<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Disaster Recovery (BCDR) Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/disaster-recovery/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/disaster-recovery/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Wed, 03 Jul 2019 11:58:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Disaster Recovery (BCDR) Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/disaster-recovery/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Picking up the pieces after Hurricane Harvey</title>
		<link>https://thirdrock.com/blog/2017/08/31/picking-up-the-pieces-after-hurricane-harvey/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Thu, 31 Aug 2017 14:30:38 +0000</pubDate>
				<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[disaster information clearinghouse]]></category>
		<category><![CDATA[National Flood Insurance Program]]></category>
		<category><![CDATA[online resources]]></category>
		<category><![CDATA[sba]]></category>
		<category><![CDATA[Small Business Association]]></category>
		<category><![CDATA[Texas Medical Association]]></category>
		<category><![CDATA[TMA]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4406</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/08/31/picking-up-the-pieces-after-hurricane-harvey/">Picking up the pieces after Hurricane Harvey</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" fetchpriority="high" decoding="async" class="alignright wp-image-4408" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/sky_after-the-storm-2.jpg?resize=329%2C219&#038;ssl=1" alt="" width="329" height="219" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/sky_after-the-storm-2.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/sky_after-the-storm-2.jpg?w=350&amp;ssl=1 350w" sizes="(max-width: 329px) 100vw, 329px" /></p>
<p>While some of our Texas friends and neighbors began trickling back to their water-logged homes and businesses this week, others who have weathered the storm are just starting their evacuation journey as the continued rain, Harvey&#8217;s second landfall, and flooding from overflowing reservoirs continue to wreak havoc.  Our thoughts and prayers go out to each of you.</p>
<p>Online resources abound for everything from insurance filing to accessing your personal health records. Here are a few we thought would be most helpful to our readers:</p>
<p style="padding-left: 30px;"><span style="color: #000080;"><a href="https://www.disasterassistance.gov/"><strong><span style="color: #000080;">DisasterAssistance.gov</span> </strong></a></span> is a disaster information clearinghouse, includes everything from instructions for filing a National Flood Insurance Program claim to links to other government resources that offer aid with food, housing, legal issues, loans &#8211; and even career development for those suffering loss of livelihood.</p>
<p style="padding-left: 30px;"><span style="color: #000080;"><a href="https://www.texmed.org/Disaster/"><strong><span style="color: #000080;">TMA – Texas Medical Association</span></strong></a></span> provides resources specific to physician practices, such as news about the impact on MIPS reporting and state waivers of some health insurance rules, as well as public health precautions.</p>
<p style="padding-left: 30px;"><a href="https://www.sba.gov/offices/disaster/dapdc"><strong><span style="color: #000080;">Small Business Association</span></strong></a> site includes information on Disaster Loans and links to other government sites with particular emphasis on the needs of businesses.</p>
<p>We wish you all the best on the long journey ahead and will continue to share any information we believe could be helpful to those reconstructing their lives and businesses.</p>
<p><a href="https://thirdrock.com/about/team/">The Third Rock Team</a></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/08/31/picking-up-the-pieces-after-hurricane-harvey/">Picking up the pieces after Hurricane Harvey</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4406</post-id>	</item>
		<item>
		<title>Flooding: Are You Prepared?</title>
		<link>https://thirdrock.com/blog/2017/08/25/flooding-are-you-prepared/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 25 Aug 2017 12:03:08 +0000</pubDate>
				<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Project Management]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4346</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/08/25/flooding-are-you-prepared/">Flooding: Are You Prepared?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" decoding="async" class="alignleft wp-image-4355 " style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/man-sitting-on-roof-in-flood-cartoon.jpg?resize=198%2C174&#038;ssl=1" alt="" width="198" height="174" /><span style="font-size: 12px;"></span></p>
