<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Cybersecurity Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/cybersecurity/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Thu, 26 Mar 2020 19:31:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Cybersecurity Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/cybersecurity/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Cyber Protection as Your Business Deals with Social Distancing</title>
		<link>https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Tue, 10 Mar 2020 12:00:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Pandemic]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8918</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/">Cyber Protection as Your Business Deals with Social Distancing</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Cyber Safety Tips for Businesses When Employees Work from Home</h2>
<p>With the threat of the Coronavirus, many companies are allowing or requiring employees to work from home. If your company deals with protected information such as healthcare, financial, consumer or personal, you should have policies and procedures in place to protect that data within your normal work environment. However, having your work force suddenly need to access this information from home may not be normal. Systems may be overloaded, sensitive information distributed in a way that you never anticipated and lines of communication disrupted. Do your policies and procedures cover such a situation, like a pandemic? Here are 6 tips to best protect your business and your clients.</p>
<h3>Train Your Employees</h3>
<p>We are not talking about the once a year standard, boring videos people half heartedly watch so they can print off a certificate proving they did it. Your employees <u>must</u> know key elements of cyber safety that they are regularly reminded of. If nothing else, make sure they know these 3 things.</p>
<ol>
<li><u>Anticipate phishing and spear phishing attacks</u>. Word will travel fast that everyone is working from home. Hackers will recognize you are vulnerable and try to take advantage of it. Tell your workforce to anticipate phishing and spear phishing attacks that will attempt to take advantage of pandemic fears. Give visual examples, have your IT on high alert searching for phishing attempts and contact employees immediately when one gets through your firewall.</li>
<li><u>Do not access sensitive information on unauthorized devices</u>. The biggest culprit: cell phones. Have policies about what devices they are allowed to use to remotely access information and make sure they know. Never store sensitive information unencrypted on a portable device.</li>
<li><u>Do not access sensitive information on unsecure networks</u>. Like working from Starbucks because they have free WiFi? That may be fine for personal use, but not when you’re accessing sensitive information. Public WiFi makes it easy for a hacker to infiltrate your computer, stealing the information you accessed.</li>
</ol>
<h3>Determine Critical Processes and Access Control</h3>
<p>This is a key component to any Pandemic plan. Who is authorized to access sensitive information, and how do you ensure they can actually access sensitive information in a highly distributed environment? Minimize your exposure by controlling access to data. Not everyone working from home needs access to sensitive information. Make sure you lock down access to only essential employees. Follow through by monitoring who is accessing data, what they are accessing and why.</p>
<h3>Multifactor Authentication</h3>
<p>For those employees who need to access sensitive information, require multifactor authentication every time they remotely access a private server. This is an easy step to implement that can have a big impact on keeping cyber criminals out.  Explain to your employees why the two-factor authentication is an important safety capability.</p>
<h3>Network Access Control</h3>
<p>While you should train your employees not to access sensitive information on unsecure networks (see tip #1), you can implement access controls that actually block a user if they do not meet a certain level of security. You should implement a Virtual Private Network (VPN) which provides higher security for your workers using their home and/or public internet that are not secure.   It’s fairly easy and inexpensive to implement. For more information on VPNs, <a href="https://www.techradar.com/vpn/best-vpn">click here</a>.</p>
<h3>Encrypt Data</h3>
<p>If information is stored locally on a device, make sure it is encrypted. Portable devices are often stolen that contain sensitive information. A simple step of encryption protects your clients’ information and protects you from hefty breach costs and fines.</p>
<h3>Provide Company Devices</h3>
<p>Laptops and cell phones should always be running the most up to date version of an operating system available (i.e. Windows 10 vs Windows 8). They should also have up to date firewall protections and antivirus software. If employees are permitted to use personal devices, it is difficult to ensure these protections stay up to date. Providing company devices that are properly configured and regularly updated help strengthen the barrier against cyber criminals.</p>
<p>Protection doesn’t have to be complicated, but it does have to be intentional. Simple steps taken by the company and the employees can go a long way. While we want to stay physically safe through this wave of the Coronavirus, let’s make sure we stay cyber safe too.</p>
<p> Concerned if you have the right precautions and planning in place? Contact Third Rock at info@thirdrock.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/">Cyber Protection as Your Business Deals with Social Distancing</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8918</post-id>	</item>
		<item>
		<title>Is WannaCry still a threat?</title>
		<link>https://thirdrock.com/blog/2019/10/04/is-wannacry-still-a-threat/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Fri, 04 Oct 2019 16:45:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WannaCry]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8437</guid>

					<description><![CDATA[<p>WannaCry ransomware took the world by surprise in 2017, crippling systems worldwide. Do you think it's been eradicated? Think again.</p>
