<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Robert Felps, Author at Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/author/robert/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/author/robert/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Wed, 22 Jul 2020 18:58:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Robert Felps, Author at Third Rock</title>
	<link>https://thirdrock.com/blog/author/robert/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Is it time for an upgrade?</title>
		<link>https://thirdrock.com/blog/2020/06/16/is-it-time-for-an-upgrade/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 16 Jun 2020 15:30:00 +0000</pubDate>
				<category><![CDATA[Third Rock]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9180</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/06/16/is-it-time-for-an-upgrade/">Is it time for an upgrade?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>When it comes to the cybersecurity of our devices, many of us turn a blind eye because the complexity can seem overwhelming. Questions like:</p>
<ul>
<li>What operating system are you running?</li>
<li>Do you have anti-virus AND anti-malware security?</li>
<li>What’s the difference between anti-virus and anti-malware?</li>
<li>When was your last update?</li>
</ul>
<p>The list can be longer, but a few “I don’t knows” will make anyone stop wanting to try. Keeping your operating system, antivirus and antimalware up to date is your best front line defense for cybersecurity. Vast improvements have been made to make it easier and less complicated for your PC or Mac to stay well protected. Here is a simple step by step guide to check your computer status.</p>
<h3><u><img data-recalc-dims="1" fetchpriority="high" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Windows-OS-information-e1592320587659-300x270.png?resize=300%2C270&#038;ssl=1" width="300" height="270" alt="" class="wp-image-9183 aligncenter size-medium" style="float: right;" />Windows Users</u></h3>
<p>The operating system of most PCs is Windows. That’s the easy part. The important question is, what version of Windows is on your computer? To find out, follow these simple steps:</p>
<ul>
<li>Hold the <strong>Windows logo </strong>key + <strong>R</strong>. A search box appears in the bottom corner of your screen.</li>
<li>Type <strong>winver</strong>in the <strong>Open</strong> box, and then select <strong>OK</strong>.</li>
<li>A new box will pop up showing you the version of windows your computer is running.</li>
</ul>
<p>I’ll give you a minute to check it out.</p>
<p>If your box shows anything other than Windows 10, you need a major upgrade.</p>
<h3><u>Mac Users</u></h3>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Mac-OS-information.png?resize=299%2C178&#038;ssl=1" width="299" height="178" alt="" class="wp-image-9185 aligncenter size-full" style="float: right;" />Macs are believed to be inherently safer than Windows because of the operating system. However, cybercriminals are not shying away from finding loopholes to attack your Mac. You still need diligence and the most up-to-date OS for best protection.</p>
<ul>
<li>From the Apple menu in the corner of your screen, choose <strong>About This Mac</strong>.</li>
<li>You&#8217;ll see the macOS name followed by its version number.</li>
</ul>
<p>What is the latest version? As of the day of this publication, macOS Catalina 10.15.5 is what you should see. You can reference Apple support for the most up to date list <a href="https://support.apple.com/en-us/HT201260">here</a>.</p>
<h3><u>How to update your Windows computer</u></h3>
<p>So you need an update. Let’s look at options.</p>
<p>For Windows 10 users, updates to the operating system are pushed through from Microsoft. Follow their directions (<a href="https://support.microsoft.com/en-us/help/12373/windows-update-faq">click here</a>) to make sure you have <strong>Microsoft Updates</strong> configured correctly to keep your PC updated automatically or at least with reminders.</p>
<p>Windows users running anything less than Windows 10 should visit Microsoft’s site (<a href="https://www.microsoft.com/en-us/windows/get-windows-10">click here</a>) to evaluate the best next step. Your out of date operating system is at very high risk for a cyber breach.</p>
<p>If your device is too old, it may not have the built in features you need to run Windows 10, meaning you will need a computer upgrade. If it is compatible, you will have to purchase the new operating system. Whatever your need, check with your IT department before you purchase. You may be able to get the upgrade from them if you use your personal computer for work purposes.</p>
<h3><u>How to update your Mac computer</u></h3>
<p>For Mac users, updates to the operating system are pushed through from the Apple. Follow their directions (<a href="https://support.apple.com/en-us/HT201541">click here</a>) to make sure you have updates configured correctly to keep your computer updated automatically or at least with reminders. If you are running an older device, at some point the company updates will not be compatible. If that is the case, you need to contact your IT point person about upgrading your computer or consider purchasing a new Mac. Your out of date computer is at very high risk for a cyber breach.</p>
<h3><u>Benefits of Updating = Cost savings for you and your company</u></h3>
<p>If you want to tap out because I just mentioned spending money, stay with me a little longer. The number one reason to have the most up to date operating system is the built in security. While nothing will be full proof, Windows and Apple are constantly learning of threats and vulnerabilities. They create patches and protections to stop cybercriminals from getting in. The catch is that they only do this for their latest product.</p>
<p>While it might cost some money upfront, you will save money too. For years, the expectation was that you needed to purchase a 3<sup>rd</sup> party software to protect your computer from being infected with viruses and malware. That is no longer the case. Both Windows 10 and macOS systems have built in antivirus and anti-malware software. When compared to 3<sup>rd</sup> party options, the difference in security level is minimal. There is a slight argument for layering your protection, but that is not a guarantee to block everything. If you want to read more about this, Windows users can click <a href="https://www.howtogeek.com/225385/what%E2%80%99s-the-best-antivirus-for-windows-10-is-windows-defender-good-enough/">here</a> and Mac users can click <a href="https://www.howtogeek.com/437846/do-you-need-an-antivirus-on-a-mac/">here</a>.</p>
<p>More importantly, a breach can cost your company dearly. In fact, 60% of small businesses go out of business within six months of falling victim to cyber crime. Cybersecurity is not about latest technology, it is about safety of your customers and company data.</p>
<h3><u>The Human Firewall is Required</u></h3>
<p>Mike Moran, with Third Rock, put it this way; “Vigilant employees are still the best defense. If you are running Office365, assume that it is only going to catch 40% of the bad things coming through, you still have to be smart enough to recognize the other 60% and not click on them.”</p>
<p>No matter how much you pay for antivirus, anti-malware and top of the line cybersecurity, you still have to be a smart user. Use best practices for passwords that are hard to crack, tips to recognize phishing attempts and smart choices when searching the internet. You can’t prevent a breach, but you can reduce your chances.  Train ALL of your employees at least once a year on cybersecurity awareness.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_with_border et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_3_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: right;">Download our Cyber Hygiene Checklist for updating your device to share with friends, family and coworkers.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_button_module_wrapper et_pb_button_0_wrapper  et_pb_module ">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://thirdrock.com/wp-content/uploads/Cyber-Hygiene-Device-cybersecurity-Checklist-2020-CyberCompass.pdf" target="_blank">Download now</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/06/16/is-it-time-for-an-upgrade/">Is it time for an upgrade?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9180</post-id>	</item>
		<item>
		<title>A Resurgence in Pretexting scams</title>
