, money, and knowledgeable staff.</p>
<p>Here&#8217;s my take on overcoming these three very common roadblocks to risk management.</p>
<p><strong>Time</strong> – <em>“I don’t have time…My staff doesn’t have time.”</em></p>
<p style="padding-left: 30px;">Ask yourself, “When I am breached, where will I find the time to deal with the fallout?” Spending 1-2 hours per week (e.g., first thing every Fri morning) delegating and following up on the issues above could greatly minimize your risk of a breach, the extent of a breach if one happened, and the OCR fine should a breach or random audit occur.</p>
<p><strong>Money</strong> – <em>“It costs too much…Those costs shouldn’t come out of my budget – that’s IT’s responsibility.”</em></p>
<p style="padding-left: 30px;">Whose budget will pay the breach remediation costs? One medium-sized medical practice (20<sup>+</sup> providers) spent more than $1 million on patient notifications alone after experiencing a breach. Cyber insurance will cover some of the costs, but most organizations are under-insured and find themselves paying legal fees, increased operational costs, and fines while experiencing decreased revenues due to the negative reputational impact. Don’t be penny wise and pound foolish. Find the money to invest in information security <em>before</em> a breach occurs. And if the accounting system is a barrier, lobby your peers and CFO to make “information security” a line item in everyone’s budget.</p>
<p><strong>Knowledge/Skill</strong> – <em>“I don’t know how…My people don’t know how.”</em></p>
<p style="padding-left: 30px;">The OCR adheres to the general legal guideline that “ignorance is no excuse.” Numerous free resources are available on the OCR’s website, and multiple vendors offer relatively low-cost HIPAA training courses for clinical staff and compliance officers. There are also service providers that can provide monthly or quarterly cyber security support services if your own IT staff lack that expertise. Teach yourself, go to training, or find someone knowledgeable to help you. Don’t let ignorance keep you from protecting some of your organization’s most valuable assets – your patients’ information and your professional reputation.</p>
<p>Contact us today – 512.310.0020 or <a href="mailto:info@thirdrock.com">info@thirdrock.com</a> for more information on completing a security risk assessment, developing a risk management program, or becoming a Partner to make these or related services available to your clients.</p>
<h3 style="text-align: center;"><strong>Protect your Patients. Protect your Organization. Protect Yourself!</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/02/22/overcoming-organizational-roadblocks-to-cyber-security/">Overcoming Organizational Roadblocks to Cyber Security </a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5185</post-id>	</item>
		<item>
		<title>Internet of Medical Things:  Real Security Threat or Hype?</title>
		<link>https://thirdrock.com/blog/2018/01/19/internet-of-medical-things-real-security-threat-or-hype/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Fri, 19 Jan 2018 15:15:11 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Technology]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[connected devices]]></category>
		<category><![CDATA[FDA]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Manufacturer Disclosure Statement for Medical Device Security]]></category>
		<category><![CDATA[medical devices]]></category>
		<category><![CDATA[Quality System Regulations]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5075</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/19/internet-of-medical-things-real-security-threat-or-hype/">Internet of Medical Things:  Real Security Threat or Hype?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-3047 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/mHealth-technolgy-sytstem-300x138.jpg?resize=300%2C138&#038;ssl=1" alt="" width="300" height="138" /></p>
<p>For decades, healthcare medical devices functioned as freestanding tools. Glucometers, lasers, infusion pumps, pressure monitors, neonatal incubators, heart monitors – each serving its unique function independently of the others. With the widespread implementation of electronic health records (EHRs), however, and the push for increased digitization of health information, these devices have increasingly been networked into the patient information ecosystem.  They now transmit PHI between a myriad of systems including the EHR system, bed management, supply chain management, and billing systems.</p>
