<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Cyber Security Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/cyber-security/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Thu, 18 Jun 2020 16:10:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Cyber Security Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/cyber-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>A Resurgence in Pretexting scams</title>
		<link>https://thirdrock.com/blog/2020/05/15/a-resurgence-in-pretexting-scams/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 15 May 2020 12:35:26 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9089</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/05/15/a-resurgence-in-pretexting-scams/">A Resurgence in Pretexting scams</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0 et_pb_gutters2">
				<div class="et_pb_column et_pb_column_3_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Cybercriminals continuously modify to match the “market”: namely you, their targets. Scams cycle in popularity based on their effectiveness with current trends. With “new” remote workforce, we are experiencing a resurgence in pretexting. The lack of personal interaction is making it easier for cybercriminals to impersonate coworkers and company representatives in order to steal your money and your private information.</p>
<h3>What is it?</h3>
<p>Pretext means false motive.  Pretexting is defined as the practice of presenting oneself as someone else in order to gain private information. A scammer attempts to build a connection in one of two ways: impersonate someone you know, such as a coworker, or fabricate an identity of a worker from a trusted company. No matter the means, their end goal is to steal your private information. Unlike a hacker who goes in the back door to steal without you knowing, a good pretext scam has you willingly give them what they want.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_with_border et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;"><em>A cybercriminal contacts HR impersonating a worker. They inform HR that their bank account information has changed and they need to update the information for their direct deposit. Without proper verification, HR begins sending paychecks to a criminal.</em></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1 et_pb_gutters2">
				<div class="et_pb_column et_pb_column_1_3 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_with_border et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;"><em>An IT representative calls you saying there have been small breaches on company computers. He needs to remotely access your computer to ensure all cybersecurity protocols are in place on your company device. Since everyone is working remotely, he can’t have you bring your device in, which is normal procedure, so this is the next best option. You give him your IP address and he has access to control your computer. You see random windows beginning to pop up and realize too late he is stealing your information.</em></p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_3 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>How does this scam work?</h3>
<p>A successful pretexting scam is built on trust. The scammer represents themselves in a legitimate way, gains your trust and then asks for the information they are looking for. Believing you are talking to a real representative, you give over your information willingly. The scammer takes their time researching the target (you) which allows them to build a persona that will have the most chance of success. Some tools of successful pretexting include:</p>
<ul>
<li>Connecting with target over similar interests</li>
<li>Keep the scam simple – no complicated reasons or requests</li>
<li>Create a trusted character</li>
<li>Ask for target’s information under the guise of verification</li>
<li>Uses logical conclusions or follow through for the target</li>
</ul>
<p><a href="https://www.wrcbtv.com/story/42016879/cyber-security-expert-explains-potential-danger-of-viral-facebook-challenge"></a></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_2 et_pb_gutters2">
				<div class="et_pb_column et_pb_column_2_3 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>How is it being used?</h3>
<p>The scam is built on luring you into trusting through impersonation. Cybercriminals use just enough information to make you think they are legitimate so you willingly provide them information. The recent Facebook challenge is a great example. In support of high school seniors who are not getting a normal graduation, people were challenged to post their own graduation pictures. The Better Business Bureau warned this was an opportunity for cyber criminals to find personal information about your high school, age, and school mascot to be used against you.  Read more <a href="https://www.wrcbtv.com/story/42016879/cyber-security-expert-explains-potential-danger-of-viral-facebook-challenge">here</a></p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_with_border et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><em>An employee in the finance department received a request to transfer a large sum of money to a vendor. Thinking it was from a legitimate client, they authorized the transfer without verification. It was later discovered that the request came from a cybercriminal impersonating the client.</em></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Defend yourself and your company:</h3>
<ol>
<li>Limit the personal information you post on social media
<ul>
<li>Remember that these scams involve researching the target. The more information you willingly post, the easier it is for them to create a character that will connect with you</li>
</ul>
</li>
<li>Go to the source
<ul>
<li>If a representative from a company contacts you either in person, on the phone or via email, verify their identity directly with the company. If someone shows up at your house, find the corporate company’s phone number and call from your personal phone. It may seem rude and take longer, but you could be protecting yourself from a scam.</li>
</ul>
</li>
<li>Never give out personal information
<ul>
<li>Real company representatives will never ask you for your password, full account numbers or credit card numbers. General conversations that steer in a direction asking too many personal questions about your family and job should be a red flag. You can decline answering in a polite way while not giving away information.</li>
</ul>
</li>
<li>Protect your organization
<ul>
