<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Compliance &amp; Security Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/compliance-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/compliance-security/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Fri, 11 Oct 2019 13:51:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Compliance &amp; Security Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/compliance-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Infosec in Healthcare: a new priority for patient safety</title>
		<link>https://thirdrock.com/blog/2019/06/06/infosec-in-healthcare-a-new-priority-for-patient-safety/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 06 Jun 2019 14:00:47 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[infosec]]></category>
		<category><![CDATA[Patient Information Privacy]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=7556</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/06/06/infosec-in-healthcare-a-new-priority-for-patient-safety/">Infosec in Healthcare: a new priority for patient safety</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p> <img data-recalc-dims="1" fetchpriority="high" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/doctor-with-nurse-on-phone.jpg?resize=300%2C200&#038;ssl=1" width="300" height="200" alt="" class="wp-image-4453 aligncenter size-medium" style="float: right;" scale="0" />Patient safety in the healthcare industry has always been a priority. Mainly, that referred to physical safety, but with the changing landscape of technology, information security needs to also become a priority. Healthcare is repeatedly a prime target for cyber criminals looking for quick access to valuable data.</p>
<p>A recent article from HealthIT News claims that CEOs need to make information security (infosec) their number 2 priority. Why not number one?  James Doulgeris, CEO of Osler Health believes &#8220;that responsibility belongs to the CIO or CTO. It should be their number 2 or number 1. The only time something like that hits a CEO’s top five is if the person responsible is not doing their job.&#8221; This culture is what needs to change in healthcare, because by the time it reaches the top, it’s too late. The breach has occurred, you have let down thousands of patients and you’re losing money.</p>
<p>Fear of a breach, and the potential consequences, will not be the driving force toward change. CEOs need to see this as a business move to shift the prioritizing of funds. Not enough of a hospital’s budget is dedicated toward security and that is a CEO issue. Infosec needs are constantly changing, so investing funds cannot be one and done. Structures, processes and procedures have to be in place and continuously monitored to create a secure environment.</p>
<p>&#8220;Security is important enough to be above everything else,&#8221; said David Chou, a veteran hospital executive who is currently VP and principal analyst at Constellation Research. But he knows the reality of that takes a culture change that must come from the top. &#8220;[It] means turning the culture upside down and thinking about security as aggressively as many hospitals focus on hand washing. That same effort has to be there for every employee.&#8221;</p>
<p>Richard Staynings, Chief Security Strategist with Security Associates and an HIMSS Cybersecurity Committee member, agreed that patient safety must be a top priority for CEOs. &#8220;<strong>Cybersecurity is, like it or not, a primary component of patient safety now.</strong>&#8221; Patient confidentiality goes out the window when a breach occurs, and everything can become public knowledge. This is the battle hospitals, clinics and every doctors’ office now face.</p>
<p>CEOs also need to recognize that investing in security now actually helps with innovation growth . Just as innovation growth is a multi-step process that will happen over time, so is infosec, and they need to be viewed as a combined entity. If you are designing a plan to increase technology within a hospital, then best practices would have you increase your security at the same time. CEOs need to see these as mutually inclusive instead of exclusive.</p>
<p>As many can attest, culture comes from the top. What a CEO sees as a priority, so will others in the company. That change needs to start with seeing that patient safety now includes information security.</p>
<p>Protect your data. Protect your practice. Protect your patients.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/06/06/infosec-in-healthcare-a-new-priority-for-patient-safety/">Infosec in Healthcare: a new priority for patient safety</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7556</post-id>	</item>
		<item>
		<title>GDPR &#8211; the &#8220;Undo&#8221; Button for Personal Data?</title>
		<link>https://thirdrock.com/blog/2018/05/15/gdpr-the-undo-button-for-personal-data/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 15 May 2018 13:15:34 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR deadline]]></category>
		<category><![CDATA[GDPR risk assessment]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Protect yourself]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5594</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/05/15/gdpr-the-undo-button-for-personal-data/">GDPR &#8211; the &#8220;Undo&#8221; Button for Personal Data?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5522 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=300%2C214&#038;ssl=1" alt="GDPR deadline 25 May 2018 | &quot;undo&quot; button" width="300" height="214" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=300%2C214&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=768%2C549&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=1024%2C731&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" /><strong>The European Union’s General Data Protection Regulation (GDPR) goes into effect May 25<sup>th</sup>, about two weeks from now. </strong> In the news it is often being called &#8220;overreaching&#8221; and &#8220;impractical,&#8221; but its objective is to<em> place control of personal data back in the hands of the EU citizens.</em>  Maybe I’m “old school” (aka dinosaur), but I believe in privacy and the ability to protect my data.  Why? Look at these recent events.</p>
<p><strong>Let’s start with the Facebook breach of 85 million users.</strong>  Most people joined Facebook to maintain relationships with family and friends.  It’s free and convenient.  But that old saying, “There is no such thing as a free lunch” is really true. <em>Facebook is “free” because they are collecting and selling your data: your likes, dislikes, preferences, habits, and on and on.</em>  No one who joined FB ever thought their data would be illegally used to alter a presidential election.  Or that foreign nations would use the platform to influence our election process using fake news.</p>