<p><span style="font-size: 12px;">Here in Texas, the Gulf Coast is about to take a direct hit from a hurricane that is expected to dump up to 30 inches of rain in some locations and up to 10 inches across large areas. That kind of rain will definitely cause serious flooding.  It&#8217;s a little late for the Texas coastal bend area and the large inland areas that will be hit the hardest to take planning steps for disaster recovery. They&#8217;re in emergency evacuation mode already, protecting life and reducing property damage. What we can learn from these tremendous forces of nature is that disaster recovery needs to be part of all businesses&#8217; Standard Operating Procedures &#8211; including our own.  What does this mean?</span></p>
<ol>
<li>Make sure the backups of your critical data are current &#8211; <em>and can be restored</em>.</li>
<li>Make sure your important equipment &#8211; servers, workstations, laptops, medical equipment, etc. needed to perform regular work &#8211; is protected or stored above flood level.</li>
<li>Have a plan for communicating with co-workers and employees, including a list of phone numbers or a text group set up on your phone in advance.</li>
<li>Have a plan and the phone numbers for communicating with authorities &#8211; e.g. 911, police, fire department, EMS.</li>
<li>Have a plan outlining how to recover the core equipment and personnel necessary to bring your business and services back online.</li>
</ol>
<p><strong>The preferred approach is to create a Disaster Recovery (DR) plan.</strong> These can easily be 50 page documents, so it will take a lot of time and knowledge to create the plan. I would not suggest buying a template &#8211; these are typically instructions for creating a plan, not an actual plan.</p>
<p>To help you get started, here&#8217;s an outline from our own Disaster Recovery Plan.</p>
<p>We include a DR plan with our HIPAA compliance package.  It&#8217;s required by the Federal government, so we help our clients by providing a ready to use DR plan.  You still have to fill in your business&#8217; specific information, but it will reduce your initial creation time by about 70%.</p>
<p>Join our free monthly <a href="http://thirdrock.us3.list-manage2.com/subscribe?u=1649a45c35ac1a873bb99bdb8&amp;id=7d7bf2b255">newsletter</a> to stay up-to-date on HIPAA and cybersecurity.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/08/25/flooding-are-you-prepared/">Flooding: Are You Prepared?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4346</post-id>	</item>
		<item>
		<title>Best Defense Against Ransomware is a Good Backup</title>
		<link>https://thirdrock.com/blog/2017/05/16/best-defense-against-ransomware-is-a-good-backup/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Tue, 16 May 2017 07:00:00 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[backup & recovery]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3764</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/05/16/best-defense-against-ransomware-is-a-good-backup/">Best Defense Against Ransomware is a Good Backup</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3765" style="margin-right: 10px; margin-top: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/wannacry_05-300x227.png?resize=275%2C208&#038;ssl=1" alt="" width="275" height="208" /></p>
<p>By now, most have heard or been affected by the WannaCry ransomware that has spread to over 150 countries at last count.</p>
<p>The WannaCry ransomware started taking over users&#8217; files on Friday, demanding $300 to restore access.</p>
<p>Hundreds of thousands of computers have been affected so far. Computer giant Microsoft said the attack should serve as a wake-up call.</p>
<p>The first line of defense in this is always having a <strong><em>properly maintained firewall</em></strong> both on your network and on each individual computer system. However, as we all know, your network can and will be breached at some point, whether or not it is due to WannaCry or some other ransomware or virus; it will happen.</p>
<p><strong>What is the best defense against ransomware and other malware?</strong></p>
<p><em><strong>A good backup!</strong></em></p>
<p>It sounds simple, but amazingly most either are not doing backups or not verifying that the backup works. I worked with an organization that had been backing up for several years, but had never tested restoring the files. Well, they got hit with a bad virus, and it was determined that restoring the previous day&#8217;s backup would be the best way to recover. Unfortunately, the backup was corrupted and would not work. We went back to previous days and weeks, and <em>none</em> of their backups were good.</p>
<p>Having a backup is not good for anything if you can&#8217;t actually recover the data when you need it.</p>
<ol>