<li>Do not give out company information, even if the requester appears to be from within the company. Know your company’s procedures for how they communicate when there is an issue, or they need information from you.</li>
</ul>
</li>
</ol></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4 et_pb_gutters2">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: right;">Get a copy of our checklist to share with friends, family and coworkers</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_button_module_wrapper et_pb_button_0_wrapper et_pb_button_alignment_left et_pb_module ">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://thirdrock.com/wp-content/uploads/Cyber-Hygiene-Pretexting-Checklist-2020-Third-Rock.pdf">Download now</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2020/05/15/a-resurgence-in-pretexting-scams/">A Resurgence in Pretexting scams</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9089</post-id>	</item>
		<item>
		<title>Cyber Safety for working at home</title>
		<link>https://thirdrock.com/blog/2020/04/23/cyber-safety-for-working-at-home/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Thu, 23 Apr 2020 18:20:32 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9042</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/04/23/cyber-safety-for-working-at-home/">Cyber Safety for working at home</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Our work environments have been turned upside down. We are all in a place of creating new work routines. Having left the cyber safety net of a central office designed to protect company cybersecurity, IT departments are juggling a dispersed workforce while maintaining cybersecurity standards that protect private data.</p>
<p>Before COVID-19 forced a remote workforce, anywhere from 60 – 90% of breaches were caused by human error. We are seeing cyber criminals take advantage of extra vulnerabilities created with employees working from home. Cybersecurity is no longer just an IT thing. Protecting your company and their private data has never been closer to home, literally. Mistakes that could hurt the company start on your own network, which could also affect your personal security. Your business, IT department and your family are relying on your vigilance to be cyber safe.</p>
<h2></h2>
<h2>Cyber safety habits to put into practice</h2>
<ol>
<li><strong> </strong><strong>Separate work and personal devices<br /> </strong>If your company provides you a device, use it only for work purposes. Have a separate device for family and personal use. If separate devices are not a possibility, create separate profiles with different security settings. Use your work profile only for work purposes. If you have children who need to use the same computer, create separate profiles with parental controls that limit their ability to access and/or download content that could infect your computer.</li>
</ol>
<ol start="2">
<li><strong> </strong><strong>Lockdown your device<br /> </strong>You may feel that your device is physically safe in your home office, but you still need to protect data safety. Set a unique password for your device and lock it every time you walk away. If you are using one device for multiple profiles, have a private, unique password for your work profile that no one in your household can access. This is good practice for after quarantine as well.</li>
</ol>
<ol start="3">
<li><strong> </strong><strong>Be wary of add-ons and downloads<br /> </strong>There are many add-ons and extensions that promise to make your work run faster, smoother and better. Be cautious of downloading these onto your device. Many contain malware that give hackers access to the data on your computer. If you then link to your company network, they could gain access there as well. A good cyber safety practice is to research on trusted sites before downloading a new program or add-on.</li>
</ol>
<ol start="4">
<li><strong> </strong><strong>Use company approved sharing sites<br /> </strong>With your entire team working remotely, there is a greater need to communicate digitally. It may be more comfortable to use data sharing platforms you are used to, they may not be the most secure. Only send private data through company approved sharing sites.</li>
</ol>
<h2></h2>
<h2>Know signs of a breach</h2>
<p>Preventative measures are important to cyber safety, but breaches are still possible. It’s important to know what signs to look for in the event of a breach.</p>
<ol>
<li><strong> </strong><strong>Increase in unwanted pop-ups<br /> </strong>Pop-ups are a widely seen by-product of malware. If advertisements or system pop-ups begin appearing outside of any program, you may have been infected.</li>
</ol>
<ol start="2">
<li><strong> </strong><strong>Processing slows down<br /> </strong>Is it taking longer than usual for your computer to boot up or for programs to load? Viruses and malware run in the background, slowing down the programs you are attempting to run.</li>
</ol>
<ol start="3">
<li><strong> </strong><strong>New programs appear<br /> </strong>Computers do not add content on their own. If a new program, app or internet add-on appears on your computer, you may have a virus that inserted content onto your computer.</li>
</ol>
<h2></h2>
<h2>How do you handle a potential breach?</h2>
<ol>
<li><strong> </strong><strong>Report it!<br /> </strong>Inform your IT department of what you are experiencing. Send screen shots of error messages, pop-ups and other unwanted content. Be specific about when it started happening and what is going on.</li>
</ol>
<ol start="2">
<li><strong> </strong><strong>Don’t click<br /> </strong>Never click on suspicious content, even to try and close pop-up windows. Malware is the gateway for a virus. Clicking on the content can give them access to the data they are looking for.</li>
</ol>
<ol start="3">
<li><strong> </strong><strong>Scan with anti-virus software<br /> </strong>Company devices should be equipped with anti-virus software. If your company does not provide a device, get with your IT department about them providing access to anti-virus software. While it should do scans in the background, if you notice any of the above issues, tell it to run a full system diagnosis.</li>
</ol>
<ol start="4">
<li><strong> </strong><strong>Don’t access private data<br /> </strong>Until your issue has been resolved, do not attempt to access the company network or open any private data. If a hacker is monitoring your computer through malware, you run the risk of giving them access to that information.</li>
</ol>