<p><strong>A few weeks ago, the news reported that the major DNA testing services such as AncestryDNA and 23AndMe are all collecting their customer’s DNA information and creating massive databases.</strong>  People haven’t paid attention to &#8211; or chose to ignore &#8211; the privacy agreement included in the kit.  And yes, <em>they do state that they can keep and use your data</em>.  What are their plans for the data and these databases? Time will tell.  But if they choose to use your data improperly, the chances of you finding out about it are slim.</p>
<p><strong>Probably the highest profile news item this past month is the possible capture of the Golden State Killer, the most prolific unsolved crime spree in U.S. history.</strong>  Why is this included in this blog?  GEDmatch, a very small genetics matching service was key to cracking this case.  People can upload their DNA analysis results into GEDmatch to locate possible relatives.  The police uploaded the DNA information of the Golden State Killer into GEDmatch and searched for possible relatives.  The police traced family trees back to people who lived in the 1800s and reviewed genetic data of several thousand people to arrive at the suspect.  Think about that!  <em>If the police can do that, anyone can, including cyber criminals.</em>  The value and impact of your genetic “fingerprint” has yet to be determined, but I’m confident it will increase over time.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5608 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Undo-button-on-keyboard.jpg?resize=300%2C225&#038;ssl=1" alt="&quot;Undo&quot; button on keyboard " width="300" height="225" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Undo-button-on-keyboard.jpg?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Undo-button-on-keyboard.jpg?resize=768%2C576&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Undo-button-on-keyboard.jpg?resize=1024%2C768&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Undo-button-on-keyboard.jpg?w=2160&amp;ssl=1 2160w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p><strong>Ten years ago, I could not have imagined how hard I work now to protect my personal information.</strong>  I have no doubt in the future I will have to work even harder to protect personal data including my genetic information.  Many companies are building extensive databases on all of us through our day to day activities, such as Facebook and Equifax.  Should I have the right to understand the data being collected about me and how it will be used?  Should I have the right to have my data deleted by a company I choose not to support?  I say yes!  And that is what the European Union General Data Protection Regulations (GDPR) strives to deliver.  By today’s technology standards, GDPR seems far reaching and overbearing because some requirements may not be practical to implement.  Over time however, technology will evolve to solve these limitations.  Facebook has publicly stated it will be GDPR compliant.  As a result of the breach, I requested my Facebook account be deleted and discovered<em> it could take two weeks to delete my account! </em> That means the deletion is not automatic &#8211; people are involved, and it&#8217;s possible that all data won’t be deleted.  <strong>Yes, I think we need a personal data “undo” button!</strong></p>
<p>If your organization is concerned about GDPR and how it can affect your business, don’t hesitate to contact us at: <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a>.  We&#8217;ve recently added GDPR readiness assessments to our CyberCompass™ software.  Third Rock&#8217;s CyberCompass™ software automates and simplifies cyber risk management for companies of all types and sizes.</p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3>
<p style="text-align: center;"></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/05/15/gdpr-the-undo-button-for-personal-data/">GDPR &#8211; the &#8220;Undo&#8221; Button for Personal Data?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5594</post-id>	</item>
		<item>
		<title>Is Your Security Risk Assessment (SRA) Valid?</title>
		<link>https://thirdrock.com/blog/2018/04/06/is-your-security-risk-assessment-sra-valid/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 06 Apr 2018 14:30:31 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[breach notification plan]]></category>
		<category><![CDATA[disaster recovery plan]]></category>
		<category><![CDATA[emergency response plan]]></category>
		<category><![CDATA[gap analysis]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[prioritized risk management plan]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[SRA report]]></category>
		<category><![CDATA[workforce training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5370</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/04/06/is-your-security-risk-assessment-sra-valid/">Is Your Security Risk Assessment (SRA) Valid?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-5057 size-medium" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/gold-risk-assessment-compass-on-white.jpg?resize=300%2C169&#038;ssl=1" alt="" width="300" height="169" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/gold-risk-assessment-compass-on-white.jpg?resize=300%2C169&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/gold-risk-assessment-compass-on-white.jpg?w=356&amp;ssl=1 356w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>We&#8217;re often told, &#8220;I&#8217;ve done a security risk assessment,&#8221; or &#8220;We had one of those done by a company.&#8221;  When we ask if they have 1) an SRA report, 2) a risk management plan with prioritized corrective actions, 3) a disaster recovery plan, 4) an emergency response plan, 5) a breach notification plan, 6) current training and in use, 7) current policies and procedures; we get blank stares.  We&#8217;ve also performed SRAs after some of the large, &#8220;known&#8221; compliance consulting firms have performed an SRA.  What we find is that they have done a very poor job of actually creating for you, the client, a clear, easy to use, gap analysis of what you must do to protect your data.</p>
<p>First of all, forget about being compliant, that is NOT the goal.  <em>The goal is to protect your clients&#8217; personal data</em> which in turn will protect your business from suffering a costly breach.  How do you protect your clients&#8217; data, you might ask?  Start with a valid security risk assessment that actually checks that you are doing the correct things to protect the valuable data (PHI, PCI, PII, UCI, personal data, etc.)</p>
<ol style="padding-left: 1em;">
<li style="text-indent: -1em;"><strong>Answer every question honestly.</strong>
<ol>
<li style="text-indent: +1em;">Make sure you meet the current requirements of HIPAA, HITECH, and the omnibus rule.