<p>The variety and use of these devices have proliferated. The <a href="http://www.himss.org/medical-device-security">HIMSS Medical Device Security Workgroup</a> reports that hospitals and similar healthcare delivery organizations typically have “300% to 400% more medical equipment than IT devices.” In a study of US hospitals cited in <a href="https://www.wired.com/2017/03/medical-devices-next-security-nightmare/">Wired Magazine (3/02/17)</a>, <a href="https://www.zingbox.com/press-releases/survey-reveals-healthcare-it-decision-makers-approach-to-iot-security/">ZingBox reported</a> an average of 10-15 connected devices per bed. That translates into approximately 4500 connected medical devices for the average 300-bed community hospital &#8211; and up to 75,000 devices for a large metro medical center with 5,000 beds!</p>
<p><strong>Are devices vulnerable to hacking?</strong></p>
<p>To date, the number of medical device breaches and the number of patient records exposed by those breaches has been seemingly negligible when compared to the large-scale data losses due to hacks of healthcare organizations’ primary IT systems or losses of unencrypted mobile devices. But there have been hacks, and there are several reasons to expect medical devices to be increasingly exploited:</p>
<ul>
<li>As more medical device developers rely on off-the-shelf operating systems to speed development and/or facilitate integration with other systems, the vulnerabilities of the parent code are transferred to the devices, increasing their vulnerability.</li>
<li>The increased networking of devices makes them a more attractive target for hackers because they provide additional points of entry to other systems.</li>
<li>A Trend Micro study found a large number of devices to be discoverable on Shodan, a search engine routine for connected devices.</li>
</ul>
<p>In fact, <a href="https://www.darkreading.com/threat-intelligence/medical-devices-fall-short-in-security-best-practices/d/d-id/1328964">a study by Ponemon Institute</a> found that 67% of medical device makers <em>expect</em> an attack on their devices in the next 12 months!</p>
<p><strong>Didn’t the FDA pass regulations to fix this?</strong></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4973 " style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Red-notebook-of-Regulations.jpg?resize=248%2C186&#038;ssl=1" alt="" width="248" height="186" scale="0" /></p>
<p>Yes – and no, depending on who you ask. The FDA is quoted in many news articles saying that medical device manufacturers are responsible for complying with “quality system regulations” (QSRs), which include requirements for addressing cybersecurity risks, but both law firms and industry executives say the compliance environment remains murky:</p>
<ul>
<li>Some devices have been downgraded from “Class III” – high risk and mandatory compliance – to “Class I” – low risk and “unregulated,” though they still could pose a cybersecurity risk.</li>
<li>Once a device is in use, it’s not clear whether the device manufacturer or the healthcare delivery organization is responsible for continued patching as cyber threats evolve.</li>
<li>The FDA doesn’t actually test medical devices for their compliance with the QSRs.</li>
<li>Reporting of device malfunctions, including cybersecurity breaches, to the FDA is voluntary.</li>
</ul>
<p><strong>Know-how and budget are also factors.</strong></p>
<p>Because cybersecurity of devices is still a relatively new concern in the medical device and healthcare delivery industries, lack of knowledge regarding both the threat and the appropriate risk management responses remains a problem. The <a href="https://www.zingbox.com/press-releases/survey-reveals-healthcare-it-decision-makers-approach-to-iot-security/">ZingBox study</a> also found that 70% of healthcare IT decision-makers believe that the same security solutions used for laptops and servers are sufficient for all their connected medical devices, a misconception that the report goes on to explain.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5082 " style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/spreadsheet-financials-300x200.jpg?resize=242%2C161&#038;ssl=1" alt="" width="242" height="161" /></p>
<p>Despite two-thirds of medical device manufacturers anticipating an attack on their devices, only 15% of study respondents anticipate taking measures to mitigate the risk! Senior executives in the field say it usually comes down to budget and production deadlines. Because cybersecurity protections don’t improve device performance in terms of clinical care, it is often looked upon as a cost. Similarly, when cybersecurity flaws are discovered too far into the development process, decision makers often determine that the rework required to build in the cybersecurity protections is too costly. So devices go to market with <em>known</em> cybersecurity flaws.</p>