<li> To get started, <em><strong>investigate business level backup systems</strong></em> that will work in your environment. It truly is a case by case basis on which backup system is right for your organization; depending on size, speed, hours, etc.</li>
<li><strong><em>Schedule restore tests</em></strong> on a regular basis to make sure that you have a valid backup that you can recover from in the case of an attack.</li>
<li><strong><em>Maintain the backup system</em></strong> to ensure that it is considered &#8220;mission critical&#8221; as it is the last line of defense for your entire business.</li>
</ol>
<p><strong>Bottom line:  Stay ahead of ransomware by maintaining complete, working backups!</strong></p>
<p>For questions about how to evaluate and improve your own backup practices or for a comprehensive Security Risk Assessment, contact us at info@ThirdRock.com.</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/05/16/best-defense-against-ransomware-is-a-good-backup/">Best Defense Against Ransomware is a Good Backup</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3764</post-id>	</item>
		<item>
		<title>Healthcare under attack by new strain of ransomware</title>
		<link>https://thirdrock.com/blog/2016/09/13/healthcare-under-attack-by-new-strain-of-ransomware/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 13 Sep 2016 14:00:12 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber criminals]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[Cyber-threats]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2182</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/09/13/healthcare-under-attack-by-new-strain-of-ransomware/">Healthcare under attack by new strain of ransomware</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>FireEye Labs has identified massive email campaigns by cyber-criminals during Aug, 2016 containing the Locky ransomware embedded in DOCM attachments.  DOCM is Open XML Macro-Enabled Document file used in Microsoft Word.  Which means the file contains a macro which MS Word will execute when you open the file in MS Word.  Healthcare is the leading industry targeted by the campaign.</p>
<p>The healthcare industry is now the &#8220;industry of choice&#8221; by cyber-criminals since Protected Health Information (PHI/ePHI) is worth hundreds of dollars per complete record and it&#8217;s vital to provide care to patients.  Cyber-criminals once chased credit cards because stealing the credit card record was fairly easy and selling the stolen records on the dark web was simple and profitable.  Then they moved on to PHI records because it was worth so much more on the dark web.  But, cyber-criminals have been moving to ransomware because it garners immediate payment from the victims.</p>
<p>There have been a lot of blogs about ransomware hitting large hospitals or healthcare providers.  That&#8217;s true, but cyber-criminals don&#8217;t care how big you are, they know all healthcare is a prime target that will pay.  If you&#8217;re a single doctor&#8217;s office, a chiropractic, optometrist office, therapist, physician or surgeon your practice is a target.  It&#8217;s important to take action now and protect your PHI.</p>
<p><a title="View all entries filed under 'Fireeye - Authors : Ronghwa Chong'" href="https://www.fireeye.com/blog/threat-research.html/category/etc/tags/fireeye-blog-authors/cap-ronghwa-chong">Ronghwa Chong</a> of FireEye Labs wraps up his report with &#8220;These latest campaigns are a reminder that users must be cautious when it comes to opening attachments in emails or they run the risk of becoming infected and possibly disrupting business operations.&#8221;  If you&#8217;re not prepared to recover from ransomware, it can even cause severe cash flow interruption, loss of revenue and potentially impact healthcare services to your patients.  Make sure you have a disaster recovery plan in place and your backups are secure and usable.</p>
<p><strong>Plan of Action</strong></p>
<ol style="padding-left: 1em;">
<li style="text-indent: -1em;">Admit your healthcare business is a target of cyber-criminals.</li>
<li style="text-indent: -1em;">Make sure your backups are current, working, secure and a full restore works.  <strong>TEST THAT YOU CAN RESTORE FROM BACKUPS.</strong></li>
<li style="text-indent: -1em;">Understand that you (the owner, the doctor, compliance officer, and/or the office manager may be charged and jailed for HIPAA non-compliance.)</li>
<li style="text-indent: -1em;">Understand that even with improved cyber-defenses you&#8217;re likely to experience a breach.</li>
<li style="text-indent: -1em;">Improve your cyber defenses to prevent a breach.</li>
<li style="text-indent: -1em;">Create a breach notification plan to guide you in the event of a breach &#8211; which is highly likely.</li>
<li style="text-indent: -1em;">Work to become HIPAA compliant.