<p>The post <a href="https://thirdrock.com/blog/2019/10/04/is-wannacry-still-a-threat/">Is WannaCry still a threat?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><em>If it’s not broke, don’t fix it</em></h2>
<p>Many people think that as long as their computer is running at a good speed and everything is working, there is no need to upgrade. Why spend money when you don’t have to, right? Wrong! The technology world cannot run on the mantra “if it’s not broke, don’t fix it” because in reality, it is broken and you just don’t know it. The proof can be seen when WannaCry ransomware was unleashed on the world in May 2017.</p>
<p>It crippled over 300,000 machines in 150 countries by targeting vulnerabilities in Windows operating systems, hitting Windows 7 the most. While Windows patched many of these vulnerabilities, their focus was, and still is, on their active operating systems, primarily Windows 10. According to Windows “every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it&#8217;s no longer supported.”<a href="#_ftn1" name="_ftnref1"><span>[1]</span></a> What does this mean for your security?</p>
<table>
<tbody>
<tr>
<td width="126">Operating System</td>
<td width="138">Availability Date</td>
<td width="156">End of Life Date</td>
<td width="150">End of Mainstream Support Date</td>
<td width="150">End of Extended Support Date</td>
</tr>
<tr>
<td width="126">Windows XP</td>
<td width="138">October 25, 2001</td>
<td width="156">January 9, 2007</td>
<td width="150">April 14, 2009</td>
<td width="150">April 8, 2014</td>
</tr>
<tr>
<td width="126">Windows Vista</td>
<td width="138">January 30, 2007</td>
<td width="156">October 22, 2010</td>
<td width="150">April 10, 2012</td>
<td width="150">April 11, 2017</td>
</tr>
<tr>
<td width="126">Windows 7</td>
<td width="138">October 22, 2009</td>
<td width="156">October 31, 2013</td>
<td width="150">January 13, 2015</td>
<td width="150">January 14, 2020</td>
</tr>
<tr>
<td width="126">Windows 8</td>
<td width="138">October 26, 2012</td>
<td width="156">October 31, 2014</td>
<td width="150">January 8, 2018</td>
<td width="150">January 10, 2023</td>
</tr>
<tr>
<td width="126">Windows 8.1</td>
<td width="138">October 18, 2013</td>
<td width="156">September 1, 2015</td>
<td width="150">January 8, 2018</td>
<td width="150">January 10, 2023</td>
</tr>
</tbody>
</table>
<h2><em>Windows Lifecycle</em></h2>
<p>According to Windows’ lifecycle policy<a href="#_ftn2" name="_ftnref2"><span>[2]</span></a>, a product is designed to have a 5 year mainstream support lifecycle followed by a 5 year extended support cycle. During the mainstream support, consumers have access to free incident support, security update support and the ability to request non-security updates. When a product moves to the extended support stage, security updates are still provided but no new features or design changes are available, and not all products are covered.</p>
<p>After the end of extended support, security updates greatly decrease. According to Microsoft, “the Extended Security Update (ESU) program is a last resort option for customers who need to run certain legacy Microsoft products past the end of support. It includes Critical and/or Important security updates for a maximum of three years after the product’s End of Extended Support date.” Who determines what is critical and important? Microsoft of course. It would have to be a huge security breach, such as WannaCry, to justify the amount of money it would take to push out an update.</p>
<p><img data-recalc-dims="1" fetchpriority="high" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Issues-with-XP.png?resize=595%2C248&#038;ssl=1" width="595" height="248" alt="" class="wp-image-8442 aligncenter size-full" scale="0" srcset="https://thirdrock.com/wp-content/uploads/Issues-with-XP.png 595w, https://thirdrock.com/wp-content/uploads/Issues-with-XP-480x200.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 595px, 100vw" /></p>
<p style="text-align: center;">Image from Windows end of XP Support<a href="#_ftn3" name="_ftnref3"><span>[3]</span></a></p>
<h2><em>What’s the risk?</em></h2>
<p>If you are running an antiquated system on your home computer, that is a risk to your security and your personal information. Not smart, but not a worldwide catastrophe. However, having one device on your work network running an old system could be devastating.</p>
<p>Though Windows created security updates to counter WannaCry, it is still active on over 145,000 devices worldwide according to a survey by Armis<a href="#_ftn4" name="_ftnref4"><span>[4]</span></a>. If even one device on your network is infected, it creates a gateway for hackers to breach your security.</p>
<p>Armis discovered that within the past 6 months, 60% of organization in the manufacturing industry and 40% in the healthcare industry experienced at least one WannaCry attack. Why? Because they tend to have older technology which makes them an easy target.</p>
<p style="text-align: center;"><em><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/tech-old-Windows-systems.png?resize=562%2C294&#038;ssl=1" width="562" height="294" alt="" class="wp-image-8440 aligncenter size-large" scale="0" /></em><em style="background-color: #ffffff; font-size: 12px; text-align: right;">Percentage of old Windows OS versions by industry type (Retail, Technology, Healthcare, Manufacturing)</em><span style="background-color: #ffffff; font-size: 12px; text-align: right;"><em style="font-size: 12px;">4</em></span></p>
<h2><em>What’s the cost?</em></h2>
<p>It is estimated that the global effort to counter the original WannaCry attack in 2017 cost around $4 billion, including $325 million paid out in ransoms. The combined efforts to stop the attacks created the false sense of security that WannaCry is no longer a threat. This is just not true.</p>
<p>In the same way that tech companies develop better, faster and more efficient software, the criminals do too. Hackers do not stay docile. If one means to infiltrate your system fails, they look for a different back door. Having the most up to date software means that Windows is fighting those battles for you. Keeping an unsupported operating system is the same as lowering the drawbridge to the attacking army.</p>