<p><strong>So what to do?</strong></p>
<p>As a healthcare delivery organization, you are the gatekeeper between the medical device vendors and patients. Regardless of who is technically at fault for a medical device breach, if a breach were to occur, it would be your patients’ information lost and your reputation damaged!  Thus it is up to you and your organization to set the standard for medical devices coming into your organization and to include medical devices in your annual security risk assessment.</p>
<p>Start by requesting information from your device vendors about each of the device types on your network using the <a href="http://www.himss.org/resourcelibrary/MDS2">Manufacturer Disclosure Statement for Medical Device Security ((MDS)<sup>2</sup>)</a> which was collaboratively developed by the National Electrical Manufacturers Association (NEMA) and the Health Information and Management Systems Society (HIMSS).</p>
<p>Finally, if you have questions about assessing the risk of an Internet-connected device or need help completing a comprehensive Security Risk Assessment, contact us at <a href="mailto:info@ThirdRock.com">info@ThirdRock.com</a> or 512.310.0020.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/01/19/internet-of-medical-things-real-security-threat-or-hype/">Internet of Medical Things:  Real Security Threat or Hype?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5075</post-id>	</item>
		<item>
		<title>Shortage of Qualified Cybersecurity Workers: “…the greatest cyber risk of all.”</title>
		<link>https://thirdrock.com/blog/2018/01/17/shortage-of-qualified-cybersecurity-workers-the-greatest-cyber-risk-of-all/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Wed, 17 Jan 2018 20:00:53 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cybersecurity career options]]></category>
		<category><![CDATA[cybersecurity professional]]></category>
		<category><![CDATA[cybersecurity training]]></category>
		<category><![CDATA[cybersecurity worker shortage]]></category>
		<category><![CDATA[occupational outlook]]></category>
		<category><![CDATA[on-the-job training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5020</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/17/shortage-of-qualified-cybersecurity-workers-the-greatest-cyber-risk-of-all/">Shortage of Qualified Cybersecurity Workers: “…the greatest cyber risk of all.”</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3604" style="margin-top: 5px; margin-right: 12px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Blue-Cyber-Security-key-on-grey-keyboard-1.jpg?resize=200%2C133&#038;ssl=1" alt="" width="200" height="133"></p>
<p>The <a href="https://iamcybersafe.org/gisws/">2017 Global Information Security Workforce Study (GISWS)</a> released in February 2017 forecast a shortage of 1.8 million cybersecurity workers by 2020, while a <a href="https://cybersecurityventures.com/jobs/">study by Cybersecurity Ventures</a> estimates “3.5 million unfilled cybersecurity jobs” by 2021. While the projected magnitude of the shortfall varies from one study to the next, government experts, consultants, and pundits alike are unanimous in predicting that the current shortage of qualified cybersecurity workers will only get worse for the foreseeable future, a situation <a href="https://www.csoonline.com/article/3199016/security/cisco-and-ibm-announce-historic-cybersecurity-partnership.html">Steve Morgan</a> has called &#8220;the greatest cyber risk of all.&#8221;</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5036" style="margin-top: 10px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training-Courses-in-white-on-blue-key.jpg?resize=200%2C133&#038;ssl=1" alt="" width="200" height="133"></p>
<p>There is less agreement about why the shortage exists and, therefore, how to fix it. &nbsp;The traditional school of thought is that educational institutions haven’t prepared enough graduates to meet the growing need. The implied solution from this perspective is to increase educational capacity by creating new programs and increasing enrollments in all programs through better marketing and outreach efforts. Outspoken critics of this perspective, however, say that cybersecurity is <em>not</em> an entry-level position and that graduates of cybersecurity programs lack the technical depth required to be effective.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-5034" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training-and-Development-in-white-on-blue-key.jpg?resize=198%2C132&#038;ssl=1" alt="" width="198" height="132"></p>