<ol style="padding-left: 1em;">
<li style="text-indent: -1em;">Perform a risk assessment (security risk analysis).</li>
<li style="text-indent: -1em;">Work on the list of corrective actions identified in the risk assessment.
<ol style="padding-left: 1em;">
<li style="text-indent: -1em;">This should include improving the cyber-security of your computers and network and training of staff.</li>
</ol>
</li>
<li style="text-indent: -1em;">Have the entire staff take HIPAA training that includes cyber-security.</li>
<li style="text-indent: -1em;">Implement HIPAA policies and procedures for your business.</li>
</ol>
</li>
</ol>
<p>Take our <a href="https://hipaa-quickcheck.com">Free risk assessment </a>to find out what you need to do to protect your PHI and work towards HIPAA compliance.</p>
<p><strong><span style="color: #0000ff;">Protect your patients, protect your practice, protect yourself.</span></strong></p>
<p><a href="https://www.fireeye.com/blog/threat-research/2016/08/locky_ransomwaredis.html">Read the FireEye Labs report</a>.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/09/13/healthcare-under-attack-by-new-strain-of-ransomware/">Healthcare under attack by new strain of ransomware</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2182</post-id>	</item>
		<item>
		<title>HHS Releases New Guidance on Ransomware</title>
		<link>https://thirdrock.com/blog/2016/07/26/hhs-releases-new-guidance-on-ransomware/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 26 Jul 2016 14:00:03 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[backup & recovery]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[contingency plan]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1922</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/07/26/hhs-releases-new-guidance-on-ransomware/">HHS Releases New Guidance on Ransomware</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>One of the top news makers of 2016 has been ransomware. During the first half of this year, ransomware grew 300% to 4,000 daily attacks! But several high profile attacks of hospitals really put it in the spotlight.  Although it has been around for several decades, in the past 4 years, Russian groups have further developed its capabilities and propagated its use worldwide. The dark web or darknet also significantly contributed to the increase in ransomware attacks due to its black market for such products.</p>
<p>It is typically delivered as a Trojan; that is it looks like a legitimate product or download, but in reality it is malware.  It can be delivered encrypted so your antivirus software cannot detect it.  Once on your network, it seeks your data and encrypts it so you cannot access it.  Some recent versions encrypt your on-line backups first, then attack your active files to further increase the chance of you paying the ransom.  Once your data is encrypted, a message will appear directing payment, usually in digital currency like Bitcoin.  The FBI has established that specific versions of ransomware have netted their organizations at least $30 million, so if you are a victim, you can expect to see significant ransom demands.  If their demands are met, the criminals say they will send you the key to decrypt your data.  Numerous instances have been recorded where ransoms were paid and the key was not provided, and data is often stolen to further the culprit’s profits.</p>
<p>That is why Health and Human Services (HHS) has recently issued a new guidance on ransomware.  The Guidance can be found at: <a href="http://www.hhs.gov/blog/2016/07/11/your-money-or-your-phi.html#" target="_blank" rel="noopener noreferrer">http://www.hhs.gov/blog/2016/07/11/your-money-or-your-phi.html</a>  and the Fact Sheet: <a href="http://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf">http://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf</a></p>