		<link>https://thirdrock.com/blog/2020/05/15/a-resurgence-in-pretexting-scams/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 15 May 2020 12:35:26 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9089</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/05/15/a-resurgence-in-pretexting-scams/">A Resurgence in Pretexting scams</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2 et_pb_gutters2">
				<div class="et_pb_column et_pb_column_3_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Cybercriminals continuously modify to match the “market”: namely you, their targets. Scams cycle in popularity based on their effectiveness with current trends. With “new” remote workforce, we are experiencing a resurgence in pretexting. The lack of personal interaction is making it easier for cybercriminals to impersonate coworkers and company representatives in order to steal your money and your private information.</p>
<h3>What is it?</h3>
<p>Pretext means false motive.  Pretexting is defined as the practice of presenting oneself as someone else in order to gain private information. A scammer attempts to build a connection in one of two ways: impersonate someone you know, such as a coworker, or fabricate an identity of a worker from a trusted company. No matter the means, their end goal is to steal your private information. Unlike a hacker who goes in the back door to steal without you knowing, a good pretext scam has you willingly give them what they want.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;"><em>A cybercriminal contacts HR impersonating a worker. They inform HR that their bank account information has changed and they need to update the information for their direct deposit. Without proper verification, HR begins sending paychecks to a criminal.</em></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3 et_pb_gutters2">
				<div class="et_pb_column et_pb_column_1_3 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;"><em>An IT representative calls you saying there have been small breaches on company computers. He needs to remotely access your computer to ensure all cybersecurity protocols are in place on your company device. Since everyone is working remotely, he can’t have you bring your device in, which is normal procedure, so this is the next best option. You give him your IP address and he has access to control your computer. You see random windows beginning to pop up and realize too late he is stealing your information.</em></p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_3 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>How does this scam work?</h3>
<p>A successful pretexting scam is built on trust. The scammer represents themselves in a legitimate way, gains your trust and then asks for the information they are looking for. Believing you are talking to a real representative, you give over your information willingly. The scammer takes their time researching the target (you) which allows them to build a persona that will have the most chance of success. Some tools of successful pretexting include:</p>
<ul>
<li>Connecting with target over similar interests</li>
<li>Keep the scam simple – no complicated reasons or requests</li>
<li>Create a trusted character</li>
<li>Ask for target’s information under the guise of verification</li>
<li>Uses logical conclusions or follow through for the target</li>
</ul>
<p><a href="https://www.wrcbtv.com/story/42016879/cyber-security-expert-explains-potential-danger-of-viral-facebook-challenge"></a></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_4 et_pb_gutters2">
				<div class="et_pb_column et_pb_column_2_3 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>How is it being used?</h3>
<p>The scam is built on luring you into trusting through impersonation. Cybercriminals use just enough information to make you think they are legitimate so you willingly provide them information. The recent Facebook challenge is a great example. In support of high school seniors who are not getting a normal graduation, people were challenged to post their own graduation pictures. The Better Business Bureau warned this was an opportunity for cyber criminals to find personal information about your high school, age, and school mascot to be used against you.  Read more <a href="https://www.wrcbtv.com/story/42016879/cyber-security-expert-explains-potential-danger-of-viral-facebook-challenge">here</a></p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><em>An employee in the finance department received a request to transfer a large sum of money to a vendor. Thinking it was from a legitimate client, they authorized the transfer without verification. It was later discovered that the request came from a cybercriminal impersonating the client.</em></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Defend yourself and your company:</h3>
<ol>
<li>Limit the personal information you post on social media
<ul>
<li>Remember that these scams involve researching the target. The more information you willingly post, the easier it is for them to create a character that will connect with you</li>
</ul>
</li>
<li>Go to the source
<ul>
<li>If a representative from a company contacts you either in person, on the phone or via email, verify their identity directly with the company. If someone shows up at your house, find the corporate company’s phone number and call from your personal phone. It may seem rude and take longer, but you could be protecting yourself from a scam.</li>
</ul>
</li>
<li>Never give out personal information
<ul>
<li>Real company representatives will never ask you for your password, full account numbers or credit card numbers. General conversations that steer in a direction asking too many personal questions about your family and job should be a red flag. You can decline answering in a polite way while not giving away information.</li>
</ul>
</li>
<li>Protect your organization
<ul>
<li>Do not give out company information, even if the requester appears to be from within the company. Know your company’s procedures for how they communicate when there is an issue, or they need information from you.</li>
</ul>
</li>
</ol></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6 et_pb_gutters2">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: right;">Get a copy of our checklist to share with friends, family and coworkers</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_button_module_wrapper et_pb_button_1_wrapper et_pb_button_alignment_left et_pb_module ">
				<a class="et_pb_button et_pb_button_1 et_pb_bg_layout_light" href="https://thirdrock.com/wp-content/uploads/Cyber-Hygiene-Pretexting-Checklist-2020-Third-Rock.pdf">Download now</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2020/05/15/a-resurgence-in-pretexting-scams/">A Resurgence in Pretexting scams</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9089</post-id>	</item>
		<item>
		<title>Third Rock moves to new office</title>
		<link>https://thirdrock.com/blog/2020/02/24/third-rock-moves-to-new-office/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Mon, 24 Feb 2020 19:58:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Third Rock]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9369</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/02/24/third-rock-moves-to-new-office/">Third Rock moves to new office</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Since 1995, Third Rock has been creating solutions to help businesses navigate the confusing world of cybersecurity and compliance. We took our combined knowledge and years of experience to build a better way to manage cyber risk.</p>
<p>As our business continues to grow, Third Rock is on the move. In order to better serve our local clients, Third Rock is upgrading its office space. With more room for conferencing, we are ready to help your business work toward cyber resilience. <a href="https://thirdrock.com/contact-us">Contact us</a> to set up a time to talk about starting your journey toward Cyber Confidence.</p>
<p>&nbsp;</p>
<p>595 Round Rock West Dr Suite 401, Round Rock, Tx 78681</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/02/24/third-rock-moves-to-new-office/">Third Rock moves to new office</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9369</post-id>	</item>
		<item>
		<title>EXEMPT is not a FREE PASS with 23 CRR 500 NY DFS</title>
		<link>https://thirdrock.com/blog/2020/01/31/exempt-is-not-a-free-pass-with-23-crr-500-ny-dfs/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 31 Jan 2020 15:00:00 +0000</pubDate>
				<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8754</guid>