<p>These critics offer an alternative perspective – cybersecurity professionals are not trained in the classroom but must be developed on the job after gaining expertise in IT operations. So rather than casting about externally for cybersecurity talent that isn’t available, IT managers should be looking within their own ranks for people who could be trained in security. For instance, in a 2015 <em>Computerworld </em>column, “<a href="https://www.computerworld.com/article/2979858/it-skills-training/the-myth-of-the-cybersecurity-skills-shortage.html">The myth of the cybersecurity skills shortage</a>,” Ira Winkler wrote, “The best security practitioners have experience in the technology and processes that they are supposed to secure…If you have no experience as a system administrator, you cannot maintain the security of a system.” He goes on to say that most of his work as a security professional has been to shore up poorly designed, poorly configured, and poorly maintained systems, which requires IT knowledge, rather than using hacking knowledge he gained in his training. But this perspective also has critics.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5035" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Build-Talent-in-white-on-blue.jpg?resize=200%2C133&#038;ssl=1" alt="" width="200" height="133"></p>
<p>A third point of view is that IT managers who only look for security professionals with IT/computer science credentials are creating the shortage through their own myopia. In a <a href="https://hbr.org/2017/05/cybersecurity-has-a-serious-talent-shortage-heres-how-to-fix-it"><em>Harvard Business Review</em></a> article, Marc van Zadelhoff, General Manager of IBM Security, describes IBM’s approach of creating “new collar” jobs. They look for people with “unbridled curiosity, passion for problem solving, strong ethics, and an understanding of risks” – characteristics that can’t be taught – and then train them in the necessary technical skills through on-the-job programs, vocational and community college courses, and industry certification programs, such as those offered by <a href="https://www.isc2.org/">(ISC)<sup>2</sup></a>. Supporting this view is the finding in the Global Information Security Workforce Study that 87% of current cybersecurity workers began their career in another field, some in other IT roles but many in non-IT fields.</p>
<p><strong>So what’s the answer?</strong></p>
<p>Like most difficult organizational problems, there is no single cause and, therefore, no single solution. Addressing the cybersecurity personnel shortage will require focused and creative efforts on the part of educators, managers, trade associations, and employees alike.</p>
<ul>
<li>Educators need to work closely with industry to identify the needed knowledge and skills to integrate into existing curricula or to serve as the basis for new programs.</li>
<li>Managers, meanwhile, with support from HR and other training resources, may need to create their own internal on-the-job training programs for existing personnel, creating opportunities for lateral moves into security positions.</li>
<li>Managers may also need to cast a wider net for potential security talent as IBM has done, looking for people with the necessary character and an eagerness to learn outside the IT ranks.</li>
<li>Trade associations, such as <a href="http://www.issa.org/">ISSA</a> and <a href="https://www.isc2.org/">(ISC)<sup>2</sup></a>, can pool resources to raise awareness of high school, college, <em>and</em> midcareer professionals of available cybersecurity career options and the paths available for acquiring the needed knowledge and skills.</li>
<li>Workers already in cybersecurity positions will need to adapt to their role as teacher/mentor to those moving into security positions, respecting those with non-IT backgrounds as possibly bringing in fresh perspectives.</li>
</ul>
<p>Finally, even if there were an excess of cybersecurity pros, they cannot safeguard an organization alone. All workers, managers, and executives, from the front desk and loading dock up to the C-suite must come to recognize that cybersecurity is now a part of <em>everyone</em>’s job! More on this in the weeks to come.</p>