<p>If you are the victim of ransomware, you will need to implement your contingency plan and rebuild your IT systems using your backups.  Not nearly as trivial as the sentence implies! Do you have a contingency plan?  If so, is it current?  What about your backups?  When is the last time they were tested, that means a full restore from the backup media?  This is why practices are so vulnerable to ransomware and criminals can reap tens of millions of dollars.  Take a hard look at your situation.  Be realistic and get help if you are not prepared.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/07/26/hhs-releases-new-guidance-on-ransomware/">HHS Releases New Guidance on Ransomware</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1922</post-id>	</item>
		<item>
		<title>Focus on Security: Backups &#8211; The Ultimate Cyber-Security Weapon</title>
		<link>https://thirdrock.com/blog/2016/05/05/focus-on-security-backups-the-ultimate-security/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 05 May 2016 14:00:46 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[backup & recovery]]></category>
		<category><![CDATA[Business Associates]]></category>
		<category><![CDATA[covered entities]]></category>
		<category><![CDATA[cyber criminals]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[Cyber-threats]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1452</guid>

					<description><![CDATA[<p>Backups, we all believe and trust they are being performed regularly and will work if we ever need to restore our business after a natural disaster, malicious attack or cyber-attack, [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2016/05/05/focus-on-security-backups-the-ultimate-security/">Focus on Security: Backups &#8211; The Ultimate Cyber-Security Weapon</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-1480 alignleft" style="margin-top: 8px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Data-Backup.-Magnifying-Glass-on-Old-Paper-with-Red-Vertical-Line..jpg?resize=208%2C156&#038;ssl=1" alt="Data Backup. Magnifying Glass on Old Paper with Red Vertical Line." width="208" height="156"></p>
<p>Backups, we all believe and trust they are being performed regularly and will work if we ever need to restore our business after a natural disaster, malicious attack or cyber-attack, such as ransom-ware. &nbsp;The reality is backups are not historically reliable and they become out of sight, out of mind! &nbsp;You need to ensure&nbsp;they are being performed regularly and restoring from the backup media works. ePHI data is highly desirable by criminals because it is worth far more than credit card information on the black market. Because of its value, Covered Entities and Business Associates are now the targets of cyber criminals. With ransomware on a rampage and breaches highly likely, now is the time to take action.</p>
<p>Backups are the ultimate digital security or at least the first priority.</p>
<ol>
<li>Backups protect you from data loss and potential business ruin.
<ul style="margin-left: 15px;">
<li>because of natural disasters</li>
<li>because of human mistakes or malicious acts</li>
<li>because of criminal acts such as ransomware or destructive malware.</li>
</ul>
</li>
<li>They do NOT however, protect you from data theft.
<ul style="margin-left: 15px;">
<li>You still need to take steps to secure your data.</li>
<li>Consider encryption at rest and in motion.</li>
<li>Implement a security plan that includes anti-virus, firewalls, password management, education, HIPAA compliance testing, Vulnerability testing and File Integrity Monitoring.</li>
</ul>
</li>
</ol>
<p>&nbsp;</p>
<p>Steps to a safer more secure data life.</p>
<ol>
<li>Perform backups on a regular schedule; nightly, weekly, monthly and quarterly.</li>
<li>Ensure the backups are stored in a safe and secure location, whether it&#8217;s physical media or offsite or cloud based.