<p>While human error will never be eliminated, we can all take steps to increase our awareness and cyber safety to lower our risk.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_2_3 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_center et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Want a reference to share with family, friends and coworkers? Download our checklist to make your most secure home office environment.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_button_module_wrapper et_pb_button_1_wrapper  et_pb_module ">
				<a class="et_pb_button et_pb_button_1 et_pb_bg_layout_light" href="https://thirdrock.com/wp-content/uploads/Third-Rock-Home-Office-Cybersecurity-Checklist-2020.pdf" target="_blank">Download your checklist</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2020/04/23/cyber-safety-for-working-at-home/">Cyber Safety for working at home</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9042</post-id>	</item>
		<item>
		<title>Are you Safe?</title>
		<link>https://thirdrock.com/blog/2018/08/17/are-you-safe/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Fri, 17 Aug 2018 15:07:28 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[personal safety]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5811</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/08/17/are-you-safe/">Are you Safe?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" fetchpriority="high" decoding="async" class="aligncenter size-medium wp-image-5813" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?resize=300%2C172&#038;ssl=1" alt="" width="300" height="172" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?resize=300%2C172&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?w=609&amp;ssl=1 609w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>Safety. Such an important word with so many different connotations. We ask safety questions constantly. Is my family safe? Will my house be safe? Is this a safe neighborhood? Are our schools safe? Many technologies are designed to specifically pacify our desire to feel safe.  We can track our child&#8217;s cellphone. We buy alarms for our homes and doorbells with cameras. Schools install cameras and specially locking doors to protect the children.  But one area most people neglect, is cyber safety. Why?  Because it is such an abstract issue.  I check the locks on my doors each night before I go to bed.  I can <em>see and confirm</em> they are locked. None of my physical senses will tell me if my PC is being hacked, until it’s too late and the ransomware notice covers the screen.  As an executive, are you doing what it takes to keep your clients safe? Is their information secure within your care? Do you even know where to start looking? Take this short quiz to see if you are on the right path. We can help you answer &#8220;Yes&#8221; to all of your security questions.</p>
<p style="text-align: center;"><strong>Protect your Patients. Protect your Organization. Protect Yourself.</strong>™</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/08/17/are-you-safe/">Are you Safe?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5811</post-id>	</item>
		<item>
		<title>National Nurses Week 2018 &#8211; Nurses: Inspire. Innovate. Influence</title>
		<link>https://thirdrock.com/blog/2018/05/08/national-nurses-week-2018-nurses-inspire-innovate-influence/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Tue, 08 May 2018 12:00:42 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber hygiene]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber-threats]]></category>
		<category><![CDATA[device hacking]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Third Rock]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5584</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/05/08/national-nurses-week-2018-nurses-inspire-innovate-influence/">National Nurses Week 2018 &#8211; Nurses: Inspire. Innovate. Influence</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_13  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_11  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" decoding="async" class="size-medium wp-image-5585 aligncenter" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ANA_NNW2018_Logo_Color.jpg?resize=300%2C205&#038;ssl=1" alt="" width="300" height="205" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/ANA_NNW2018_Logo_Color.jpg?resize=300%2C205&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ANA_NNW2018_Logo_Color.jpg?resize=768%2C524&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ANA_NNW2018_Logo_Color.jpg?resize=1024%2C698&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ANA_NNW2018_Logo_Color.jpg?w=1571&amp;ssl=1 1571w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>Third Rock would like to take this chance to salute the nation&#8217;s Nurses for their role in patient safety &#8211; clinical safety, physical safety, <em>and cyber safety.&nbsp;</em>It&#8217;s nurses of all types who are on the front lines of protecting patients from cyber threats &#8211; such as identity theft. ransomware, and device hacking &#8211;&nbsp; by practicing good &#8220;cyber hygiene.&#8221;&nbsp; Good job, nurses &#8211; THANKS for all you do to keep all of us cyber safe!</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/05/08/national-nurses-week-2018-nurses-inspire-innovate-influence/">National Nurses Week 2018 &#8211; Nurses: Inspire. Innovate. Influence</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5584</post-id>	</item>
		<item>
		<title>The Right Cyber-Talk</title>
		<link>https://thirdrock.com/blog/2018/03/29/the-right-cyber-talk/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 29 Mar 2018 14:00:36 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[building cyber confidence]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security terms]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[definitions]]></category>
		<category><![CDATA[glossary of cyber security terms]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[ISC2 lexicon]]></category>
		<category><![CDATA[terminology]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5271</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/03/29/the-right-cyber-talk/">The Right Cyber-Talk</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_14  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_12  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5284" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training-on-street-sign.jpg?resize=194%2C145&#038;ssl=1" alt="cyber security training class | this is the right way | right this way" width="194" height="145" /></p>