					<description><![CDATA[<p>Exempt. When we hear that word, we think about being “off the hook” or that we have immunity. We feel free of meeting the same expectation as someone else. &#160;We’ve [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2020/01/31/exempt-is-not-a-free-pass-with-23-crr-500-ny-dfs/">EXEMPT is not a FREE PASS with 23 CRR 500 NY DFS</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="has-normal-font-size">Exempt. When we hear that word, we think about being
“off the hook” or that we have immunity. We feel free of meeting the same expectation
as someone else. &nbsp;We’ve escaped fulfilling
requirements.</p>



<p class="has-normal-font-size">Not so fast! If you’re an insurance broker with clients in New York,
the NY Department of Financial Services (NYDFS) 23 NYCRR 500 cybersecurity
regulations still apply to your company.&nbsp;
Exempt means most brokers, bankers and all other financial service
organizations need to complete a risk assessment and attest to them before <strong>April
15, 2020</strong> to avoid fines and penalties.</p>



<h3 class="wp-block-heading"><strong>I’m a small, exempt, business. Why is compliance important?</strong></h3>



<p class="has-normal-font-size">Often times, small to medium sized companies get the raw end of the
deal when it comes to compliance. Higher expectations usually mean more money
and more personnel, which is easier said than done.</p>



<p class="has-normal-font-size">NYDFS recognizes how cybercrime is wreaking havoc on the financial
industry.&nbsp; They want even the smallest
companies to have basic security in place to best protect their clients and
themselves. Why? Cyber criminals know small and medium sized companies tend to
have lower security in place, making them a perfect target. In fact, according
to Verizon’s Data Breach Report, 43% of cyber-attacks targeted small
businesses.&nbsp; NYDFS is leading the nation
in getting the industry more cybersecure at all levels.</p>



<div class="wp-block-image"><figure class="alignleft size-medium"><img loading="lazy" decoding="async" width="286" height="300" src="//i1.wp.com/thirdrock.com/wp-content/uploads/blog-pullout-286x300.png" alt="Reserved: NYDFS regulation 500.19(a)(1) – You are entitled to this exemption when a Covered Entity has fewer than 10 employees, including independent contractors.  This is a limited exemption and you must still design and implement a cybersecurity program that meets some but not all the regulatory requirements.  This includes submitting an annual Certification of Compliance.


" class="wp-image-8761" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/blog-pullout.png?resize=286%2C300&amp;ssl=1 286w, https://i0.wp.com/thirdrock.com/wp-content/uploads/blog-pullout.png?w=366&amp;ssl=1 366w" sizes="(max-width: 286px) 100vw, 286px" /></figure></div>



<p></p>



<p></p>



<h3 class="wp-block-heading"><strong>IT manages our cyber risk, right?</strong></h3>



<p class="has-normal-font-size">This is where the false sense of security
is with many insurance brokers and organizations. Most IT departments or Manage
Service Providers (MSPs) are focused on technology and data access.&nbsp; They don’t know if you are conducting cyber
security awareness training for your employees or if you have accurate security
measures in place for vendors.</p>



<p class="has-normal-font-size">NYDFS wants businesses to move to a holistic and vigilant approach by
building a cyber resilient culture that goes beyond technology.&nbsp; To outpace the cyber criminals, you must
create a culture of cybersecurity within your company that covers your people,
processes, technology and vendors.</p>