<ol>
<li style="text-indent: +2em;">Policies and Procedures have to be written or updated after 2013.</li>
<li style="text-indent: +2em;">Business Associate agreement has to be written or updated after 2013.</li>
<li style="text-indent: +2em;">An SRA must be performed annually and after each breach occurs.</li>
</ol>
</li>
</ol>
</li>
<li style="text-indent: -1em;"><strong>Ask for verification from IT or your MSP about the following:</strong>
<ol>
<li style="text-indent: +1em;">Actually perform a computer operating system assessment.  This will help you know whether your computers have been hardened and what to correct on each type of operating system.</li>
<li style="text-indent: +1em;">Proof that the backups can be restored.</li>
<li style="text-indent: +1em;">An inventory listing of every piece of equipment on the network.</li>
<li style="text-indent: +1em;">A data flow diagram of every place sensitive data exists; not just where it is known to exist, search and discovery everywhere it exists.</li>
<li style="text-indent: +1em;">Also note, penetration testing, network inventory, data inventory, network vulnerability testing should all be Standard Operating Procedures, not just part of your assessment.</li>
</ol>
</li>
<li style="text-indent: -1em;"><strong>Take the results of the assessment and create an action item list in prioritized order of risk.</strong></li>
</ol>
<p><strong>Key signs the company is NOT offering you a current, useful or valid Security Risk Assessment</strong></p>
<ol>
<li>It&#8217;s performed on paper.  Seriously, it&#8217;s 2018.  We&#8217;ve had personal computers for over 35 years; we&#8217;ve had the web application over 20 years.</li>
<li>It&#8217;s in a spreadsheet.  A little better, but do they merge all of the questions and provide a prioritized list of corrective actions?  (A risk management plan.)</li>
<li>Do they offer any assistance in remediation or do they leave you with a document that you don&#8217;t know how to use to improve your data security?</li>
</ol>
<p>Think before you spend your valuable money on an assessment that won&#8217;t help you protect your data.</p>
<p>If your organization needs a security risk assessment, compliance management plan, or cyber security plan; or you have concerns about your cyber security and would like to improve your cyber confidence and compliance, please contact us at:  <a href="mailto:info@thirdrock.com">info@thirdrock.com</a></p>
<h3 style="text-align: center;"><strong></strong></h3>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/04/06/is-your-security-risk-assessment-sra-valid/">Is Your Security Risk Assessment (SRA) Valid?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5370</post-id>	</item>
		<item>
		<title>Are you Cyber Confident?</title>
		<link>https://thirdrock.com/blog/2018/03/27/are-you-cyber-confident/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Tue, 27 Mar 2018 14:00:01 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[building cyber confidence]]></category>
		<category><![CDATA[business data]]></category>
		<category><![CDATA[CIO]]></category>
		<category><![CDATA[Compliance Office]]></category>
		<category><![CDATA[culture change]]></category>
		<category><![CDATA[cyber threat response]]></category>
		<category><![CDATA[healthcare practice managers]]></category>
		<category><![CDATA[information security policies & procedures]]></category>
		<category><![CDATA[IT department]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[risk management process]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[staff education and monitoring]]></category>
		<category><![CDATA[workforce training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5267</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/03/27/are-you-cyber-confident/">Are you Cyber Confident?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5306" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/02J81382.jpg?resize=133%2C200&#038;ssl=1" alt="fear, lack of confidence, scared," width="133" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/02J81382.jpg?resize=200%2C300&amp;ssl=1 200w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02J81382.jpg?resize=768%2C1152&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02J81382.jpg?resize=683%2C1024&amp;ssl=1 683w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02J81382.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02J81382.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 133px) 100vw, 133px" />In our conversations with healthcare practice managers and CIOs &#8211; whether at small-to-medium practices, dental offices, outpatient facilities, or hospitals &#8211; we&#8217;ve found that few leaders feel confident in their organization&#8217;s ability to protect against and respond to cyber threats. Managers of smaller organizations have told us &#8220;It&#8217;s like a monster out there just waiting to get us, and there&#8217;s nothing we can do about it.&#8221;</p>
<p>Even CIOs at larger organizations who feel confident about having the right technologies and procedures in place admit that they have little interaction with the Compliance Office that manages staff education and little control over mobile devices. The result &#8211; they feel exposed, just waiting to see/hear where a breach has occurred.</p>
<p>As a general rule, frightening already frightened people does not promote the kind of thoughtful, proactive behavior required for a sustainable approach to cybersecurity. To get that kind of behavior, organizational leaders and their staff need to feel <em>cyber confident</em> &#8211; not just that the IT department is doing its job, but that they themselves feel knowledgeable about the threats they are facing and how to defend against them. So what can leaders do to increase their own cyber confidence and promote a culture of cyber confidence within their organizations?</p>
<ol>
<li><strong><span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;">Complete a Security Risk Assessment </span></strong><span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;">&#8211; Trying to secure your organization without a thorough assessment of its particular vulnerabilities is like trying to diagnose a patient&#8217;s illness based on the survey results of &#8220;the most common illnesses for men age 35-50.&#8221; Organizations face many of the same threats, but the <em>vulnerabilities </em>vary significantly from one organization to the next. The formal Security Risk Assessment is typically a coordinated assessment of all departments in an organization at the same time. </span></li>
<li><span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;"><strong>Locate &#8211; and document the location &#8211; of all your business data.</strong> Your business data &#8211; customer records, employee records, financial transaction data &#8211; should be inventoried as carefully as any other business assets. To ensure that it is protected, you must first know where it is! Again, this is NOT just a job for IT. Mobile devices, printers and fax machines (yes fax machines are still alive and well), medication dispensing machines, and the computer workstations scattered around every department in your organization are all likely repositories of business data. Note the location, serial number, and data types on each device.</span></li>
<li><span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;"><strong>Train your workforce</strong> &#8211; Cybersecurity is now part of <em>everyone&#8217;s</em> job.<span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;"> Be sure every member of your workforce &#8211; including student interns, volunteers, clerical staff, and managers &#8211; receives cybersecurity training and can demonstrate the correct procedures for safeguarding customer data. See Ed Jones&#8217; post on <a href="https://thirdrock.com/blog/2018/03/01/how-to-grow-cyber-security-awareness-heroes/">How to Grow Cyber Security Awareness Heroes</a> for more detail on this topic. </span></span></li>