<p>I recently taught a cyber security class to a large medical practice.  The goals were to better protect the organization from cyber-attacks and to improve their HIPAA compliance.  This medical practice is a well-run and well-managed business that invests in its employees and is clearly one of the most security conscious practices I have worked with.  The hour-long course covered the cyber security basics including password management, safe Internet practices, phishing, malvertising, and incident response.  I wanted to build their cyber confidence such that they quickly knew how to recognize and respond appropriately to a potential cyber threat.</p>
<p>Overall the course went very well; although, I took the class to areas they were not familiar with nor comfortable with.  Discussions at times were lively and lengthy, which was great as they were really engaged.  There was a common thread in our discussions and that was <strong>people are not using the correct terminology concerning cyber security and threats, and this causes confusion and misunderstandings.</strong>  Let’s face it, in today’s world, we are bombarded daily by the news media about hacking incidents and new cyber threats.  It is part of our daily lives and conversations.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-5285" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Definition-in-chalk-on-blackboard.jpg?resize=200%2C133&#038;ssl=1" alt="Definition in white chalk on blackboard " width="200" height="133" /></p>
<p>So, I was really pleased when a colleague, Mike Moran, returned from a cyber security conference and brought our team copies of a new lexicon recently published by (ISC)<sup>2</sup>.  This is by far the best glossary of cyber security terms I have seen.  It was published by John McCumber in February and you can download a copy from his <a href="http://blog.isc2.org/isc2_blog/2018/02/welcome-to-the-lexicon-project.html">blog</a>.  John is the Director of Advocacy for the North American Region of (ISC)<sup>2</sup>.  And who is (ISC)<sup>2</sup>? The International Information System Security Certification Consortium is the largest and best recognized association of cyber security professionals.  Mike is certified by (ISC)<sup>2</sup> and helps our customers improve their cyber security.</p>
<p>I recommend you download a copy of the (ISC)<sup>2</sup> lexicon and review it.  Post it in your office and distribute it to your team.  It sends the message your organization is serious about cyber security and enables everyone to speak more accurately.  It is another step in building your organization’s cyber confidence.</p>
<p>If you have concerns about your cyber security or would like to improve your cyber confidence and compliance, contact us at: info@thirdrock.com</p>
<h3 style="text-align: center;"><strong></strong></h3>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/03/29/the-right-cyber-talk/">The Right Cyber-Talk</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5271</post-id>	</item>
		<item>
		<title>An alternative approach to the cyber security talent shortage</title>
		<link>https://thirdrock.com/blog/2018/03/06/an-alternative-approach-to-the-cyber-security-talent-shortage/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 06 Mar 2018 15:00:16 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[5 steps]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[breach notification plan]]></category>
		<category><![CDATA[contingency plan]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security plan]]></category>
		<category><![CDATA[cyber security training]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybersecurity plan]]></category>
		<category><![CDATA[cybersecurity training]]></category>
		<category><![CDATA[operating system vulnerabiltiy and configuration checking scan]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<category><![CDATA[Top 5 List]]></category>
		<category><![CDATA[valuable data]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5062</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/03/06/an-alternative-approach-to-the-cyber-security-talent-shortage/">An alternative approach to the cyber security talent shortage</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_15  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_13  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><span style="font-size: 12px;">Our CEO would contend there is an alternative approach to the cyber security talent shortage.  Most breaches occur because computer systems are easy to breach and people make mistakes.  Compare the number of breaches based on operating systems.  Linux and UNIX variants are more difficult to breach than Windows, especially if you keep them patched.  Which means we need to focus some time and effort on Windows, shoring up its weak defenses.  The good news is, Windows and Linux can be hardened far more than their standard configurations.  We simply have to take the time to learn what is misconfigured and correct it.</span></p>
<p>Everyone should also take time to implement a simple cyber security plan.  Stop trying to boil the ocean and hire a certified security person you can’t afford.  Learn how to implement the top five most important cyber defenses or if you don’t know what they are or how, contact a reputable cyber security firm and have them create a simple, usable, affordable plan.</p>
<p>What are the first five steps to a good cyber security plan?</p>
<ol>
<li>Make sure the backups are working and you can restore from them.
<ol style="margin-left: 15px;" type="a">
<li>Keep the backups encrypted, offsite (in the cloud), and disconnected from the network.</li>
</ol>
</li>
<li>Perform a thorough cyber security assessment (HIPAA SRA, NIST SP 800-171, etc) and include a configuration and vulnerability scan of each type of operating system (computer).
<ol>
<li style="list-style-type: none;">
<ol style="margin-left: 15px;" type="a">
<li>This is not a lightweight network scan. This is an intense operating system vulnerability and configuration checking scan.  We use one with over 300 tests.  Most Windows systems pass less than 30% of these tests.</li>
</ol>
</li>
</ol>
</li>
<li>Harden all of your operating systems&#8217; and network devices&#8217; configurations based on the scan results from step #2 and ensure automatic patching is turned on where possible.
<ol style="margin-left: 15px;" type="a">
<li>If you have software applications that don&#8217;t allow you to keep your operating systems patched, you need to implement a plan to move off those software applications.</li>
</ol>
</li>
<li>Implement current cyber security training of all employees that touch valuable data.