<p class="has-normal-font-size">Not sure of your next step?&nbsp; Here
is a break down and what you need to do before April 15, 2020:</p>



<p></p>



<p></p>



<p></p>



<p></p>



<h3 class="wp-block-heading"><strong>Compliance starts with knowing your risk across your organization</strong></h3>



<p class="has-normal-font-size">All financial services, regardless of size, must do the following to design and implement a cybersecurity program to meet regulations.  </p>



<p class="has-normal-font-size">1 &#8211; <span style="font-size: inherit;">Conduct a proper risk assessment that covers </span><strong style="font-size: inherit;">14 topics around people, processes, technology and vendors.</strong></p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?fit=1024%2C488&amp;ssl=1" alt="" class="wp-image-8762" width="823" height="392" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?w=1889&amp;ssl=1 1889w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=300%2C143&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=1024%2C488&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=768%2C366&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=1536%2C732&amp;ssl=1 1536w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=1080%2C515&amp;ssl=1 1080w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=1280%2C610&amp;ssl=1 1280w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=980%2C467&amp;ssl=1 980w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=480%2C229&amp;ssl=1 480w" sizes="(max-width: 823px) 100vw, 823px" /></figure></div>



<p class="has-normal-font-size">2 &#8211; Make sure you have policies, procedures, and documentation that covers the 14 areas. </p>



<p class="has-normal-font-size">3 &#8211; NYDFS requires documentation for several plans: <em>(Make sure you check with your IT and/or IT provider you have to make sure these plans are available regarding cyber breach!)</em></p>



<figure class="wp-block-table is-style-stripes"><table><tbody><tr><td><strong>Risk Management Plan   </strong></td><td><em>Outlines what you are doing to   prevent cybercrime, improve cybersecurity and information protection and reduce cyber risk</em>   </td></tr><tr><td><strong>Incident Response Plan </strong>  </td><td><em>Details action to respond to an incident across your organization</em>   </td></tr><tr><td><strong>Business Continuity/Disaster Recovery Plan   </strong></td><td><em>Details actions to minimize and recover from a breach   across your organization</em>   </td></tr><tr><td><strong>Breach Notification Plan </strong>  </td><td><em>Defines who you need to notify, when to notify and how to notify to avoid penalties and limit liabilities</em>   </td></tr></tbody></table></figure>



<h3 class="wp-block-heading"><strong>Lacking resources, time and expertise to get NYDFS 500
compliant by April 15, 2020?</strong></h3>



<p class="has-normal-font-size">We understand that compliance can feel overwhelming. It seems
expensive, difficult, and almost unattainable.&nbsp;
The deadline looks like a huge mountain you have to climb.&nbsp; At Third Rock, we offer <a href="https://thirdrock.com/nydfs/">CyberCompass®,</a> a self-guided
automation tool to make your compliance journey easier and affordable while
still meeting the deadline. &nbsp;</p>



<p class="has-normal-font-size">CyberCompass® is automated, cloud-based compliance
software with built-in expertise that translates NYDFS government requirements
into layman’s terms. It does most of the heavy lifting for your risk
assessment, analysis, remediation and compliance documentation- including
updated policies and procedures and all the required plans. There is no
software to download or install and it can be accessed anywhere. <a href="https://youtu.be/0STdfcFqjLg">Click here</a> for a quick video about how CyberCompass® works with NYDFS
compliance. &nbsp;<strong>Note: If you are an ELANY
member, check out this CyberCompass</strong><strong>®</strong><strong> offer to </strong><a href="https://elany.org/CyberSecurityCompliance.aspx"><strong>ELANY members!</strong></a><strong></strong></p>



<p class="has-normal-font-size">Need assistance and want a compliance coach? Third Rock offers
affordable expertise to help you get to the deadline.

Don’t let cyber uncertainty keep you from
protecting your business and your clients. <a href="mailto:info@thirdrock.com?subject=Tell%20me%20more%20about%20CyberCompass™">Contact us today</a> and see how we can prepare you for the NYDFS
deadline and to best protect your clients and business.