<p>According to IBM’s Cost of a Breach Report 2019, the average cost of a breach in the United States is $8.2 million. With the average size of a breach being 25,575 records, that equates to $242 per record. Lost business was the biggest contributor to this total cost, with the average business losing $1.42 million<a href="#_ftn5" name="_ftnref5"><span>[5]</span></a>. It is hard to recover from the lack of trust a customer feels when their information was stolen on your watch.</p>
<h2><em>Next steps</em></h2>
<p>Where do you go from here? Even with these numbers, you may be asking yourself, can we really afford to find and update every device that is out of date? The bigger question is, can your business survive the cost of a breach if you don’t?</p>
<p>Start with our Cyber Quick Check to see what your cybersecurity score is. Our Security Risk Assessment includes multiple scans that pinpoint weak areas that are most vulnerable, including a full inventory of what is on your network. Don’t let your records be held ransom. Fight back with the right security.  If you’re still running Windows XP, Windows 7 or Windows Vista start an upgrade program today.  Replace your computers that have the oldest versions of Windows with new computers with the latest version of Windows as you can afford it.</p>
<p>Check your cyber score at <a href="https://cyberquickcheck.com/thirdrock">here</a></p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1"><span>[1]</span></a> <a href="https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet">https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet</a></p>
<p><a href="#_ftnref2" name="_ftn2"><span>[2]</span></a> <a href="https://support.microsoft.com/en-us/help/14085">https://support.microsoft.com/en-us/help/14085</a></p>
<p><a href="#_ftnref3" name="_ftn3"><span>[3]</span></a> <a href="https://www.microsoft.com/en-us/microsoft-365/windows/end-of-windows-xp-support">https://www.microsoft.com/en-us/microsoft-365/windows/end-of-windows-xp-support</a></p>
<p><a href="#_ftnref4" name="_ftn4"><span>[4]</span></a> <a href="https://armis.com/wannacry/">https://armis.com/wannacry/</a></p>
<p><a href="#_ftnref5" name="_ftn5"><span>[5]</span></a> IBM Security and Ponemon Institute. Cost of a Data Breach Report 2019. <a href="https://www.ibm.com/downloads/cas/ZBZLY7KL">https://www.ibm.com/downloads/cas/ZBZLY7KL</a></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2019/10/04/is-wannacry-still-a-threat/">Is WannaCry still a threat?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8437</post-id>	</item>
		<item>
		<title>Business Associates bad for business?</title>
		<link>https://thirdrock.com/blog/2019/05/21/business-associates-bad-for-business/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 21 May 2019 14:00:26 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[Business Associates]]></category>
		<category><![CDATA[cyber security]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=7509</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/05/21/business-associates-bad-for-business/">Business Associates bad for business?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In January 2019, Spiceworks surveyed 600 IT and security decision makers over a wide variety of companies, all with one thing in common: their use of third-party vendors or Business Associates (BAs). Their findings should have everyone looking more closely at their BAs. Some of the key findings were:</p>
<ul>
<li>90% of companies with third-party policies review them annually</li>
<li>81% consider their policies effective</li>
<li>44% of the companies experienced “a significant, business altering data breach caused by a vendor”</li>
<li>15% of breached companies were notified by the vendor of the breach</li>
</ul>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=423%2C282&#038;ssl=1" width="423" height="282" alt="" class="wp-image-7512 aligncenter size-medium" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=1024%2C682&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=1080%2C720&amp;ssl=1 1080w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?w=1334&amp;ssl=1 1334w" sizes="(max-width: 423px) 100vw, 423px" /></p>
<p>These statistics are startling, highlighting the chasm between the BA risk management process and the reality of vendor incident response. The most disturbing findings came after the breach. Almost 70% of the breached companies made no change to their obviously faulty risk policies and procedures, with only half of them discontinuing the vendor relationship! The negative, business altering consequences include a combination of increased operational cost and complexity, disrupted operations, financial loss and reputational damage. Reason would move to making changes, but many don’t know where to start.</p>
<p><strong>Evaluate Your Vendors</strong></p>
<p>Companies need to take decisive steps with their business associates to protect their customers’ data. At a minimum, a “trust by verify” approach is required, while many companies are moving to a “zero trust” model. Some options include:</p>
<ul>
<li>Contractually obligate vendors to security and privacy practices</li>
<li>Review your vendors’ security and privacy policies and procedures including their risk management plan</li>
<li>Require security risk assessments be performed annually</li>
<li>Conduct a joint risk management review focusing on data exchange and management, prior to enabling the BA access to your data</li>
<li>Request historical review and references</li>
</ul>
<p><strong style="font-size: 12px;">Security should be a joint effort</strong></p>
<p>It is essential to keep an inventory of all third-parties who can access and share your data, but that is not enough. This study found over two thirds of the companies were not confident that their vendors notify them when sharing data with other subcontractors. Properly vetting your BAs may increase the trust relationship, but additional steps should be taken.</p>
<ul>
<li>Coordinate responsibilities between both parties</li>
<li>Require and review breach notification protocol</li>
<li>Require insurance and other forms of indemnification</li>
<li>Maintain regular communication of security expectations and execution</li>