<li><span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;"><strong>Implement up-to-date Information Security Policies &amp; Procedures</strong> &#8211; If you purchase templates, be sure to customize them to accurately reflect the data management practices and technologies at your organization. And purchasing them is not enough &#8211; each Policy and Procedure must be implemented. That means making sure every member of the workforce is aware of and understands the policies and procedures that apply to their respective role and that managers or members of the compliance team follow up, observe, and retrain as necessary to ensure they are being followed.</span></li>
<li><span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;"><strong>Implement a Risk Management Process</strong> &#8211; A Risk Management Plan is exactly what it sounds like &#8211; a plan for addressing each of the risks identified in the Security Risk Assessment. It should cover all departments and be reviewed regularly to assess progress on any corrective actions. We recommend reviewing the plan at least monthly. Integrating the review into monthly staff meetings, if you have them, is a good way to build cybersecurity and risk management into your standard operating procedures. </span></li>
</ol>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5305" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_2419_04489.jpg?resize=133%2C200&#038;ssl=1" alt="confident female healthcare doctor" width="133" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_2419_04489.jpg?resize=200%2C300&amp;ssl=1 200w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_2419_04489.jpg?resize=768%2C1152&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_2419_04489.jpg?resize=683%2C1024&amp;ssl=1 683w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_2419_04489.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_2419_04489.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 133px) 100vw, 133px" /></p>
<p><span style="color: black; font-family: Calibri, Helvetica, sans-serif, EmojiFont, 'Apple Color Emoji', 'Segoe UI Emoji', NotoColorEmoji, 'Segoe UI Symbol', 'Android Emoji', EmojiSymbols; font-size: medium;">It&#8217;s true that IT plays a significant role in assessing and securing your organization&#8217;s data stores, but everyone plays a role in keeping your organization&#8217;s business data secure. Taking these steps to secure the data and address the risks under your own control will have the added benefit of increasing your own cyber confidence and building a culture of cyber confidence.</span></p>
<p>If your organization needs a security risk assessment, compliance management plan, or cyber security plan; or you have concerns about your cyber security and would like to improve your cyber confidence and compliance, please contact us at:  <a href="mailto:info@thirdrock.com">info@thirdrock.com</a></p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/03/27/are-you-cyber-confident/">Are you Cyber Confident?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5267</post-id>	</item>
		<item>
		<title>HIMSS 2018 &#8211; Take Aways</title>
		<link>https://thirdrock.com/blog/2018/03/23/himss-2018-take-aways/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 23 Mar 2018 14:06:34 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[AUDIT]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[Business Associate Agreement]]></category>
		<category><![CDATA[communication]]></category>
		<category><![CDATA[contingency planning]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[daily status]]></category>
		<category><![CDATA[data inventory]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[emergency response plan]]></category>
		<category><![CDATA[equipment inventory]]></category>
		<category><![CDATA[gap analysis]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[holistic approach]]></category>
		<category><![CDATA[improper disposal of equipment and media]]></category>
		<category><![CDATA[Insider Threats]]></category>
		<category><![CDATA[NIST CSF]]></category>
		<category><![CDATA[patching of software]]></category>
		<category><![CDATA[policies & procedures]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[risk register]]></category>
		<category><![CDATA[Security Play Books]]></category>
		<category><![CDATA[shadow data]]></category>
		<category><![CDATA[standard operating procedures]]></category>
		<category><![CDATA[Third Party Assessment]]></category>
		<category><![CDATA[transmission security]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5312</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/03/23/himss-2018-take-aways/">HIMSS 2018 &#8211; Take Aways</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-3604" style="margin-top: 8px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Blue-Cyber-Security-key-on-grey-keyboard-1.jpg?resize=250%2C166&#038;ssl=1" alt="" width="250" height="166" scale="0" /></p>
<p>I attended the national HIMSS 2018 conference in Las Vegas a few weeks ago.  43,000+ roaming loose in Vegas, primarily in a few hotels and the Sands Expo Center.  It was mayhem.  I attended the Cyber Security Symposium all day Monday.  Six sessions focused on cyber security and best practices.  I then attended the keynote speech by Eric Schmidt, the CEO of Alphabet, the parent company of Google. Tuesday was primarily more sessions and a few minutes out in the expo &#8220;acres&#8221; wandering around trying to get my bearings and locate a few people and vendors.  Wednesday and Thursday were spent seeking partners that we thought might offer beneficial products and services to our customers.  I&#8217;ll try to summarize each &#8220;section&#8221; of the event I experienced, hopefully offering some insight and benefit to you and your organization.</p>
<h4><strong>Cyber Security Symposium</strong></h4>
<p>First, all of the speakers and presentations were excellent.  HIMSS does a great job finding top notch speakers on relevant topics.</p>
<p>The cyber symposium confirmed our approach here at Third Rock is on track with NIST, GDPR, OCR, and large healthcare CIO/CISOs approach.</p>
<p><strong>High Points / Lessons Learned made throughout the various presentations.</strong></p>
<ol>
<li>It’s about Cyber Risk – Managing it and Correcting Issues</li>
<li>Cybersecurity requires a Holistic Approach – People, Process, Technology (BINGO, I think I&#8217;ve heard someone/company preaching this.)</li>
<li>Perform a Third Party Assessment that includes a cyber security assessment</li>
<li>Backups that will restore and not be corrupted/infected/hijacked.</li>
<li>Data Inventory – Data Flow &#8211; DO IT, NOW!!!</li>
<li>Shadow data is a problem – keep on top of it.  (Data the IT dept doesn&#8217;t really know about.)</li>
<li>Equipment inventory – there are more computers on your network than you think – HONEST</li>
<li>Policies &amp; Procedures are necessary and they need to be USED and operational, law firms don&#8217;t do this well.</li>
<li>Security Play Books – Scripted Scenarios for responding to issues – know what to do before it happens
<ol>
<li style="text-indent: +1em;">Like Disaster Recovery Runbooks, but for Breach Response.</li>
</ol>
</li>
<li>The NIST CSF is the standard – USE it as the basis, reference.  HITRUST CSF complicates it, why bother.
<ol>
<li style="text-indent: +1em;">CSFs are high level guides, you need step-by-step policies and procedures that become standard operating procedures.</li>
</ol>
</li>
<li>COMMUNICATE with Executives, Management, ALL departments.  Do NOT ASSUME they know.  They DON&#8217;T.</li>
<li>Provide daily status, simple color charts</li>
<li>Enable, don’t inhibit.
<ol>
<li style="text-indent: +1em;">Reduce friction.  Implement Policies and Procedures as beneficial Standard Operating Procedures.</li>
</ol>
</li>
<li>Use compliance as a gap analysis (assessment) tool and score card.</li>
<li>AUDIT YOUR Business Associates &#8211; NOW.</li>
<li>Every organization needs a privacy and security leader.</li>
<li><b>If you declare an issue in your risk register (Issues) the OCR will not FINE you.</b>
<ol>
<li style="text-indent: +1em;">Almost ALL OCR settlements cited Risk Assessment as a critical lapse of compliance!</li>
<li style="text-indent: +1em;">Trying to hide you&#8217;re mismanagement and lack of cyber security, which is non-compliance, will COST you in fines.</li>
</ol>
</li>
<li>Risk Management is how to achieve improved cyber security.