</p>
<p>The post <a href="https://thirdrock.com/blog/2020/01/31/exempt-is-not-a-free-pass-with-23-crr-500-ny-dfs/">EXEMPT is not a FREE PASS with 23 CRR 500 NY DFS</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8754</post-id>	</item>
		<item>
		<title>Nivola HIPAA training added to CyberCompass®</title>
		<link>https://thirdrock.com/blog/2019/09/04/nivola-hipaa-training-added-to-cybercompass/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Wed, 04 Sep 2019 18:39:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[Nivola Heathcare Solutions]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9363</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/09/04/nivola-hipaa-training-added-to-cybercompass/">Nivola HIPAA training added to CyberCompass®</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_13  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_11  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><div><span>CyberCompass® offers a new <a href="https://thirdrock.com/hipaa/#hipaa_training">HIPAA training</a> by Nivola Healthcare. Specifically developed by two of the top healthcare law professionals, you get clear and concise information vital to maintaining patient security. With CyberCompass® Nivola HIPAA training, you will  </span></div>
<div><span></span></div>
<ul>
<li><span>gain a practical understanding for HIPAA regulations.</span></li>
<li><span>how to best incorporate them with your staff and throughout the practice</span></li>
<li><span>improve your HIPAA compliance with our built in completion tracking</span></li>
</ul>
<div></div>
<div><span>The brief, engaging modules allow you to work at your own pace. With a staff driven to a shared understanding for patient privacy and security, your business gains greater compliance. It allows practices to complete the training without impacting staff productivity through its on-demand feature. By offering the training through the CyberCompass® platform, you also get the exclusive benefit of a built-in learning management system so you can easily track completion of staff members throughout their tenure with your practice – from on-boarding to annual training requirements. All your compliance reporting is easily accessible. </span></div>
<div><span style="font-size: 16px;">Note: Modules are available for specific Texas laws, including the latest HB300 </span><span style="font-size: 16px;">requirements</span><span style="font-size: 16px;"> </span><span style="font-size: 16px;">.</span></div>
<div></div>
<div>About Nivola training:</div>
<div>
<div><span>Lead by Pegi S. Block, JD and Debbie Elmore, RPh, JD, CHPC, their combined experience from the past 20 years in healthcare law provides a unique perspective to help healthcare providers avoid HIPAA fines and penalties. Before co-founding Nivola Training, Pegi represented healthcare providers both in Texas and in various multi-district litigations across the country. Debbie has represented numerous healthcare providers and medical entities in privacy and cyber law matters, regulatory and compliance matters, governmental investigations, Texas Attorney General proceedings and medical board proceedings.</span></div>
</div>
<div></div></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/09/04/nivola-hipaa-training-added-to-cybercompass/">Nivola HIPAA training added to CyberCompass®</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9363</post-id>	</item>
		<item>
		<title>Third Rock now offers NY DFS 500 Risk Assessments</title>
		<link>https://thirdrock.com/blog/2019/06/14/third-rock-now-offers-ny-dfs-500-risk-assessments/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 14 Jun 2019 12:30:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[NY DFS 500]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9342</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/06/14/third-rock-now-offers-ny-dfs-500-risk-assessments/">Third Rock now offers NY DFS 500 Risk Assessments</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_14  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_12  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Third Rock, powered by <a href="https://cybercompass.co">CyberCompass®</a>, now includes the NYDFS security risk assessment required by all New York financial entities.  The <a href="http://www.dfs.ny.gov/legal/regulations/adoptions/dfsrf500txt.pdf">NYDFS Cybersecurity Regulation</a> (23 NYCRR 500) is “designed to promote the protection of customer information as well as the information technology systems of regulated entities”. This regulation requires each company to conduct a risk assessment and then implement a program with security controls for detecting and responding to cyber events.</p>
<p>The NYDFS has supervisory power over banks, insurance companies, and other financial service companies. More specifically, they supervise the following covered entities:</p>
<ul>
<li>Credit Unions</li>
<li>Health Insurers</li>
<li>Investment Companies</li>
<li>Licensed Lenders</li>
<li>Life Insurance Companies</li>
<li>Mortgage Brokers</li>
<li>Savings and Loans Associations</li>
<li>Private Bankers</li>
<li>Offices of Foreign Banks</li>
<li>Commercial Banks</li>
</ul>
<p>There are some <a href="https://thirdrock.com/blog/2020/01/31/exempt-is-not-a-free-pass-with-23-crr-500-ny-dfs/">exceptions</a> to entities that have to meet the regulations.</p>
<p>NYDFS requires entities to complete the following:</p>
<ul>
<li><strong>Risk Assessments</strong></li>
<li><strong>Audit Trail</strong> including updated policy and procedures</li>
<li><a href="https://www.varonis.com/blog/incident-response-plan/"><strong>Incident Response Plan</strong></a></li>
</ul>
<p>CyberCompass® automates the numerous steps to completing a risk assessment with its on-demand, cloud-base software so a security risk assessment can be completed in 70% less time.  It offers the unique feature to go beyond technology for information security and add the people, process and vendor compliance for information security.  </p>
<p>“We expect what is happening in New York to happen across the country,” stated Robert Felps, CEO.  “We have engineered CyberCompass to help companies meet regulations faster and require less work hours through built-in expertise and automated workflow.”</p>
<p>With Third Rock expertise and guidance, we work with you to use CyberCompass® to increase your compliance and manage your cyber risk.</p>
<table width="667">
<tbody>
<tr>
<td width="157"><strong>Steps necessary to complete Security Risk Assessments</strong></td>
<td width="510"><strong>How CyberCompass® automates workflow to complete a security risk assessment with its built-in expertise.</strong></td>
</tr>
<tr>
<td width="157"><strong>1. <span> </span></strong>Identify threats and vulnerabilities</td>