</ul>
<p>The need for vendors and BAs will always be present in our ever changing, collaborative world. Take the steps necessary to protect your company, your clients and your vendors.</p>
<p>&nbsp;</p>
<p><u>Reference</u></p>
<p>Nearly half of firms suffer data breach at hands of vendors. Mark Sangster. 6 March 2019. <a href="https://www.esentire.com/blog/nearly-half-of-firms-suffer-data-breach-at-hands-of-vendors/">https://www.esentire.com/blog/nearly-half-of-firms-suffer-data-breach-at-hands-of-vendors/</a></p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/05/21/business-associates-bad-for-business/">Business Associates bad for business?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7509</post-id>	</item>
		<item>
		<title>Brand Impersonation</title>
		<link>https://thirdrock.com/blog/2019/05/01/brand-impersonation/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Wed, 01 May 2019 14:00:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[brand impersonation]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[phishing scam]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=7156</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/05/01/brand-impersonation/">Brand Impersonation</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Have you ever received an email from a trusted company saying that your account needs maintenance? The only problem, you don’t have an account with that company. So why are they sending you an email? Most likely, it’s scammers using a popular technique called brand impersonation.</p>
<p>Brand impersonation has become so popular that 83% of all spear phishing attacks use this tactic. A scammer sends a very legitimate looking email, complete with logo and, what appears to be, legitimate email address. The goal is to get you to give up credentials or click on a malicious link. Some links take you to, again, what looks like a real website asking you to enter your login information to “fix” your account. These websites are actually hosted by the cybercriminal, and once you enter in your data, they have it. Nearly 1 in 5 attacks involve the impersonation of a financial institution, in order to gain access to your login, account numbers and other personal information. The highest impersonated company though is Microsoft, being used for 32% of known attacks.[1] If the cybercriminal can gain access to your email, they can monitor it without you knowing. Then they can learn details about you, send password resets from you valuable accounts and capture the email to login.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/brand-impersonation.jpg?resize=476%2C301&#038;ssl=1" width="476" height="301" alt="" class="wp-image-7159 aligncenter size-full" style="display: block; margin-left: auto; margin-right: auto;" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/brand-impersonation.jpg?w=679&amp;ssl=1 679w, https://i0.wp.com/thirdrock.com/wp-content/uploads/brand-impersonation.jpg?resize=300%2C189&amp;ssl=1 300w" sizes="(max-width: 476px) 100vw, 476px" /></p>
<p><strong>What to look for</strong><strong> </strong></p>
<p><strong> </strong></p>
<ul>
<li>Misspellings or questionable domain name in sender’s email</li>
<li>Misspellings or questionable domain name in any of the hyperlinks</li>
<li>Vague description of the “issue” with your account</li>
<li>If you click a link, check the web address it sends you to</li>
<li>Is this normal practice for the company to communicate with you?</li>
</ul>
<p><strong>Best practices to protect yourself</strong></p>
<ul>
<li>Make sure the information presented in the email actually matches your use of that product. (i.e. if you receive an email about an iTunes purchase, but haven’t made any purchases)</li>
<li>If you want to check your account, do not follow links in the email. Go to the company’s website directly to log in</li>
<li>When in doubt, call the company to ask about your account</li>
<li>Send the fake email to the legitimate company. Many companies invest in the protection of their customers and will investigate brand impersonations.</li>
<li>If you do make a mistake and type in your user id and password to an impersonating web site, immediately go to your real account and change the password.</li>
</ul>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1"><span>[1]</span></a> SPEAR PHISHING: TOP THREATS AND TRENDS • US 1.0 • Copyright 2019 Barracuda Networks, Inc. • barracuda.com</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2019/05/01/brand-impersonation/">Brand Impersonation</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7156</post-id>	</item>
		<item>
		<title>Is that email really from your boss?</title>
		<link>https://thirdrock.com/blog/2019/04/25/is-that-email-really-from-your-boss/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Thu, 25 Apr 2019 14:00:21 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[email spoof]]></category>
		<category><![CDATA[phishing scam]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=7129</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/04/25/is-that-email-really-from-your-boss/">Is that email really from your boss?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Email spoofs and phishing have greatly evolved in the last few years, with criminals upping their game to trick you. Instead of casting a wide net, criminals are utilizing Spear Phishing, a highly personalized attack. Attackers research their targets and craft a carefully designed message impersonating a seemingly trustworthy person or company. According to Beazley’s 2019 Breach Briefing, business email compromise increased 133% with financial institutions, healthcare and education being the top targets. While it only accounts for 6% of all spear phishing attacks, it has proven very lucrative for criminals.</p>
<p>Business email compromise (BEC) occurs when a cybercriminal uses a compromised email account or spoofs a legitimate email address to trick an employee into transferring money or sensitive data. The financial industry is the highest targeted due to their easy access to funds. An employee gets an email from a “senior executive” requesting a wire transfer, giving this attack its nickname of CEO fraud. Attackers use a sense of urgency in their emails to encourage quick action by the receiver without investigation. The FBI reports a loss of $12.5 billion since 2013 due to BEC.</p>