<ol style="margin-left: 15px;" type="a">
<li>Include identifying phishing campaigns.</li>
</ol>
</li>
<li>Inventory and map your valuable data at rest and in motion.
<ol style="margin-left: 15px;" type="a">
<li>Verify it is secure and encrypted at all times.</li>
<li>Inventory all network devices so you know to check them for data (and yes this could be considered another step.)</li>
</ol>
</li>
</ol>
<p>Obviously, there are other steps to be addressed and performed but these five steps will greatly improve your cyber security stature, confidence, and resilience.</p>
<p>If you purchase a security risk analysis (risk assessment) from a firm, they should include a technical scan of your operating systems as it is the only way to know what needs to be reconfigured on the operating systems.  If you purchase policies and procedures, they should include a risk management plan, a security plan, a contingency plan, and a breach notification plan.</p>
<p>But most of all, realize, cyber risk management and cybersecurity are not just about security.  You need to take a holistic approach, including leadership, employees, processes and technology.</p>
<p>Contact us today – 512.310.0020 or <a href="mailto:info@thirdrock.com">info@thirdrock.com</a> for more information on completing a security risk assessment, developing a risk management program, or becoming a Partner to make these or related services available to your clients.</p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/03/06/an-alternative-approach-to-the-cyber-security-talent-shortage/">An alternative approach to the cyber security talent shortage</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5062</post-id>	</item>
		<item>
		<title>How to Grow Cyber Security Awareness Heroes</title>
		<link>https://thirdrock.com/blog/2018/03/01/how-to-grow-cyber-security-awareness-heroes/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 15:00:18 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[2017 State of Privacy and Security Awareness Report]]></category>
		<category><![CDATA[2017 Verizon Breach Report]]></category>
		<category><![CDATA[awareness campaign]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security awareness heroes]]></category>
		<category><![CDATA[cyber security training]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[cybersecurity training]]></category>
		<category><![CDATA[emerging threats]]></category>
		<category><![CDATA[positive cyber security habits]]></category>
		<category><![CDATA[risky behavior]]></category>
		<category><![CDATA[training classes]]></category>
		<category><![CDATA[training delivery methods]]></category>
		<category><![CDATA[training frequency]]></category>
		<category><![CDATA[workforce training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5201</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/03/01/how-to-grow-cyber-security-awareness-heroes/">How to Grow Cyber Security Awareness Heroes</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_11">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_16  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_14  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-1377" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/cyber_security_200x.jpg?resize=200%2C150&#038;ssl=1" alt="Cyber Security | Cybersecurity | red letters" width="200" height="150" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/cyber_security_200x.jpg?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/cyber_security_200x.jpg?w=533&amp;ssl=1 533w" sizes="(max-width: 200px) 100vw, 200px" />The top threat facing any organization today is the staff member working from a computer!  Not because this person intends to do malicious harm to the organization, but because of lack of cyber security awareness and training.  Confirmation of this is MediaPro’s <a href="https://pages.mediapro.com/2017-State-of-Privacy-Security-Awareness.html#survey">2017 State of Privacy and Security Awareness Report</a> in which they surveyed over 1,000 people and rated their responses to real-world cyber security questions.</p>
<p>Respondents were grouped into 3 “risk profiles” based on their correct answers; Hero (93-100%), Novice (77-92%) and Risks (76% and lower).  In summary, 70% of those surveyed scored at the Novice level.  You might say well, 77% is a solid “C” grade in school and 92% is an “A-“.  Well if you consider one instance of risky behavior, clicking on that link in an email can infect your organization with ransomware, that is pretty frightening!  Consider that 70% of your organization is at the “Novice” level of cyber security awareness! The odds of being breached are relatively good!</p>
<p>The <a href="http://www.verizonenterprise.com/verizon-insights-lab/dbir/2017/">2017 Verizon Breach Report</a> provides some sobering breach statistics;</p>
<ul>
<li style="text-align: left;">62% were the result of hacking</li>
<li style="text-align: left;">81% hacking related breaches involved stolen or weak passwords</li>
<li>66% malware installed via malicious email attachment</li>
<li style="text-align: left;">75% were conducted by outsiders (25% insiders)</li>
<li style="text-align: left;">73% were financially motivated</li>
<li style="text-align: left;">51% involved criminal groups</li>
<li style="text-align: left;">27% discovered by 3<sup>rd</sup> parties</li>
</ul>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5204" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_19064_04857-300x300.jpg?resize=200%2C200&#038;ssl=1" alt="Cyber Security Awareness Heroes" width="200" height="200" /></p>
<p>How do you make your entire staff Cyber Security Awareness Heroes?  Here are some easy steps that will substantially improve cyber security awareness.</p>
<ol>
<li>Make cyber security awareness a priority in your organization. Discuss it in staff meetings and company-wide meetings regularly.</li>