<ol>
<li style="text-indent: +1em;">Use Compliance standard (HIPAA, GDPR, NIST 800-171) as the gap analysis and benchmark / scorecard.</li>
</ol>
</li>
</ol>
<h4></h4>
<p><strong>Eric Schmidt included a few interesting points in his typical chairman of the board or CEO inspiring talk about what&#8217;s to come.</strong></p>
<ol>
<li>MOVE to the CLOUD now!  (Whether it&#8217;s google&#8217;s, AWS, or a vendor, do it.)  It will save you time, money and improve performance, security and compliance.</li>
<li>Embrace new technology, it will allow you to catch-up with the other industries and transform healthcare.  Stop using the fax machine, it&#8217;s DEAD.  Harness the power of IT for the benefit of the patient.</li>
<li>It was implied that based on history, innovation will come from outside the Healthcare technology giants. It will take consumer focused technology companies to bring real change to healthcare.</li>
</ol>
<h4></h4>
<h4><strong>What the OCR had to say about HIPAA Compliance Issues and Continued Fines</strong></h4>
<ol>
<li>Lack of Security Risk Analysis</li>
<li>Lack of Business Associates agreement and auditing of BAs.</li>
<li>Lack of Risk Management Plan to Manage Identified Risks, e.g. Encryption
<ol>
<li style="text-indent: +1em;"><strong>If you don&#8217;t have a risk register in prioritized order, your assessment isn&#8217;t worth much.</strong></li>
</ol>
</li>
<li>Lack of Transmission Security</li>
<li>Lack of Appropriate Auditing</li>
<li>Lack of Patching of Software</li>
<li>Insider Threats</li>
<li>Improper Disposal of equipment and media</li>
<li>Insufficient Data Backup (inability to restore)</li>
<li>Lack of Contingency Planning (and emergency response planning)</li>
<li><strong>CMS will start auditing for Disaster Recovering and Emergency Response Plans in May 2018.</strong>
<ol>
<li style="text-indent: +1em;">Make sure you prioritize the systems based on CIA importance in your DR plan.</li>
</ol>
</li>
</ol>
<p>Hope some of this info was helpful.</p>
<p>Sign up for our newsletter to see all of the new services and Trusted Alliance Partners Third Rock will be announcing over the next few months.</p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/03/23/himss-2018-take-aways/">HIMSS 2018 &#8211; Take Aways</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5312</post-id>	</item>
		<item>
		<title>Overcoming Organizational Roadblocks to Cyber Security </title>
		<link>https://thirdrock.com/blog/2018/02/22/overcoming-organizational-roadblocks-to-cyber-security/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Thu, 22 Feb 2018 15:10:56 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA["Ignorance is no excuse."]]></category>
		<category><![CDATA[audit log]]></category>
		<category><![CDATA[breach remediation budget]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HIPAA training courses]]></category>
		<category><![CDATA[medical devices]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5185</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/02/22/overcoming-organizational-roadblocks-to-cyber-security/">Overcoming Organizational Roadblocks to Cyber Security </a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: 12px;">In many organizations, cyber security is perceived as one of those “important-but-not-urgent” issues that keep getting put off in deference to the pressing issues of the day – insurance denials, staffing, readmissions, patient no-shows, supply shortages…the list goes on.  It’s not that organizational leaders are doing nothing. In most organizations, the basic pieces, such as a HIPAA-compliant EHR, firewall, anti-virus software, and staff training, are all in place. It is these very safeguards, though, that can give leaders a false sense of security, making them complacent about day-to-day risk management. For instance, how vigilant are you about each of the following:</span></p>
<ol>
<li>Reviewing the audit log from your EHR system for suspicious activity – and following up?</li>
<li>Reviewing the network activity log and addressing any suspicious patterns?</li>
<li>Ensuring that system and facility access for all departing employees is completed at the time of departure?</li>
<li>Ensuring that all software patches are implemented asap after release?</li>
<li>Regularly reviewing and addressing the issues identified in your Security Risk Assessment (we recommend at least monthly)?</li>
<li>Conducting <em>ongoing</em> security training for all members of the workforce (not just once per year)?</li>
<li>Applying sanctions to members of the workforce – including physicians – who put information security at risk with unsafe practices?</li>
<li>Ensuring the security of new medical devices before deploying them on the network?</li>
<li>Documenting and periodically reviewing all “security incidents”?</li>
<li>Completing a new Security Risk Assessment after a major organizational, facility or IT change?</li>
</ol>
<p>Don’t get me wrong – I know it’s hard to do all of this! It requires time, money, and knowledgeable staff.</p>
<p>Here&#8217;s my take on overcoming these three very common roadblocks to risk management.</p>
<p><strong>Time</strong> – <em>“I don’t have time…My staff doesn’t have time.”</em></p>
<p style="padding-left: 30px;">Ask yourself, “When I am breached, where will I find the time to deal with the fallout?” Spending 1-2 hours per week (e.g., first thing every Fri morning) delegating and following up on the issues above could greatly minimize your risk of a breach, the extent of a breach if one happened, and the OCR fine should a breach or random audit occur.</p>
<p><strong>Money</strong> – <em>“It costs too much…Those costs shouldn’t come out of my budget – that’s IT’s responsibility.”</em></p>
<p style="padding-left: 30px;">Whose budget will pay the breach remediation costs? One medium-sized medical practice (20<sup>+</sup> providers) spent more than $1 million on patient notifications alone after experiencing a breach. Cyber insurance will cover some of the costs, but most organizations are under-insured and find themselves paying legal fees, increased operational costs, and fines while experiencing decreased revenues due to the negative reputational impact. Don’t be penny wise and pound foolish. Find the money to invest in information security <em>before</em> a breach occurs. And if the accounting system is a barrier, lobby your peers and CFO to make “information security” a line item in everyone’s budget.</p>
<p><strong>Knowledge/Skill</strong> – <em>“I don’t know how…My people don’t know how.”</em></p>
<p style="padding-left: 30px;">The OCR adheres to the general legal guideline that “ignorance is no excuse.” Numerous free resources are available on the OCR’s website, and multiple vendors offer relatively low-cost HIPAA training courses for clinical staff and compliance officers. There are also service providers that can provide monthly or quarterly cyber security support services if your own IT staff lack that expertise. Teach yourself, go to training, or find someone knowledgeable to help you. Don’t let ignorance keep you from protecting some of your organization’s most valuable assets – your patients’ information and your professional reputation.</p>