<p><span style="font-size: 14px;">Criminals must do their research to pull off a BEC attach successfully. They must learn names of employees, hierarchy of the company and who controls the funds. Then, using a spoofed or compromised attack, they send an email requesting a wire transfer with a fraudulent account number or sensitive data with financial information. These tend to not have any links or malicious attachments so they are hard to detect through email security. An email may look similar to this:</span></p>
<p><span style="font-size: 14px;"></span></p>
<p><span style="font-size: 14px;">                     From: Jane Johnson &lt;jane.johnson@conp.com&gt;</span></p>
<p>To: Michael Blake &lt;michael.blake@corp.com&gt;</p>
<p>Subject: Request</p>
<p>&nbsp;</p>
<p>Hey Michael,</p>
<p>Are you in the office? I need to process a bank transfer for me.</p>
<p>Give me a quick reply when you can get it done.</p>
<p>&nbsp;</p>
<p>Regards,</p>
<p>Jane Johnson</p>
<p>CEO, Corp Corporation</p>
<p>Cell: 408-292-2020</p>
<p>&nbsp;</p>
<p><span style="font-size: 14px;">On first glance it looks legitimate and has a sense of urgency. On closer inspection, you see the sender is using a spoof account of @conp.com instead of @corp.com. If this money is sent, it’s almost impossible to get back. This criminal did his research.</span></p>
<p><strong style="font-size: 14px;">Hard to Defend</strong></p>
<ul>
<li>
<p><strong> </strong><span style="font-size: 14px;">Targeted attacks that are not mass produced, so they aren’t flagged as spam</span></p>
</li>
<li>
<p>Emails come from reputable email services (gmail.com is used for 1 in 3 attacks)</p>
</li>
<li>
<p>No malicious links or attachments</p>
</li>
<li>
<p>Domain and display name spoofing make convincing impersonations</p>
</li>
<li>
<p>Compromised accounts used to send requests are even harder to trace</p>
</li>
<li>
<p>Social engineering tactics such as brevity, urgency, personalization and pressure increase chances of success</p>
</li>
</ul>
<p><strong>Steps to Protect your business</strong></p>
<ul>
<li>
<p>Enable multi-factor authentication for remote access to systems and apps</p>
</li>
<li>
<p>Implement regular anti-fraud training for your employees</p>
</li>
<li>
<p>Establish a process for employees who travel and need to request funds. Do not document the process in the network.</p>
</li>
<li>
<p>Limit the employees who have the authority to submit or approve wire transfers</p>
</li>
<li>
<p>Verify any vendor requests to change account details with verbal confirmation</p>
</li>
<li>
<p>Utilize artificial intelligence technology that recognizes when an account has been compromised</p>
</li>
</ul></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/04/25/is-that-email-really-from-your-boss/">Is that email really from your boss?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7129</post-id>	</item>
		<item>
		<title>The Current State of Privacy and Cybersecurity in Texas Healthcare Organizations</title>
		<link>https://thirdrock.com/blog/2018/10/11/the-current-state-of-privacy-and-cybersecurity-in-texas-healthcare-organizations/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 11 Oct 2018 15:00:21 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA Privacy]]></category>
		<category><![CDATA[Patient Information Privacy]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5855</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/10/11/the-current-state-of-privacy-and-cybersecurity-in-texas-healthcare-organizations/">The Current State of Privacy and Cybersecurity in Texas Healthcare Organizations</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-full wp-image-5856" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/IHIT_Avatar18-200.jpg?resize=200%2C200&#038;ssl=1" alt="" width="200" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/IHIT_Avatar18-200.jpg?w=200&amp;ssl=1 200w, https://i0.wp.com/thirdrock.com/wp-content/uploads/IHIT_Avatar18-200.jpg?resize=150%2C150&amp;ssl=1 150w" sizes="(max-width: 200px) 100vw, 200px" /></p>
<p>&nbsp;</p>
<p>Health IT has come a long way since the HITECH Act was introduced almost 10 years ago. Technology availability and accessibility has also increased dramatically in that time frame. While better connectivity has revolutionized healthcare, it has also opened the door to cyber risks.</p>
<p>Testimony before the Texas Health Services Authority Board at the Texas State Capitol on Friday, October 4 reinforced recent headlines that cybersecurity is a persistent problem; one that will require greater resources at all levels of healthcare and healthcare governance. Representatives from the Texas Attorney General’s Office, the Texas Medical Board, Texas Medical Liability Trust, University of Texas, and Cynergistek<a href="#_ftn1" name="_ftnref1">[1]</a>, along with Third Rock CEO, Robert Felps, took turns presenting data and observations on the “current state of cybersecurity and privacy in Texas healthcare” from their professional perspectives. Though some gains have been made in recent years, key points across the presentations made clear that Texas healthcare organizations – and the supporting governing bodies – still have work to do to safeguard patient data.  Here are the key takeaways:</p>
<p>&nbsp;</p>
<ol>
<li><strong>Available data indicate that Texas healthcare organizations remain extremely vulnerable to cyber threats. </strong></li>
</ol>
<ul>
<li>In 2017, TMLT received reports of 600 data privacy and security incidents, or breaches. There have only been 103 incidents so far in 2018 (Jan-Sept), but that’s still an average of 11.4 incidents/month.</li>
<li>Mac MacMillan, CEO of Cynergistek, reported that his firm is notified of at least one security incident a day by one of their 1500 hospital clients, which includes 70 academic medical centers.</li>
</ul>
<p>&nbsp;</p>
<ol start="2">
<li><strong>Both formal and informal reports indicate that healthcare organizations have an incomplete approach to cybersecurity and HIPAA compliance.</strong></li>
</ol>
<ul>
<li>In 2016, the OCR Random Audit Program evaluated 63 Covered Entities. Of the audited organizations, 13 had not attempted to perform a Security Risk Assessment (SRA). Of the 50 organizations that had completed an SRA, <u>none</u> satisfied the OCR’s requirements.</li>