<td width="510">By answering our online, on demand risk assessment survey.  The questions have been specifically tailored and written in simple language to meet the NYDFS regulations and combined our cyber security risk expertise to assess your employees, processes, technologies and vendors.</td>
</tr>
<tr>
<td width="157"><strong>2. <span> </span></strong>Qualify the extent of the risk</td>
<td width="510">By answering our online, on demand risk assessment survey.  The questions have been specifically tailored and written in simple language to meet the NYDFS regulations and combined our cyber security risk expertise to assess your employees, processes, technologies and vendors.</td>
</tr>
<tr>
<td width="157"><strong>3. <span> </span></strong>Mitigate the risks to reduce them to an agreed and acceptable level</td>
<td width="510">CyberCompass® automatically provides the corrective actions with a step by step guide that helps you  ‘terminate’ the risk by eliminating it entirely, ‘treat’ the risk by applying security controls, ‘transfer’ the risk to a third party, or ‘tolerate’ the risk.</td>
</tr>
<tr>
<td width="157"><strong>4. <span> </span></strong>Update policies and procedures</td>
<td width="510">CyberCompass® has a built-in template to provide you a complete set of policies and procedures.</td>
</tr>
<tr>
<td width="157"><strong>5. <span> </span></strong>Create incident response plan</td>
<td width="510">A unique feature, only CyberCompass® can create the required incident response plan</td>
</tr>
<tr>
<td width="157"><strong>6. <span> </span></strong>Review, monitor and audit.</td>
<td width="510">Utilizing CyberCompass® software subscription and built in notifications, CyberCompass® empowers you to manage cyber risk in one place across the entire organization.</td>
</tr>
</tbody>
</table></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/06/14/third-rock-now-offers-ny-dfs-500-risk-assessments/">Third Rock now offers NY DFS 500 Risk Assessments</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9342</post-id>	</item>
		<item>
		<title>Ignorance is not Innocence</title>
		<link>https://thirdrock.com/blog/2019/06/11/ignorance-is-not-innocence/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 11 Jun 2019 14:00:30 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[culpability]]></category>
		<category><![CDATA[HITECH]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=7561</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/06/11/ignorance-is-not-innocence/">Ignorance is not Innocence</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_15  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_13  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Cyber security breaches are constantly in the news. Hundreds, if not thousands, occur across every kind of industry each year. Healthcare has consistently been a prime target for cyber criminals to gain access to personal health information (PHI) which can be sold for high profit on the dark web. In fact, 2018 marked an all-time high of $28.7 million in fines from HIPAA entities and their business associates.</p>
<p> In an effort to encourage healthcare organizations to better protect their patients’ information the Health Information Technology for Economic and Clinical Health (HITECH) Act was instituted, though the wording of the original bill left much open to interpretation. An element of the Act created tiers for HIPAA and breach violations. However, HHS admitted there was inconsistent language in the HITECH Act about the penalty scheme. Due to this, the penalty cap for every tier was set at $1.5 million. Commenters expressed concerns that the “penalty scheme is inconsistent with the HITECH Act’s establishment of different tiers based on culpability.”</p>
<p> So what is the culpability? Webster defines it as the “guilt or blame that is deserved”. HITECH tiers define it like this:</p>
<ul>
<li> the person did not know (and, by exercising reasonable diligence, would not have known) that the person violated the provision;</li>
<li>the violation was due to reasonable cause, and not willful neglect;</li>
<li>the violation was due to willful neglect that is timely corrected; and</li>
<li>the violation was due to willful neglect that is not timely corrected.</li>
</ul>
<p>Under the new payment scheme, fines will increase based on which tier your breach falls into:</p>
<p>&nbsp;</p>
<table>
<tbody>
<tr>
<td width="180">
<p><strong>Culpability</strong></p>
</td>
<td width="180">
<p><strong>Min Penalty/ Violation</strong></p>
</td>
<td width="180">
<p><strong>Max Penalty/ Violation</strong></p>
</td>
<td width="180">
<p><strong>Annual Limit</strong></p>
</td>
</tr>
<tr>
<td width="180">
<p>No Knowledge</p>
</td>
<td width="180">
<p>$100</p>
</td>
<td width="180">
<p>$50,000</p>
</td>
<td width="180">
<p>$25,000</p>
</td>
</tr>
<tr>
<td width="180">
<p>Reasonable Cause</p>
</td>
<td width="180">
<p>$1,000</p>
</td>
<td width="180">
<p>$50,000</p>
</td>
<td width="180">
<p>$100,000</p>
</td>
</tr>
<tr>
<td width="180">
<p>Willful Neglect – Corrected</p>
</td>
<td width="180">
<p>$10,000</p>
</td>
<td width="180">
<p>$50,000</p>
</td>
<td width="180">
<p>$250,000</p>
</td>
</tr>
<tr>
<td width="180">
<p>Willful Neglect – Not Corrected</p>
</td>
<td width="180">
<p>$50,000</p>
</td>
<td width="180">
<p>$50,000</p>
</td>
<td width="180">
<p>$1,500,000</p>
</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>This is all great and nice to know, but what does this look like in practice? It might look something like this: </p>
<ul>
<li>You have completed a wholistic Security Risk Assessment and have made efforts to improve your cyber security. Even with reasonable policies and procedures in place, a breach still occurred.</li>
<li>You have certain elements of security in place, but a breach got through by a reasonable cause, such as an employee falling for a phishing scheme.</li>
<li>You made no effort to protect your cyber security, but worked to correct the problem after a breach.</li>
<li>You made no effort to protect your cyber security and did not attempt to correct it after a breach.</li>
</ul>
<p>If you read the HHS OCR’s audit summary letters you can conclude that doing number one will keep you from being fined $50,000 for willful neglect regarding a risk assessment, but option four will land you a $50,000 fine.</p>
<p>Which tier best applies to you?  Do you even know where to start?</p>
<p> Our Cyber Quick Check can have you on the path to a better understanding of your current cyber security in less than 2 minutes. Because knowing is the first step toward empowering you to manage your cyber risk.</p>
<p>&nbsp;</p>
<p><a href="https://cyberquickcheck.com/thirdrock">https://cyberquickcheck.com/thirdrock</a></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2019/06/11/ignorance-is-not-innocence/">Ignorance is not Innocence</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7561</post-id>	</item>
		<item>
		<title>Infosec in Healthcare: a new priority for patient safety</title>