<p>Contact us today – 512.310.0020 or <a href="mailto:info@thirdrock.com">info@thirdrock.com</a> for more information on completing a security risk assessment, developing a risk management program, or becoming a Partner to make these or related services available to your clients.</p>
<h3 style="text-align: center;"><strong>Protect your Patients. Protect your Organization. Protect Yourself!</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/02/22/overcoming-organizational-roadblocks-to-cyber-security/">Overcoming Organizational Roadblocks to Cyber Security </a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5185</post-id>	</item>
		<item>
		<title>Cybersecurity and The Endless List of Compliance</title>
		<link>https://thirdrock.com/blog/2018/01/30/cybersecurity-and-the-endless-list-of-compliance/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 30 Jan 2018 15:00:45 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[compliance standards]]></category>
		<category><![CDATA[culture of resilience]]></category>
		<category><![CDATA[cyber security training]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[human error]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Risk Management Plan]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[standard operating procedures]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5005</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/30/cybersecurity-and-the-endless-list-of-compliance/">Cybersecurity and The Endless List of Compliance</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><a href="https://thirdrock.com/blog/2018/01/30/cybersecurity-and-the-endless-list-of-compliance/compliance-agreement-indicates-obedience-comply-and-consent/"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4974" style="margin-top: 5px; margin-right: 12px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Compliance-on-gold-background.jpg?resize=220%2C165&#038;ssl=1" alt="Cybersecurity and the endless list of compliance" width="220" height="165" /></a></p>
<p>I recently wrote about insurance companies raising the bar on business to protect their valuable data to acquire cyber liability insurance.  But, it&#8217;s not just insurance companies that are raising the bar. Governments around the globe are now requiring all types of companies to be compliant with some type of standard to better protect the data they possess.  What many people don&#8217;t realize is these standards are all based on the protection of personal/private/confidential/sensitive/valuable information or data<em>. </em> Whether it&#8217;s HIPAA, NIST 171, GDPR, FISMA, ISO-27001 or another cyber security standard, <em>the goal is to protect the customer or client&#8217;s data as a requirement of doing business</em>.  The governments want businesses to make it more difficult for cyber criminals to steal valuable data.  If you look at the core of these various compliance standards you&#8217;ll find they all begin by requiring a risk assessment and then move towards a more holistic approach to cyber risk management.</p>
<h4>What does holistic approach mean?</h4>
<p>When you talk about cybersecurity most people think of software or hardware solutions to protect the systems or data by preventing bad actors from damaging or accessing data.  For example, everyone needs to be running the latest anti-virus with automatic updates turned on.  But the truth is, <em>human error is the cause of over 65% of breaches</em>.  Which means we need to include cybersecurity training as part of our solution.  Since all employees are not the CIO&#8217;s responsibility, we now have all department heads involved.  Therefore, we need to start with leadership.  The company leadership needs to make cybersecurity a priority.</p>
<h4>What&#8217;s the value of your data?</h4>
<p>One of the first steps in a cybersecurity program or plan is to identify all valuable data and where it is stored and transmitted.  Many overlook the first part of this, identifying the valuable data.  For example, if you ask most healthcare providers &#8220;Which is more valuable on the darkweb, a credit card or a patient record?&#8221;, they will respond that the credit card is more valuable.  The fact is <em>the patient record (PHI) is worth 50 times the credit card</em>.  This means healthcare providers with PHI are 50 times more valuable to cyber criminals.  The next part of this is to identify where the PHI resides.  Again, many healthcare providers think that because they use a HIPAA approved EMR (patient management system) they are protected.  But, most have billing personnel that export 100% of the data to a local workstation, then save it in the download folder on the desktop, or on a shared network drive unencrypted.  The PHI is usually saved unencrypted in the browser cache too.  It&#8217;s just waiting to be stolen or locked by the criminals.</p>
<h4>Why start with an assessment?</h4>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5057" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/gold-risk-assessment-compass-on-white.jpg?resize=201%2C113&#038;ssl=1" alt="A risk assessment provides you with a list of issues that need to be addressed." width="201" height="113" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/gold-risk-assessment-compass-on-white.jpg?resize=300%2C169&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/gold-risk-assessment-compass-on-white.jpg?w=356&amp;ssl=1 356w" sizes="(max-width: 201px) 100vw, 201px" /></p>
<p>Most business owners or managers of smaller companies don&#8217;t understand the value of a full Security Risk Analysis or Risk Assessment which is required by most of these compliance standards.  <em>A risk assessment provides you with a list of issues that need to be addressed.</em>  By prioritizing this list you create a risk management plan to address the issues and improve the protection of your valuable data.  As you work through and correct issues you change the culture of your work environment to be more aware of protecting the data and creating a culture of resilience.  Over time the policies and procedures become Standard Operating Procedures for your business.  You simply operate more securely, greatly reducing your likelihood of a breach.</p>
<h4>What&#8217;s the goal?</h4>
<p>So, what&#8217;s the goal of all these different compliance standards?  Why does the government care?  Why are the governments sticking their noses in company business?  It&#8217;s actually to protect the business!  Protecting the individual&#8217;s personal information helps to protect a company&#8217;s reputation and maintain the trust of its customers, ultimately keeping the company in business and profitable.</p>
<p style="text-align: center;">Are you ready to begin protecting your valuable data and creating your own culture of resilience?</p>
<p style="text-align: center;">Contact us for a third-party Security Risk Assessment: 512.310.0020 or <a href="mailto:info@thirdrock.com">info@thirdrock.com</a>.</p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/01/30/cybersecurity-and-the-endless-list-of-compliance/">Cybersecurity and The Endless List of Compliance</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5005</post-id>	</item>
		<item>
		<title>Internet of Medical Things:  Real Security Threat or Hype?</title>
		<link>https://thirdrock.com/blog/2018/01/19/internet-of-medical-things-real-security-threat-or-hype/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Fri, 19 Jan 2018 15:15:11 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Technology]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[connected devices]]></category>