<li>MacMillan also reported that fewer than half of Cynergistek&#8217;s client organizations meet the NIST requirements for cybersecurity; a situation he attributed to a lack of both human and financial resources.</li>
</ul>
<p>&nbsp;</p>
<ol start="3">
<li><strong>Too many healthcare organizations are financially unprepared for a cyber event. </strong></li>
</ol>
<ul>
<li>70% of healthcare organizations report having <em><u>no cyber insurance</u><strong>.</strong></em></li>
<li>The combination of legal fees, penalties, increased administrative costs, and loss of business resulting from an information security incident can potentially put a healthcare organization out of business.</li>
</ul>
<p><strong> </strong></p>
<ol start="4">
<li><strong>There is a significant shortage of adequately-trained cybersecurity personnel. </strong></li>
</ol>
<ul>
<li>According to MacMillan, there are currently about 780,000 cybersecurity employees and approximately 350,000+ cybersecurity job vacancies. By 2021, labor experts are predicting 3.5 <em>million</em> cybersecurity job vacancies.</li>
<li>When he visits a client hospital and asks &#8220;Who&#8217;s taking care of ‘x’ cybersecurity technology?&#8221; he is often referred to an IT employee with no cybersecurity experience.</li>
</ul>
<p>&nbsp;</p>
<ol start="5">
<li><strong>Enforcement responsibility for healthcare data privacy and security is distributed across multiple state agencies, resulting in incomplete data and inconsistent enforcement.</strong></li>
</ol>
<ul>
<li>At the state level, responsibility for enforcing HIPAA and HB300 falls to the Texas Medical Board, Texas Board of Nursing, Dept of Health Services (DHS), Office of the Attorney General and others.</li>
<li>Agencies report aggregate numbers to the Office of the Attorney General of complaints received and of incidents resulting in disciplinary action. However, specific cases are only referred to the Attorney General’s Office when the Agency believes an incident warrants civil or criminal penalties that only the AG’s office can impose.</li>
</ul>
<p>&nbsp;</p>
<ol start="6">
<li><strong>Information security incidents negatively impact patients – both directly and indirectly.</strong></li>
</ol>
<ul>
<li>Healthcare records are worth substantially more on the black market than credit card or even social security numbers, making healthcare records a prime target for cyber criminals.</li>
<li>A security incident resulting in identity theft can take years, and thousands of dollars, for an affected patient to correct.</li>
<li>A ransomware attack can bring care delivery to a standstill, freezing infusion pumps and other medical devices, putting patients at risk.</li>
</ul>
<p>&nbsp;</p>
<h4 style="text-align: center;">Are you cyber confident?  Can you afford no action?  Third Rock makes it simple and affordable.</h4>
<p style="text-align: center;"><strong>Protect your patients, protect your practice, protect yourself</strong></p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> A cyber security consulting firm, <a href="https://cynergistek.com/">https://cynergistek.com/</a></p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> Texas Medical Liability Trust, the largest medical provider in the state, <a href="https://tmlt.org/tmlt">https://tmlt.org/tmlt</a></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/10/11/the-current-state-of-privacy-and-cybersecurity-in-texas-healthcare-organizations/">The Current State of Privacy and Cybersecurity in Texas Healthcare Organizations</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5855</post-id>	</item>
		<item>
		<title>Are you Safe?</title>
		<link>https://thirdrock.com/blog/2018/08/17/are-you-safe/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Fri, 17 Aug 2018 15:07:28 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[personal safety]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5811</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/08/17/are-you-safe/">Are you Safe?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5813" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?resize=300%2C172&#038;ssl=1" alt="" width="300" height="172" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?resize=300%2C172&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?w=609&amp;ssl=1 609w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>Safety. Such an important word with so many different connotations. We ask safety questions constantly. Is my family safe? Will my house be safe? Is this a safe neighborhood? Are our schools safe? Many technologies are designed to specifically pacify our desire to feel safe.  We can track our child&#8217;s cellphone. We buy alarms for our homes and doorbells with cameras. Schools install cameras and specially locking doors to protect the children.  But one area most people neglect, is cyber safety. Why?  Because it is such an abstract issue.  I check the locks on my doors each night before I go to bed.  I can <em>see and confirm</em> they are locked. None of my physical senses will tell me if my PC is being hacked, until it’s too late and the ransomware notice covers the screen.  As an executive, are you doing what it takes to keep your clients safe? Is their information secure within your care? Do you even know where to start looking? Take this short quiz to see if you are on the right path. We can help you answer &#8220;Yes&#8221; to all of your security questions.</p>
<p style="text-align: center;"><strong>Protect your Patients. Protect your Organization. Protect Yourself.</strong>™</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/08/17/are-you-safe/">Are you Safe?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5811</post-id>	</item>
		<item>
		<title>NIST Makes Passwords a Little Easier</title>
		<link>https://thirdrock.com/blog/2018/04/12/nist-makes-passwords-a-little-easier/</link>
		
		<dc:creator><![CDATA[Mike Moran]]></dc:creator>
		<pubDate>Thu, 12 Apr 2018 14:00:35 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[become cyber confident]]></category>
		<category><![CDATA[cyber secure]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[NIST recommendations]]></category>