<ul style="margin-left: 15px;">
<li>Do NOT store physical media near heat, water, sunlight or magnetic fields.<img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-1479 alignright" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Data-Encryption-Red-over-white-Text-c655360_s.jpg?resize=220%2C165&#038;ssl=1" alt="Data Encryption Concept. The Word of Red Color Located over Text of White Color." width="220" height="165"></li>
<li>Do NOT store data offline or in the cloud without good encryption.</li>
<li>Redundant cloud storage is the most reliable media.</li>
</ul>
</li>
<li>Verify the correct data is being backed up.</li>
<li>Encrypt the backed up data with at least 128&nbsp;bit encryption, but 256 bit would be better.Verify the backed up data can be restored and used.</li>
<li>Check your backup reports daily to make sure the backup worked.</li>
</ol>
<p>Hope this helps ensure you protect your patients, your practice and yourself.</p>
<p>The post <a href="https://thirdrock.com/blog/2016/05/05/focus-on-security-backups-the-ultimate-security/">Focus on Security: Backups &#8211; The Ultimate Cyber-Security Weapon</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1452</post-id>	</item>
		<item>
		<title>After the Risk Assessment, Then What? How Often Do I Need to Check?</title>
		<link>https://thirdrock.com/blog/2016/02/16/after-the-risk-assessment-then-what-how-often-do-i-need-to-check/</link>
		
		<dc:creator><![CDATA[Gordon Taylor]]></dc:creator>
		<pubDate>Tue, 16 Feb 2016 15:00:59 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[contingency plan]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[disaster recovery plan]]></category>
		<category><![CDATA[emergency response plan]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1286</guid>

					<description><![CDATA[<p>As we noted previously, there are numerous requirements for HIPAA compliance.  A follow-up question often heard is “How often do I have to do these things?” Risk assessments officially need [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2016/02/16/after-the-risk-assessment-then-what-how-often-do-i-need-to-check/">After the Risk Assessment, Then What? How Often Do I Need to Check?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As we noted <a href="http://thirdrock.com/blog/2016/01/22/hipaa-compliance-after-the-risk-assessment-then-what-data-protections/">previously</a>, there are numerous requirements for HIPAA compliance.  A follow-up question often heard is “How often do I have to do these things?”</p>
<p>Risk assessments officially need to be performed on an annual basis but regularly reviewing your risk remediation plan throughout the year is a business “best practice” for any organization.</p>
<p>Policies and Procedures need to be reviewed and changed depending upon federal law changes and changes in your organization.  New processes, new technologies, new locations may require revisions to your Policies and Procedures.</p>
<p>Monitoring of your networks and equipment needs to be done at least weekly for most organizations.  Any aberrations or irregularities in system configurations or file integrity identified in your networks or equipment should be addressed immediately.  Additionally, an inventory of your networks and equipment should be done at least annually with quarterly updates or after major IT procurements.</p>
<p>Privacy and security training should be done at least annually for all staff and with all new hires.  Any changes to the organization should be accompanied by refresher classes.  New employees need to be HIPAA trained within 30 Days.</p>
<p>Contingency plans should be reviewed annually, making sure plans and options for data back-up, disaster recovery, and emergency mode operation are all still viable strategies for the organization in the event of an interruption to the normal course of operations.</p>
<p>If you are interested in knowing where to start, try Third Rock’s <em><a href="http://cyberquickcheck.com">HIPAA Quick-Check</a></em>, This is a mini-risk assessment that will let you know very quickly your level of HIPAA compliance regarding the major areas of HIPAA(annual risk assessments, training, current policies and procedures, contingency plans, encryption of data, continuous monitoring of devices, etc.).  Remember, this is not a full risk assessment; it is just a <em>Quick-Check</em><sup>™</sup>.</p>
<p>Articles in the series:</p>
<ol>
<li><a href="http://thirdrock.com/blog/2015/11/12/hipaa-compliance-how-to-get-started/">How to get Started: Risk Assessment</a></li>
<li><a href="http://thirdrock.com/blog/2015/12/03/hipaa-compliance-after-the-risk-assessment-then-what-breach-detection/">Breach Detection</a></li>