		<category><![CDATA[FDA]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Manufacturer Disclosure Statement for Medical Device Security]]></category>
		<category><![CDATA[medical devices]]></category>
		<category><![CDATA[Quality System Regulations]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5075</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/19/internet-of-medical-things-real-security-threat-or-hype/">Internet of Medical Things:  Real Security Threat or Hype?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-3047 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/mHealth-technolgy-sytstem-300x138.jpg?resize=300%2C138&#038;ssl=1" alt="" width="300" height="138" /></p>
<p>For decades, healthcare medical devices functioned as freestanding tools. Glucometers, lasers, infusion pumps, pressure monitors, neonatal incubators, heart monitors – each serving its unique function independently of the others. With the widespread implementation of electronic health records (EHRs), however, and the push for increased digitization of health information, these devices have increasingly been networked into the patient information ecosystem.  They now transmit PHI between a myriad of systems including the EHR system, bed management, supply chain management, and billing systems.</p>
<p>The variety and use of these devices have proliferated. The <a href="http://www.himss.org/medical-device-security">HIMSS Medical Device Security Workgroup</a> reports that hospitals and similar healthcare delivery organizations typically have “300% to 400% more medical equipment than IT devices.” In a study of US hospitals cited in <a href="https://www.wired.com/2017/03/medical-devices-next-security-nightmare/">Wired Magazine (3/02/17)</a>, <a href="https://www.zingbox.com/press-releases/survey-reveals-healthcare-it-decision-makers-approach-to-iot-security/">ZingBox reported</a> an average of 10-15 connected devices per bed. That translates into approximately 4500 connected medical devices for the average 300-bed community hospital &#8211; and up to 75,000 devices for a large metro medical center with 5,000 beds!</p>
<p><strong>Are devices vulnerable to hacking?</strong></p>
<p>To date, the number of medical device breaches and the number of patient records exposed by those breaches has been seemingly negligible when compared to the large-scale data losses due to hacks of healthcare organizations’ primary IT systems or losses of unencrypted mobile devices. But there have been hacks, and there are several reasons to expect medical devices to be increasingly exploited:</p>
<ul>
<li>As more medical device developers rely on off-the-shelf operating systems to speed development and/or facilitate integration with other systems, the vulnerabilities of the parent code are transferred to the devices, increasing their vulnerability.</li>
<li>The increased networking of devices makes them a more attractive target for hackers because they provide additional points of entry to other systems.</li>
<li>A Trend Micro study found a large number of devices to be discoverable on Shodan, a search engine routine for connected devices.</li>
</ul>
<p>In fact, <a href="https://www.darkreading.com/threat-intelligence/medical-devices-fall-short-in-security-best-practices/d/d-id/1328964">a study by Ponemon Institute</a> found that 67% of medical device makers <em>expect</em> an attack on their devices in the next 12 months!</p>
<p><strong>Didn’t the FDA pass regulations to fix this?</strong></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4973 " style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Red-notebook-of-Regulations.jpg?resize=248%2C186&#038;ssl=1" alt="" width="248" height="186" scale="0" /></p>
<p>Yes – and no, depending on who you ask. The FDA is quoted in many news articles saying that medical device manufacturers are responsible for complying with “quality system regulations” (QSRs), which include requirements for addressing cybersecurity risks, but both law firms and industry executives say the compliance environment remains murky:</p>
<ul>
<li>Some devices have been downgraded from “Class III” – high risk and mandatory compliance – to “Class I” – low risk and “unregulated,” though they still could pose a cybersecurity risk.</li>
<li>Once a device is in use, it’s not clear whether the device manufacturer or the healthcare delivery organization is responsible for continued patching as cyber threats evolve.</li>
<li>The FDA doesn’t actually test medical devices for their compliance with the QSRs.</li>
<li>Reporting of device malfunctions, including cybersecurity breaches, to the FDA is voluntary.</li>
</ul>
<p><strong>Know-how and budget are also factors.</strong></p>
<p>Because cybersecurity of devices is still a relatively new concern in the medical device and healthcare delivery industries, lack of knowledge regarding both the threat and the appropriate risk management responses remains a problem. The <a href="https://www.zingbox.com/press-releases/survey-reveals-healthcare-it-decision-makers-approach-to-iot-security/">ZingBox study</a> also found that 70% of healthcare IT decision-makers believe that the same security solutions used for laptops and servers are sufficient for all their connected medical devices, a misconception that the report goes on to explain.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5082 " style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/spreadsheet-financials-300x200.jpg?resize=242%2C161&#038;ssl=1" alt="" width="242" height="161" /></p>
<p>Despite two-thirds of medical device manufacturers anticipating an attack on their devices, only 15% of study respondents anticipate taking measures to mitigate the risk! Senior executives in the field say it usually comes down to budget and production deadlines. Because cybersecurity protections don’t improve device performance in terms of clinical care, it is often looked upon as a cost. Similarly, when cybersecurity flaws are discovered too far into the development process, decision makers often determine that the rework required to build in the cybersecurity protections is too costly. So devices go to market with <em>known</em> cybersecurity flaws.</p>
<p><strong>So what to do?</strong></p>
<p>As a healthcare delivery organization, you are the gatekeeper between the medical device vendors and patients. Regardless of who is technically at fault for a medical device breach, if a breach were to occur, it would be your patients’ information lost and your reputation damaged!  Thus it is up to you and your organization to set the standard for medical devices coming into your organization and to include medical devices in your annual security risk assessment.</p>
<p>Start by requesting information from your device vendors about each of the device types on your network using the <a href="http://www.himss.org/resourcelibrary/MDS2">Manufacturer Disclosure Statement for Medical Device Security ((MDS)<sup>2</sup>)</a> which was collaboratively developed by the National Electrical Manufacturers Association (NEMA) and the Health Information and Management Systems Society (HIMSS).</p>