		<category><![CDATA[password vaults]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5413</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/04/12/nist-makes-passwords-a-little-easier/">NIST Makes Passwords a Little Easier</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5415 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Password-in-white-on-blue-key.jpg?resize=300%2C200&#038;ssl=1" alt="Password" width="300" height="200" /></p>
<p>After much research, the National Institute of Standards and Technology (NIST) has determined that we have been doing passwords all wrong!</p>
<p>Traditionally, best practice for password use has been a minimum of 6 characters composed of a combination of letters, numbers and symbols, which had to be rotated periodically. To make things more complex, companies typically added rules about how frequently a password could be reused &#8211; or prohibited reuse completely.</p>
<p>What NIST&#8217;s research showed is that all the rules simply pushed more people into predictable password patterns. Patterns like  Jan18!, Feb18!, Mar18!, which satisfies the no reuse rule, the minimum length rule and the content rule. However, it is completely deducible with only a small amount of social engineering or programming.</p>
<p>So, based on this behavior, what did NIST recommend?</p>
<ul>
<li>Minimum length of 8 characters</li>
<li>Maximum length of 64 characters</li>
<li>Mandatory change based on enforced minimum length</li>
<li>Check against dictionary of known bad passwords</li>
<li>No composition rules</li>
<li>No recovery hints</li>
</ul>
<p>Now that we know what is to be done on the server or application side, how does the end user make use of the new best practices?</p>
<p>The <strong>best solution</strong> is to use a password vault with generation capabilities, which gets you down to a single password for access to the vault.  Password vaults are programs that securely store large numbers of passwords protected by a password. For Windows, some of the popular ones are LastPass, Dashlane, KeePassX and Sticky Password. For MacOS, some of the popular ones are 1Password, KeePass, LastPass, and SplashID Safe.</p>
<p>If you are new to password vaults, then your next step is to visit all the websites you use and use the password vault to generate a new password for each one.</p>
<p><strong>Alternatively</strong>, picking phrases that strike a chord with you from songs, movies, plays or books make good passwords, but make sure they are as long as you can remember – 20, 30&#8230;64 characters, with a minimum of 16 characters.</p>
<p>Once you have password habits that are cyber secure, it is time to secure your whole environment so you can become cyber confident.</p>
<p>If you have concerns about your cyber security and would like to improve your cyber confidence and compliance, please contact us at:  <a href="mailto:info@thirdrock.com">info@thirdrock.com</a></p>
<h3 style="text-align: center;"><strong></strong></h3>
<h3 style="text-align: center;"><strong>Building a Cyber Confident</strong>℠<strong> World</strong></h3>
<h3></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/04/12/nist-makes-passwords-a-little-easier/">NIST Makes Passwords a Little Easier</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5413</post-id>	</item>
		<item>
		<title>Cyber Hygiene: Are your systems hardened?</title>
		<link>https://thirdrock.com/blog/2018/02/08/cyber-hygiene-are-your-systems-hardened/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 08 Feb 2018 15:00:46 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[auto-update]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[Managed Security Services Provider]]></category>
		<category><![CDATA[Managed Service Provider]]></category>
		<category><![CDATA[MSP]]></category>
		<category><![CDATA[MSSP]]></category>
		<category><![CDATA[NIST Compliant SRA]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[software]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5105</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/02/08/cyber-hygiene-are-your-systems-hardened/">Cyber Hygiene: Are your systems hardened?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="size-medium wp-image-5129 alignright" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_19047_00156-300x225.jpg?resize=300%2C225&#038;ssl=1" alt="" width="300" height="225" /></p>
<p>Third Rock performs Risk Assessments (Security Risk Analysis) for very small firms to large organizations in healthcare, technical, financial, insurance, oil and gas, and other industries. We know the focus of the assessment needs to be security; therefore, we run an industry standard (NIST based) scan checking computers for vulnerabilities and many variants of compliance.  (NIST stands for National Institute of Standards and Technology) Our findings show that the average covered entity is about 15% compliant and the Windows Operating System is about 27% compliant against the NIST test.  It&#8217;s obvious to us that cybersecurity has not been addressed.</p>
<p>You might ask, &#8220;How do we improve these findings and correct these issues?&#8221;</p>
<p>It&#8217;s actually not too difficult.</p>
<ol>
<li>Make sure your software is up-to-date.  You should have &#8220;auto-update&#8221; turned on for operating systems, anti-virus software, and applications.</li>
<li>Ensure that your backups are (a) current, (b) secure, (c) off-site, and that they work. Test the backups on a daily basis to make sure they have not been encrypted by <a class="glossaryLink " href="https://thirdrock.com/glossary/ransomware/" data-cmtooltip="A type of malicious software designed to block access to a computer system until a sum of money is paid.">ransomware</a>.</li>
<li>Correct the deficiencies of the Windows operating system, including setting up password policies.  Utilizing a domain is wise.</li>
<li>Hire competent IT staff or a Managed Service Provider to provide consistent service for your computers and network.  Paying for assistance only when you have a problem means no one is monitoring your network or computers on a regular basis.</li>
<li>Make sure your network has been locked down. Change firewall logins regularly, and use strong passwords.  Hide or turn off WiFi broadcasting and use strong passwords.  Do NOT allow guests onto the company network.</li>