<p>Is a personnel shortage putting your organization at risk? Contact us for a third-party Security Risk Assessment to find out: 512.310.0020 or <a href="mailto:info@thirdrock.com">info@thirdrock.com</a>.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/01/17/shortage-of-qualified-cybersecurity-workers-the-greatest-cyber-risk-of-all/">Shortage of Qualified Cybersecurity Workers: “…the greatest cyber risk of all.”</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5020</post-id>	</item>
		<item>
		<title>MACRA Deadline Approaching &#8211; Schedule your SRA today!</title>
		<link>https://thirdrock.com/blog/2017/11/30/macra-deadline-approaching-schedule-your-sra-today/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Thu, 30 Nov 2017 15:00:23 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[MACRA]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[SRA]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4833</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/11/30/macra-deadline-approaching-schedule-your-sra-today/">MACRA Deadline Approaching &#8211; Schedule your SRA today!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h4>MACRA Deadline Approaching &#8211; Schedule your SRA today!</h4>
<p>In an effort to help medical practices maximize their Medicare reimbursements by meeting MACRA requirements, Third Rock is offering a 20% discount for our Security Risk Assessment package if you schedule your SRA with Third Rock by December 8th.</p>
<p>Our tool,&nbsp;<a href="https://www.compassdb.io/" target="_blank" rel="noopener noreferrer">CompassDB</a>, makes doing an SRA fast and easy.</p>
<p>Our package offer includes:</p>
<p>✓ Security Risk Assessment and detailed report<br />
✓ A Security Risk Management consultant available onsite or online<br />
✓ Custom Policies and Procedures<br />
✓ Prioritized Corrective Action Plan<br />
✓ On-demand training for Staff and Compliance Officers<br />
✓ One year access to our online compliance management tool<br />
✓ Remote customer service for one year</p>
<p>Contact Julie Rennecker at 512-310-0020&nbsp; x113 today to&nbsp;schedule your SRA.</p>
<p>Questions?&nbsp; Email&nbsp;<a href="mailto:julie.rennecker@thirdrock.com" target="_blank" rel="noopener noreferrer">Julie.Rennecker@thirdrock.com</a></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/11/30/macra-deadline-approaching-schedule-your-sra-today/">MACRA Deadline Approaching &#8211; Schedule your SRA today!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4833</post-id>	</item>
		<item>
		<title>Upcoming Events of Interest</title>
		<link>https://thirdrock.com/blog/2017/11/29/upcoming-events-of-interest/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Wed, 29 Nov 2017 21:30:14 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Patient Information Privacy]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Third Rock presentations]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4838</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/11/29/upcoming-events-of-interest/">Upcoming Events of Interest</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">The <a href="https://www.hcca-info.org/Events/EventInfo.aspx?sessionaltcd=003_AREA1917" target="_blank" rel="noopener noreferrer">Health Care Compliance Association Regional Conference</a> will be held in Houston on Dec. 8, 2017.<br />
Third Rock&#8217;s COO, Ed Jones, PMP, CHSP, will be participating on a panel discussing the importance of Patient Information Privacy along with representatives from <a href="http://www.thsa.org/" target="_blank" rel="noopener noreferrer">THSA</a> and <a href="https://www.winstead.com/" target="_blank" rel="noopener noreferrer">Winstead</a><a href="https://www.winstead.com/" target="_blank" rel="noopener noreferrer">, PC.</a></p>
<p>Members of our Third Rock Team will also be in Dallas on Dec.14 &amp; 15 for the <em>Cybersecurity Forum </em>at the Dallas Health IT Summit. The <em>Cybersecurity Forum</em> brings together experts in healthcare IT security and privacy issues to discuss key trends in the IT security/privacy sphere, and the top challenges facing the leaders of patient care organizations in this critical area.</p>
<p>For more information on these events and others, please visit our events page.  We welcome you to attend!  Contact us at <a href="mailto:info@thirdrock.com" target="_blank" rel="noopener noreferrer">info@thirdrock.com</a> if you would be interested in having a member of our team present at one of your events.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/11/29/upcoming-events-of-interest/">Upcoming Events of Interest</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4838</post-id>	</item>
	</channel>
</rss>