<li>Increase training frequency and delivery methods. Taking the same training class year after year does not improve awareness and clearly tells staff it isn’t a priority.  Require two new and different training classes per year, preferably once a quarter.</li>
<li>Hold an awareness campaign where emerging threats are reviewed and positive cyber security habits are encouraged.</li>
<li>Encourage reporting of security incidents as learning opportunities. Investigate and document security incidents and then review them with the workforce to learn from them.  Revise policies and procedures as needed to address process issues.</li>
<li>If you have access to the data from your IT support organization, publish or post the statistics on the attempts to hack into your network. We all are nice and comfortable behind firewalls and forget how many bad actors are out there.</li>
<li>Conduct email phishing campaigns to improve workforce email awareness, use and habits.</li>
</ol>
<p>Your cyber security training program should continue to evolve to keep pace with the rapidly changing cyber threats.  If you are a smaller organization, a job role should be assigned the responsibility to keep your training current and fresh.</p>
<p>Our dependence on computers and the Internet will only increase, as will the threats wanting to steal our sensitive data or damage our reputations or ability to do business.  It is a small investment to train your workforce to protect your organization.</p>
<p>If your organization needs a security risk assessment, compliance management plan, or cyber security plan, please contact us at:  <a href="mailto:info@thirdrock.com">info@thirdrock.com</a></p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/03/01/how-to-grow-cyber-security-awareness-heroes/">How to Grow Cyber Security Awareness Heroes</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5201</post-id>	</item>
		<item>
		<title>Cyber Security: Is it Really a Matter of Life or Death?</title>
		<link>https://thirdrock.com/blog/2018/02/15/cyber-security-is-it-really-a-matter-of-life-or-death/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Thu, 15 Feb 2018 23:21:12 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[board member fiduciary duties]]></category>
		<category><![CDATA[cyber liability insurance]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[five building blocks of patient information safety]]></category>
		<category><![CDATA[NRHA webinar]]></category>
		<category><![CDATA[RHIA webinar]]></category>
		<category><![CDATA[stolen medical records]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5163</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/02/15/cyber-security-is-it-really-a-matter-of-life-or-death/">Cyber Security: Is it Really a Matter of Life or Death?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_12">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_17  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_15  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h4>A webinar brought to you by the National Rural Health Association and Rural Hospital Insurance of America</h4>
<p>If you are the CEO, CFO or COO of a Rural Hospital then this <a href="https://register.gotowebinar.com/register/4654359552542444291">webinar</a> is for YOU!<br />
But, it is open to all healthcare management.</p>
<p>On <strong>February 21, from 2:00 pm &#8211; 3:00 pm</strong> join the <a href="http://rhiaprogram.com/">Rural Hospital Insurance of America</a> (RHIA) program manager in conversation with two of America&#8217;s leading experts in cyber threat protection, prevention, detection, and response to learn how to stay ahead of the growing and evolving threat cybercrime poses to your patients, your patients&#8217; data, your hospital, and yourself.</p>
<p>Learning objectives include:</p>
<ul>
<li>The common myths that attract cyber risk</li>
<li>Five building blocks of patient information safety</li>
<li>The typical policy pitfalls to avoid while optimizing your primary mechanism for risk transfer, cyber liability insurance</li>
<li>How to overcome the crushing complexity of compliance</li>
<li>How modern risk management transforms the cyber liability into a strategic asset</li>
</ul>
<p>Patient&#8217;s lives are at stake when medical records go missing, are held hostage, or are corrupted by fraudulent use.  And, without adequate preparation and protection, a cyber breach can put your hospital&#8217;s ability to stay in business at risk.  Plus your liability and the liability of your board could be on the line.</p>
<p>How severe is this risk?  Consider what happened in 2017:</p>
<ul>
<li>Over 200,000 data records lost or stolen every hour</li>
<li>Cybercriminals paid only $1 for a stolen credit card but shelled out $50 to $350 for a single ePHI record</li>
<li>33% of all Americans&#8217; medical records stolen by year end</li>
</ul>
<p>With an average of one million new cyber threats released every day and the cost of a data breach to American businesses &#8211; including rural hospitals &#8211; ranging from $800,000 to $3.6 million, this is a life or death matter.</p>
<p>For an up-to-the-minute assessment of the cyber liability environment and the questions you and your board members should be asking to satisfy your fiduciary duties, <a href="https://register.gotowebinar.com/register/4654359552542444291">register now</a>.</p>
<p>Presenters:</p>
<p><a href="https://www.winstead.com/People/Sarah-Churchill-Llamas">Sarah Churchill Llamas</a>, of the law firm Winstead PC</p>
<p>Robert Felps, founder of the compliance and management firm Third Rock</p>
<p><a href="http://healthsure.com/about/the-healthsure-team/brant-couch-cpa-cic-2/">Brant Couch</a>, webinar moderator</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/02/15/cyber-security-is-it-really-a-matter-of-life-or-death/">Cyber Security: Is it Really a Matter of Life or Death?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5163</post-id>	</item>
		<item>