<li>If you&#8217;re a larger covered entity, you should consider hiring a Managed Security Services Provider (MSSP).</li>
</ol>
<p>Hope this helps you think about cybersecurity in a new light and to take action to harden your systems and network.</p>
<p>If you have any questions drop us an email at <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a>.  We&#8217;re happy to help!</p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/02/08/cyber-hygiene-are-your-systems-hardened/">Cyber Hygiene: Are your systems hardened?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5105</post-id>	</item>
		<item>
		<title>Cloud or Not-to-Cloud; The Allscripts Breach</title>
		<link>https://thirdrock.com/blog/2018/02/06/cloud-or-not-to-cloud-the-allscripts-breach/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 06 Feb 2018 15:00:30 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Allscripts' data breach]]></category>
		<category><![CDATA[Business Associate Agreement]]></category>
		<category><![CDATA[data backup]]></category>
		<category><![CDATA[data corruption]]></category>
		<category><![CDATA[data integrity]]></category>
		<category><![CDATA[EHR systems]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[FISMA]]></category>
		<category><![CDATA[HIPAA Security Risk Assessment]]></category>
		<category><![CDATA[performance guarantees]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[redundant data centers]]></category>
		<category><![CDATA[SamSam virus]]></category>
		<category><![CDATA[SSAE 16/18 audit]]></category>
		<category><![CDATA[standard useful format]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5104</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/02/06/cloud-or-not-to-cloud-the-allscripts-breach/">Cloud or Not-to-Cloud; The Allscripts Breach</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Allscripts’ Electronic Health Records service was the first major cloud-based EHR to be significantly disrupted by a ransomware attack.  Close to 1,500 practices were affected by the EHR outage for about a week; essentially shutting down those practices.  Allscripts was hit by the SamSam virus which was launched in December 2016, crippling two of their North Carolina data centers.  Angry customers voiced their displeasure on social media and a class-action lawsuit has been filed.</p>
<p>Hackers have been relatively successful using the SamSam virus by taking advantage of RDP connections; remote desktop protocol.  An independent source who works with companies who suffered breaches told me that over 65% of the breaches he has recently dealt with are the result of RDP hacks.</p>
<p>So, what is an RDP hack?  If you have ever let your IT person or technical support person remotely take control of your computer to fix something, that is done via an RDP connection.  It is the same as you logging on to your computer and then letting the technician sit at your desk and work on your PC.  Hackers use sophisticated search engines to detect open RDP connections.  When one is located, they use password programs to hammer the PC in an attempt to gain access.  If a weak password is breached, the hackers just got the keys to the kingdom, and your data!</p>
<p>So, should you use a cloud-based EHR system, or not?  For small to medium sized practices, I would recommend a cloud EHR system <em>with the requirement</em> that you must do your homework first!  A worthy cloud EHR provider should deliver greater security than an on-site server and typical security measures implemented by internal IT support or an MSP.  It should also provide improved contingency capabilities and disaster recovery ability, although in this case, Allscripts is the disaster.</p>
<p>Here are the steps I would recommend in selecting a cloud-based EHR system.</p>
<ol>
<li>Confirm that the candidate EHR system meets the requirements of the providers and staff. A simple statement but it requires a significant investment to make the right choice.  I have seen a lot of practices that are on their second or third EHR system.</li>
<li>Written confirmation that the ePHI is fully encrypted during transmission and storage. Transmission not only includes between your practice and the cloud, but within the cloud between physical facilities.</li>
<li>Regularly (daily) data backup services are provided that are to at least one other physical facility. Thus, if there is a disruptive event at one location, you can quickly recover and deliver healthcare. In fact, they should be providing redundant data centers, so you would not know if one data center or server farm failed.  This greatly improves your HIPAA “Availability” requirement and simplifies your disaster recovery planning, which is another HIPAA requirement.</li>
<li>Written performance guarantees that include minimum up time and recovery times.</li>
<li>Data integrity assurances confirming that the EHR system will not corrupt your data. There is a substantial lawsuit against a cloud EHR vendor for data corruption.</li>
<li>Documented ability to export your data in a <em>standard useful format</em> should you elect to terminate your relationship.</li>
<li>Proof that they successfully passed an SSAE 16/18 audit, FISMA and have other appropriate third-party certifications. These will address cybersecurity and physical security requirements.</li>
<li>Proof they performed a HIPAA Security Risk Assessment in the past year.</li>
<li>Execute a current Business Associate Agreement with the vendor. They may require you to sign their BAA, and if they do, it is worth the investment to have your legal counsel review the BAA and the contract with the vendor.</li>
</ol>
<p>These steps will help ensure that your practice is properly protected and your patient data is safe.</p>
<p>If you have questions about the information provided, or need HIPAA or cybersecurity guidance, don’t hesitate to contact us at: <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a></p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/02/06/cloud-or-not-to-cloud-the-allscripts-breach/">Cloud or Not-to-Cloud; The Allscripts Breach</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5104</post-id>	</item>
	</channel>
</rss>