		<link>https://thirdrock.com/blog/2019/06/06/infosec-in-healthcare-a-new-priority-for-patient-safety/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 06 Jun 2019 14:00:47 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Patient Information Privacy]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=7556</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/06/06/infosec-in-healthcare-a-new-priority-for-patient-safety/">Infosec in Healthcare: a new priority for patient safety</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_11">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_16  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_14  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p> <img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/doctor-with-nurse-on-phone.jpg?resize=300%2C200&#038;ssl=1" width="300" height="200" alt="" class="wp-image-4453 aligncenter size-medium" style="float: right;" scale="0" />Patient safety in the healthcare industry has always been a priority. Mainly, that referred to physical safety, but with the changing landscape of technology, information security needs to also become a priority. Healthcare is repeatedly a prime target for cyber criminals looking for quick access to valuable data.</p>
<p>A recent article from HealthIT News claims that CEOs need to make information security (infosec) their number 2 priority. Why not number one?  James Doulgeris, CEO of Osler Health believes &#8220;that responsibility belongs to the CIO or CTO. It should be their number 2 or number 1. The only time something like that hits a CEO’s top five is if the person responsible is not doing their job.&#8221; This culture is what needs to change in healthcare, because by the time it reaches the top, it’s too late. The breach has occurred, you have let down thousands of patients and you’re losing money.</p>
<p>Fear of a breach, and the potential consequences, will not be the driving force toward change. CEOs need to see this as a business move to shift the prioritizing of funds. Not enough of a hospital’s budget is dedicated toward security and that is a CEO issue. Infosec needs are constantly changing, so investing funds cannot be one and done. Structures, processes and procedures have to be in place and continuously monitored to create a secure environment.</p>
<p>&#8220;Security is important enough to be above everything else,&#8221; said David Chou, a veteran hospital executive who is currently VP and principal analyst at Constellation Research. But he knows the reality of that takes a culture change that must come from the top. &#8220;[It] means turning the culture upside down and thinking about security as aggressively as many hospitals focus on hand washing. That same effort has to be there for every employee.&#8221;</p>
<p>Richard Staynings, Chief Security Strategist with Security Associates and an HIMSS Cybersecurity Committee member, agreed that patient safety must be a top priority for CEOs. &#8220;<strong>Cybersecurity is, like it or not, a primary component of patient safety now.</strong>&#8221; Patient confidentiality goes out the window when a breach occurs, and everything can become public knowledge. This is the battle hospitals, clinics and every doctors’ office now face.</p>
<p>CEOs also need to recognize that investing in security now actually helps with innovation growth . Just as innovation growth is a multi-step process that will happen over time, so is infosec, and they need to be viewed as a combined entity. If you are designing a plan to increase technology within a hospital, then best practices would have you increase your security at the same time. CEOs need to see these as mutually inclusive instead of exclusive.</p>
<p>As many can attest, culture comes from the top. What a CEO sees as a priority, so will others in the company. That change needs to start with seeing that patient safety now includes information security.</p>
<p>Protect your data. Protect your practice. Protect your patients.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/06/06/infosec-in-healthcare-a-new-priority-for-patient-safety/">Infosec in Healthcare: a new priority for patient safety</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7556</post-id>	</item>
		<item>
		<title>The Current State of Privacy and Cybersecurity in Texas Healthcare Organizations</title>
		<link>https://thirdrock.com/blog/2018/10/11/the-current-state-of-privacy-and-cybersecurity-in-texas-healthcare-organizations/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 11 Oct 2018 15:00:21 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA Privacy]]></category>
		<category><![CDATA[Patient Information Privacy]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5855</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/10/11/the-current-state-of-privacy-and-cybersecurity-in-texas-healthcare-organizations/">The Current State of Privacy and Cybersecurity in Texas Healthcare Organizations</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_12">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_17  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_15  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-full wp-image-5856" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/IHIT_Avatar18-200.jpg?resize=200%2C200&#038;ssl=1" alt="" width="200" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/IHIT_Avatar18-200.jpg?w=200&amp;ssl=1 200w, https://i0.wp.com/thirdrock.com/wp-content/uploads/IHIT_Avatar18-200.jpg?resize=150%2C150&amp;ssl=1 150w" sizes="(max-width: 200px) 100vw, 200px" /></p>
<p>&nbsp;</p>
<p>Health IT has come a long way since the HITECH Act was introduced almost 10 years ago. Technology availability and accessibility has also increased dramatically in that time frame. While better connectivity has revolutionized healthcare, it has also opened the door to cyber risks.</p>
<p>Testimony before the Texas Health Services Authority Board at the Texas State Capitol on Friday, October 4 reinforced recent headlines that cybersecurity is a persistent problem; one that will require greater resources at all levels of healthcare and healthcare governance. Representatives from the Texas Attorney General’s Office, the Texas Medical Board, Texas Medical Liability Trust, University of Texas, and Cynergistek<a href="#_ftn1" name="_ftnref1">[1]</a>, along with Third Rock CEO, Robert Felps, took turns presenting data and observations on the “current state of cybersecurity and privacy in Texas healthcare” from their professional perspectives. Though some gains have been made in recent years, key points across the presentations made clear that Texas healthcare organizations – and the supporting governing bodies – still have work to do to safeguard patient data.  Here are the key takeaways:</p>
<p>&nbsp;</p>
<ol>
<li><strong>Available data indicate that Texas healthcare organizations remain extremely vulnerable to cyber threats. </strong></li>
</ol>
<ul>