		<title>Shortage of Qualified Cybersecurity Workers: “…the greatest cyber risk of all.”</title>
		<link>https://thirdrock.com/blog/2018/01/17/shortage-of-qualified-cybersecurity-workers-the-greatest-cyber-risk-of-all/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Wed, 17 Jan 2018 20:00:53 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cybersecurity career options]]></category>
		<category><![CDATA[cybersecurity professional]]></category>
		<category><![CDATA[cybersecurity training]]></category>
		<category><![CDATA[cybersecurity worker shortage]]></category>
		<category><![CDATA[occupational outlook]]></category>
		<category><![CDATA[on-the-job training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5020</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/17/shortage-of-qualified-cybersecurity-workers-the-greatest-cyber-risk-of-all/">Shortage of Qualified Cybersecurity Workers: “…the greatest cyber risk of all.”</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_13">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_18  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_16  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3604" style="margin-top: 5px; margin-right: 12px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Blue-Cyber-Security-key-on-grey-keyboard-1.jpg?resize=200%2C133&#038;ssl=1" alt="" width="200" height="133"></p>
<p>The <a href="https://iamcybersafe.org/gisws/">2017 Global Information Security Workforce Study (GISWS)</a> released in February 2017 forecast a shortage of 1.8 million cybersecurity workers by 2020, while a <a href="https://cybersecurityventures.com/jobs/">study by Cybersecurity Ventures</a> estimates “3.5 million unfilled cybersecurity jobs” by 2021. While the projected magnitude of the shortfall varies from one study to the next, government experts, consultants, and pundits alike are unanimous in predicting that the current shortage of qualified cybersecurity workers will only get worse for the foreseeable future, a situation <a href="https://www.csoonline.com/article/3199016/security/cisco-and-ibm-announce-historic-cybersecurity-partnership.html">Steve Morgan</a> has called &#8220;the greatest cyber risk of all.&#8221;</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5036" style="margin-top: 10px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training-Courses-in-white-on-blue-key.jpg?resize=200%2C133&#038;ssl=1" alt="" width="200" height="133"></p>
<p>There is less agreement about why the shortage exists and, therefore, how to fix it. &nbsp;The traditional school of thought is that educational institutions haven’t prepared enough graduates to meet the growing need. The implied solution from this perspective is to increase educational capacity by creating new programs and increasing enrollments in all programs through better marketing and outreach efforts. Outspoken critics of this perspective, however, say that cybersecurity is <em>not</em> an entry-level position and that graduates of cybersecurity programs lack the technical depth required to be effective.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-5034" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training-and-Development-in-white-on-blue-key.jpg?resize=198%2C132&#038;ssl=1" alt="" width="198" height="132"></p>
<p>These critics offer an alternative perspective – cybersecurity professionals are not trained in the classroom but must be developed on the job after gaining expertise in IT operations. So rather than casting about externally for cybersecurity talent that isn’t available, IT managers should be looking within their own ranks for people who could be trained in security. For instance, in a 2015 <em>Computerworld </em>column, “<a href="https://www.computerworld.com/article/2979858/it-skills-training/the-myth-of-the-cybersecurity-skills-shortage.html">The myth of the cybersecurity skills shortage</a>,” Ira Winkler wrote, “The best security practitioners have experience in the technology and processes that they are supposed to secure…If you have no experience as a system administrator, you cannot maintain the security of a system.” He goes on to say that most of his work as a security professional has been to shore up poorly designed, poorly configured, and poorly maintained systems, which requires IT knowledge, rather than using hacking knowledge he gained in his training. But this perspective also has critics.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5035" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Build-Talent-in-white-on-blue.jpg?resize=200%2C133&#038;ssl=1" alt="" width="200" height="133"></p>
<p>A third point of view is that IT managers who only look for security professionals with IT/computer science credentials are creating the shortage through their own myopia. In a <a href="https://hbr.org/2017/05/cybersecurity-has-a-serious-talent-shortage-heres-how-to-fix-it"><em>Harvard Business Review</em></a> article, Marc van Zadelhoff, General Manager of IBM Security, describes IBM’s approach of creating “new collar” jobs. They look for people with “unbridled curiosity, passion for problem solving, strong ethics, and an understanding of risks” – characteristics that can’t be taught – and then train them in the necessary technical skills through on-the-job programs, vocational and community college courses, and industry certification programs, such as those offered by <a href="https://www.isc2.org/">(ISC)<sup>2</sup></a>. Supporting this view is the finding in the Global Information Security Workforce Study that 87% of current cybersecurity workers began their career in another field, some in other IT roles but many in non-IT fields.</p>
<p><strong>So what’s the answer?</strong></p>
<p>Like most difficult organizational problems, there is no single cause and, therefore, no single solution. Addressing the cybersecurity personnel shortage will require focused and creative efforts on the part of educators, managers, trade associations, and employees alike.</p>