<p>Finally, if you have questions about assessing the risk of an Internet-connected device or need help completing a comprehensive Security Risk Assessment, contact us at <a href="mailto:info@ThirdRock.com">info@ThirdRock.com</a> or 512.310.0020.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/01/19/internet-of-medical-things-real-security-threat-or-hype/">Internet of Medical Things:  Real Security Threat or Hype?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5075</post-id>	</item>
		<item>
		<title>With the New Year, New Regulations!</title>
		<link>https://thirdrock.com/blog/2018/01/17/with-the-new-year-new-regulations/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Wed, 17 Jan 2018 15:00:28 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[cyber breach protection]]></category>
		<category><![CDATA[DFARS]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[new Data Security law]]></category>
		<category><![CDATA[new regulations]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4959</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/17/with-the-new-year-new-regulations/">With the New Year, New Regulations!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4971 size-full" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/wild-woolly.jpg?resize=184%2C200&#038;ssl=1" alt="" width="184" height="200" /></p>
<p>With each New Year, we always look back and review the significant events of the previous year.  By all accounts, 2017 was a wild and woolly year!  World and national politics, the stock market, terrorism and acts of mass violence, devastating hurricanes, and forest fires! The digital world saw big changes as well with the repeal of net-neutrality and some major cyber breaches.   The Equifax breach effectively impacted half the population of the United States. Uber affected another 57 million people.  Yahoo announced that <em>3 billion</em> accounts had been impacted by breaches of their systems.</p>
<p>So, what will 2018 bring?  I’ll wager a few dollars that we’ll see some spectacular breaches this year.  However, I’m willing to guarantee that we’ll see more government regulations to address cybercrime.  Not as a result of Equifax, Uber or any 2017 breach, but by regulations that have already been made into laws and will take effect in 2018.  In fact, it has already happened.  If you are a Department of Defense contractor, and your company has access to Confidential Unclassified Information (CUI), which covers about everything they do, you are subject to new Defense Federal Acquisition Regulations Supplement (DFARS) per NIST SP 800-171 effective January 1<sup>st</sup>.  What all that means is if your company does business with the military, you are subject to a set of rules very similar to HIPAA that are designed to protect data important to our Nation’s defense.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4972 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Thick-book-of-regulations-2-300x169.jpg?resize=300%2C169&#038;ssl=1" alt="" width="300" height="169" /></p>
<p>Not far behind is GDPR.  Although not well known in the US, it will have major impact on our businesses.  GDPR is the European Union’s General Data Protection Regulation which goes into effect May 25<sup>th</sup> this year.  Most companies doing business in Europe are subject to this law and it has far reaching implications.  The focus of the law is the EU citizen’s rights to protection of their personal data.  A person in the EU can make significant demands on a US based business with respect to their data.  Any company selling products and services in the EU is affected.</p>
<p>Lastly, the finance and insurance industry are implementing a new Data Security law which is based on NIST standards and is also very similar to HIPAA.  It is designed to protect our personal data as well.  New York state has adopted the law and other states are following suit.  It is expected to be adopted nationwide this year.</p>
<p>This trend of increased regulations to protect our personal data will continue as companies race to collect more data on <em>each</em> of us.  Google, Amazon, Microsoft, Facebook all collect data about us to generate more revenue.  All have suffered significant breaches in 2017.  I never authorized Equifax to collect my most valuable data and yet I am affected by their incompetence and lack of regard for the welfare of the people whose data they collect.  In 2018, I think we need all the help we can get to protect our data!</p>
<p>If your company collects, processes or stores people&#8217;s sensitive data you&#8217;ll probably be affected by new regulations that require you to protect that data from loss or theft.  The first step to protecting data is to perform the appropriate security assessment in accordance with the compliance standard for that data.</p>
<p style="text-align: center;">Do you need help implementing and understanding these new regulations?</p>
<p style="text-align: center;">Email us at <a href="mailto:info@thirdrock.com?subject=National%20Health%20IT%20Week" target="_blank" rel="noopener noreferrer">info@thirdrock.com</a> or give us a call at 512.310.0020.  We&#8217;d be more than happy to help!</p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/01/17/with-the-new-year-new-regulations/">With the New Year, New Regulations!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4959</post-id>	</item>
		<item>
		<title>MACRA Deadline Approaching &#8211; Schedule your SRA today!</title>
		<link>https://thirdrock.com/blog/2017/11/30/macra-deadline-approaching-schedule-your-sra-today/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Thu, 30 Nov 2017 15:00:23 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[MACRA]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[SRA]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4833</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/11/30/macra-deadline-approaching-schedule-your-sra-today/">MACRA Deadline Approaching &#8211; Schedule your SRA today!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h4>MACRA Deadline Approaching &#8211; Schedule your SRA today!</h4>
<p>In an effort to help medical practices maximize their Medicare reimbursements by meeting MACRA requirements, Third Rock is offering a 20% discount for our Security Risk Assessment package if you schedule your SRA with Third Rock by December 8th.</p>
<p>Our tool,&nbsp;<a href="https://www.compassdb.io/" target="_blank" rel="noopener noreferrer">CompassDB</a>, makes doing an SRA fast and easy.</p>
<p>Our package offer includes:</p>
<p>✓ Security Risk Assessment and detailed report<br />
✓ A Security Risk Management consultant available onsite or online<br />
✓ Custom Policies and Procedures<br />
✓ Prioritized Corrective Action Plan<br />
✓ On-demand training for Staff and Compliance Officers<br />
✓ One year access to our online compliance management tool<br />
✓ Remote customer service for one year</p>
<p>Contact Julie Rennecker at 512-310-0020&nbsp; x113 today to&nbsp;schedule your SRA.</p>
<p>Questions?&nbsp; Email&nbsp;<a href="mailto:julie.rennecker@thirdrock.com" target="_blank" rel="noopener noreferrer">Julie.Rennecker@thirdrock.com</a></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/11/30/macra-deadline-approaching-schedule-your-sra-today/">MACRA Deadline Approaching &#8211; Schedule your SRA today!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4833</post-id>	</item>
	</channel>
</rss>