<li><a href="http://thirdrock.com/blog/2016/01/07/hipaa-compliance-after-the-risk-assessment-then-what-hipaa-education/">Education</a></li>
<li><a href="http://thirdrock.com/blog/2016/01/22/hipaa-compliance-after-the-risk-assessment-then-what-data-protections/">Data Protections</a></li>
<li>Planning for Emergency Events</li>
<li>How Often Do I Need to Check? (This Article)</li>
</ol>
<p>Sign up for our <a href="https://visitor.r20.constantcontact.com/d.jsp?llr=v5sl766ab&amp;p=oi&amp;m=1131652959189&amp;sit=ngpsxi6mb&amp;f=14fea7b9-805f-4905-9999-3718234e4f7f">newsletter</a> on the right side of this page to learn more and stay informed about HIPAA and cyber security.</p>
<p>The post <a href="https://thirdrock.com/blog/2016/02/16/after-the-risk-assessment-then-what-how-often-do-i-need-to-check/">After the Risk Assessment, Then What? How Often Do I Need to Check?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1286</post-id>	</item>
		<item>
		<title>After the Risk Assessment, Then What? Planning for Emergency Events</title>
		<link>https://thirdrock.com/blog/2016/02/12/after-the-risk-assessment-then-what-planning-for-emergency-events/</link>
		
		<dc:creator><![CDATA[Gordon Taylor]]></dc:creator>
		<pubDate>Fri, 12 Feb 2016 14:45:13 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[contingency plan]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[disaster recovery plan]]></category>
		<category><![CDATA[emergency response plan]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1282</guid>

					<description><![CDATA[<p>As we noted previously, there are numerous requirements for HIPAA compliance.  Being prepared for future emergency events is often identified in the Risk Assessment as a HIPAA compliance requirement that [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2016/02/12/after-the-risk-assessment-then-what-planning-for-emergency-events/">After the Risk Assessment, Then What? Planning for Emergency Events</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As we noted <a href="http://thirdrock.com/blog/2016/01/22/hipaa-compliance-after-the-risk-assessment-then-what-data-protections/">previously</a>, there are numerous requirements for HIPAA compliance.  Being prepared for future emergency events is often identified in the Risk Assessment as a HIPAA compliance requirement that needs to be addressed.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class=" wp-image-197 alignleft" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/2014/03/disaster_ahead_200.jpg?resize=247%2C185&#038;ssl=1" alt="Disaster Ahead" width="247" height="185" />Preparing for future events is often overlooked by many healthcare entities.  Just dealing with the issues of the day can take up the majority of your time.  However, being prepared for future events, besides being a HIPAA requirement, also makes good business sense.</p>
<p>What HIPAA calls “Contingency Planning” is what most businesses call “business continuity/disaster recovery.”  Continued daily operations – data back-up, disaster recovery, and emergency mode operation are all required by HIPAA.  The testing of these contingency plans is highly recommended.  All of these are elements of business continuity/disaster recovery.</p>
<p>Planning for unexpected, natural or man-made disasters, allows your business to be prepared for such potential events.  Other things to consider include:</p>
<ul>
<li>Emergency Plans vs. Disaster Recovery Plans</li>
<li>Remote collocations make life easier.</li>
<li>The cloud makes data storage easier.</li>
<li>Move to secure, encrypted local, remote (co-lo) and cloud backups.</li>
<li>Have a diagram of the top two tiers of applications, the servers, and networks to recover them.</li>
<li>Auto failover simplifies testing, just fail over quarterly to your backup location.</li>
</ul>
<p>With high-speed networks, remote locations, co-location data centers, and cloud services – it is now far easier to plan for disaster recovery as you roll-out new hardware and services.</p>
<p>In addition to Contingency Planning, <strong>Breach Awareness/Notification Planning</strong> needs to be in place as well.  In the event of a data breach involving unsecured PHI, there are requirements regarding</p>
<ul>
<li>the notification of individuals whose PHI has been breached,</li>
<li>time frames for such notification,</li>
<li>manner of notification,</li>
<li>and content of information contained in the notification.</li>
<li>If the breach involved more than 500 individuals in one state, notices to the media are required.</li>