<ul>
<li>Educators need to work closely with industry to identify the needed knowledge and skills to integrate into existing curricula or to serve as the basis for new programs.</li>
<li>Managers, meanwhile, with support from HR and other training resources, may need to create their own internal on-the-job training programs for existing personnel, creating opportunities for lateral moves into security positions.</li>
<li>Managers may also need to cast a wider net for potential security talent as IBM has done, looking for people with the necessary character and an eagerness to learn outside the IT ranks.</li>
<li>Trade associations, such as <a href="http://www.issa.org/">ISSA</a> and <a href="https://www.isc2.org/">(ISC)<sup>2</sup></a>, can pool resources to raise awareness of high school, college, <em>and</em> midcareer professionals of available cybersecurity career options and the paths available for acquiring the needed knowledge and skills.</li>
<li>Workers already in cybersecurity positions will need to adapt to their role as teacher/mentor to those moving into security positions, respecting those with non-IT backgrounds as possibly bringing in fresh perspectives.</li>
</ul>
<p>Finally, even if there were an excess of cybersecurity pros, they cannot safeguard an organization alone. All workers, managers, and executives, from the front desk and loading dock up to the C-suite must come to recognize that cybersecurity is now a part of <em>everyone</em>’s job! More on this in the weeks to come.</p>
<p>Is a personnel shortage putting your organization at risk? Contact us for a third-party Security Risk Assessment to find out: 512.310.0020 or <a href="mailto:info@thirdrock.com">info@thirdrock.com</a>.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/01/17/shortage-of-qualified-cybersecurity-workers-the-greatest-cyber-risk-of-all/">Shortage of Qualified Cybersecurity Workers: “…the greatest cyber risk of all.”</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5020</post-id>	</item>
		<item>
		<title>Thank Goodness! NIST says, &#8220;No more difficult passwords!&#8221;</title>
		<link>https://thirdrock.com/blog/2017/09/14/thank-goodness-nist-says-no-more-difficult-passwords/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 14 Sep 2017 14:00:17 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Technology]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=4278</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/14/thank-goodness-nist-says-no-more-difficult-passwords/">Thank Goodness! NIST says, &#8220;No more difficult passwords!&#8221;</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_10 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_14">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_19  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_17  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2349" style="margin-right: 10px; margin-top: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?resize=250%2C167&#038;ssl=1" alt="" width="250" height="167" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?w=600&amp;ssl=1 600w" sizes="(max-width: 250px) 100vw, 250px" />Just when you thought all hope was lost of remembering your 16 character password with upper and lower case letters, numbers, and special characters; NIST comes to the rescue. That&#8217;s right!  The National Institute of Standards and Technology wrote a brief addendum to SP 800-53 which simplifies Strength of Memorized Secrets.  You and I refer to those &#8220;secrets&#8221; as passwords.  It&#8217;s a light read, only 50 or 60 pages.  I don&#8217;t really know because I didn&#8217;t want to print it and kill four trees.  Anyway, the good news is Tom Sullivan wrote up a nice, short, one pageish, blog post about the draft from NIST.  You can find it at <a href="http://www.healthcareitnews.com/news/nist-tweaks-advice-passwords-says-make-them-easier-remember"><strong>NIST tweaks advice on passwords, says make them easier to remember</strong></a>.  Thank You, Tom!  And Thank You, NIST!</p>
<p>Seriously though, it&#8217;s a serious issue.  We all need to take care in creating strong passwords to protect our data and that of our clients.  Here&#8217;s the short list of how best to do that according to the new NIST advice:</p>
<ol>
<li>Make it easy to remember for you; e.g., &#8220;I rode a green bike as a kid.&#8221;</li>
<li>Make it something private, not publicly known. (Sports team names are not good passwords.)</li>
<li>The longer the better, longer than 12 characters.  Personally, make it longer than 16 if the system supports that length.</li>
<li>Hope the developers know to have password policies that prevent bad passwords.</li>
</ol>
<p> <span style="font-size: 12px;">Here&#8217;s the summary from the document.</span></p>
<h3 id="a5-summary" style="padding-left: 30px;"><span style="color: #808080;">A.5 Summary</span></h3>
<p style="padding-left: 30px;"><span style="color: #808080;">Length and complexity requirements beyond those recommended here significantly increase the difficulty of memorized secrets and increase user frustration. As a result, users often work around these restrictions in a way that is counterproductive. Furthermore, other mitigations such as blacklists, secure hashed storage, and rate limiting are more effective at preventing modern brute-force attacks. Therefore, no additional complexity requirements are imposed.</span></p>
<p>And you thought all your tax dollars were going to waste! 🙂</p>
<p>Join our free monthly <a href="http://thirdrock.us3.list-manage2.com/subscribe?u=1649a45c35ac1a873bb99bdb8&amp;id=7d7bf2b255">newsletter</a> to stay up-to-date on HIPAA and cybersecurity.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/09/14/thank-goodness-nist-says-no-more-difficult-passwords/">Thank Goodness! NIST says, &#8220;No more difficult passwords!&#8221;</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4278</post-id>	</item>
	</channel>
</rss>