<li>In 2017, TMLT received reports of 600 data privacy and security incidents, or breaches. There have only been 103 incidents so far in 2018 (Jan-Sept), but that’s still an average of 11.4 incidents/month.</li>
<li>Mac MacMillan, CEO of Cynergistek, reported that his firm is notified of at least one security incident a day by one of their 1500 hospital clients, which includes 70 academic medical centers.</li>
</ul>
<p>&nbsp;</p>
<ol start="2">
<li><strong>Both formal and informal reports indicate that healthcare organizations have an incomplete approach to cybersecurity and HIPAA compliance.</strong></li>
</ol>
<ul>
<li>In 2016, the OCR Random Audit Program evaluated 63 Covered Entities. Of the audited organizations, 13 had not attempted to perform a Security Risk Assessment (SRA). Of the 50 organizations that had completed an SRA, <u>none</u> satisfied the OCR’s requirements.</li>
<li>MacMillan also reported that fewer than half of Cynergistek&#8217;s client organizations meet the NIST requirements for cybersecurity; a situation he attributed to a lack of both human and financial resources.</li>
</ul>
<p>&nbsp;</p>
<ol start="3">
<li><strong>Too many healthcare organizations are financially unprepared for a cyber event. </strong></li>
</ol>
<ul>
<li>70% of healthcare organizations report having <em><u>no cyber insurance</u><strong>.</strong></em></li>
<li>The combination of legal fees, penalties, increased administrative costs, and loss of business resulting from an information security incident can potentially put a healthcare organization out of business.</li>
</ul>
<p><strong> </strong></p>
<ol start="4">
<li><strong>There is a significant shortage of adequately-trained cybersecurity personnel. </strong></li>
</ol>
<ul>
<li>According to MacMillan, there are currently about 780,000 cybersecurity employees and approximately 350,000+ cybersecurity job vacancies. By 2021, labor experts are predicting 3.5 <em>million</em> cybersecurity job vacancies.</li>
<li>When he visits a client hospital and asks &#8220;Who&#8217;s taking care of ‘x’ cybersecurity technology?&#8221; he is often referred to an IT employee with no cybersecurity experience.</li>
</ul>
<p>&nbsp;</p>
<ol start="5">
<li><strong>Enforcement responsibility for healthcare data privacy and security is distributed across multiple state agencies, resulting in incomplete data and inconsistent enforcement.</strong></li>
</ol>
<ul>
<li>At the state level, responsibility for enforcing HIPAA and HB300 falls to the Texas Medical Board, Texas Board of Nursing, Dept of Health Services (DHS), Office of the Attorney General and others.</li>
<li>Agencies report aggregate numbers to the Office of the Attorney General of complaints received and of incidents resulting in disciplinary action. However, specific cases are only referred to the Attorney General’s Office when the Agency believes an incident warrants civil or criminal penalties that only the AG’s office can impose.</li>
</ul>
<p>&nbsp;</p>
<ol start="6">
<li><strong>Information security incidents negatively impact patients – both directly and indirectly.</strong></li>
</ol>
<ul>
<li>Healthcare records are worth substantially more on the black market than credit card or even social security numbers, making healthcare records a prime target for cyber criminals.</li>
<li>A security incident resulting in identity theft can take years, and thousands of dollars, for an affected patient to correct.</li>
<li>A ransomware attack can bring care delivery to a standstill, freezing infusion pumps and other medical devices, putting patients at risk.</li>
</ul>
<p>&nbsp;</p>
<h4 style="text-align: center;">Are you cyber confident?  Can you afford no action?  Third Rock makes it simple and affordable.</h4>
<p style="text-align: center;"><strong>Protect your patients, protect your practice, protect yourself</strong></p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> A cyber security consulting firm, <a href="https://cynergistek.com/">https://cynergistek.com/</a></p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> Texas Medical Liability Trust, the largest medical provider in the state, <a href="https://tmlt.org/tmlt">https://tmlt.org/tmlt</a></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/10/11/the-current-state-of-privacy-and-cybersecurity-in-texas-healthcare-organizations/">The Current State of Privacy and Cybersecurity in Texas Healthcare Organizations</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5855</post-id>	</item>
		<item>
		<title>THT Healthcare Governance Conference 2018</title>
		<link>https://thirdrock.com/blog/2018/07/24/tht-healthcare-governance-conference-2018/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 24 Jul 2018 13:30:01 +0000</pubDate>
				<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[Healthcare Governance Conference]]></category>
		<category><![CDATA[sponsor]]></category>
		<category><![CDATA[THT]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5801</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/07/24/tht-healthcare-governance-conference-2018/">THT Healthcare Governance Conference 2018</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_13">
							<div class="et_pb_column et_pb_column_4_4 et_pb_column_18  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_16  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="size-medium wp-image-5802 aligncenter" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/THT.png?resize=300%2C152&#038;ssl=1" alt="" width="300" height="152" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/THT.png?resize=300%2C152&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/THT.png?w=659&amp;ssl=1 659w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>As a board member or executive of a hospital, have you ever wondered exactly what responsibility you have, if any, for security? Not just the physical security of the people who come to the hospital for care, but the protection of their information long after treatment has been given. Are you doing everything in your power to keep patients &#8220;cyber safe&#8221;?</p>
<p>Third Rock is excited to be a sponsor of this year&#8217;s Healthcare Governance Conference.&nbsp; Come visit us at <strong>table 15</strong> to find out exactly what questions you should be asking about the state of your cyber security.&nbsp; We can help you assess your current level of risk and create a personalized plan to get you where you need to be. Because the worst questions are the ones that are never asked.</p>
<p style="text-align: center;"><strong>Protect your Patients. Protect your Organization. Protect Yourself.</strong>™</p></div>
			</div>
			</div>		
				
				
				
				
			</div>	
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/07/24/tht-healthcare-governance-conference-2018/">THT Healthcare Governance Conference 2018</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5801</post-id>	</item>
	</channel>
</rss>