<li>In most cases, notification to the federal Department of Health and Human Services (HHS)  is required.</li>
</ul>
<p>Having a plan in place ahead of time to address all of these requirements is essential to a healthcare entity.  Here&#8217;s an outline from our Disaster Recovery Plan to help you get started.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-full wp-image-367" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/BCDR_Plan_Diagram.png?resize=588%2C583&#038;ssl=1" alt="BCDR_Plan_Diagram" width="588" height="583" /></p>
<p>If you are interested in knowing where to start, try Third Rock’s <em><a href="http://cyberquickcheck.com">HIPAA Quick-Check</a></em>, This is a mini-risk assessment that will let you know very quickly your level of HIPAA compliance regarding the major areas of HIPAA(annual risk assessments, training, current policies and procedures, contingency plans, encryption of data, continuous monitoring of devices, etc.).  Remember, this is not a full risk assessment; it is just a <em>Quick-Check</em><sup>™</sup>.</p>
<p>Articles in the series:</p>
<ol>
<li><a href="http://thirdrock.com/blog/2015/11/12/hipaa-compliance-how-to-get-started/">How to get Started: Risk Assessment</a></li>
<li><a href="http://thirdrock.com/blog/2015/12/03/hipaa-compliance-after-the-risk-assessment-then-what-breach-detection/">Breach Detection</a></li>
<li><a href="http://thirdrock.com/blog/2016/01/07/hipaa-compliance-after-the-risk-assessment-then-what-hipaa-education/">Education</a></li>
<li><a href="http://thirdrock.com/blog/2016/01/22/hipaa-compliance-after-the-risk-assessment-then-what-data-protections/">Data Protections</a></li>
<li>Planning for Emergency Events (This Article)</li>
</ol>
<p>Sign up for our <a href="https://visitor.r20.constantcontact.com/d.jsp?llr=v5sl766ab&amp;p=oi&amp;m=1131652959189&amp;sit=ngpsxi6mb&amp;f=14fea7b9-805f-4905-9999-3718234e4f7f">newsletter</a> on the right side of this page to learn more and stay informed about HIPAA and cyber security.</p>
<p>The post <a href="https://thirdrock.com/blog/2016/02/12/after-the-risk-assessment-then-what-planning-for-emergency-events/">After the Risk Assessment, Then What? Planning for Emergency Events</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1282</post-id>	</item>
		<item>
		<title>Road Blocks to Creating Your Contingency Plan</title>
		<link>https://thirdrock.com/blog/2014/11/25/road-blocks-to-creating-your-contingency-plan/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 25 Nov 2014 19:49:33 +0000</pubDate>
				<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[application impact analysis]]></category>
		<category><![CDATA[backup & recovery]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[business impact analysis]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[contingency plan]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[disruptive action]]></category>
		<category><![CDATA[project management]]></category>
		<category><![CDATA[stakeholders]]></category>
		<category><![CDATA[strategy]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=365</guid>

					<description><![CDATA[<p>Why Everyone Needs Help Creating a BC/DR (Contingency) Plan Creating a contingency plan is a huge undertaking.  It’s a major project for any company, small or large.  It’s a major [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2014/11/25/road-blocks-to-creating-your-contingency-plan/">Road Blocks to Creating Your Contingency Plan</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Why Everyone Needs Help Creating a BC/DR (Contingency) Plan</h2>
<p>Creating a contingency plan is a huge undertaking.  It’s a major project for any company, small or large.  It’s a major project for any company, small or large; an integration effort which requires a large amount of time from experts across the company and often outside the company, including executives, managers, staff, vendors and consultants.</p>
<p>While creating a contingency plan for a large health care provider I realized part of the problem is psychological.  The decision makers were struggling to start the project, even though they clearly understood the need to have a contingency plan. Just like understanding the 5 stages of grief helps us deal with a significant loss in our lives, I thought maybe a list of the road blocks would help &#8220;step&#8221; leaders and team members through their reluctance of creating a contingency plan.  Maybe I should rename this &#8220;The Five Stages of Contingency Planning Procrastination&#8221;.</p>
<p>Based on my observations, here are the top road blocks to creating a contingency plan.</p>
<ol>
<li>We are forced to face the reality of a crisis or disruptive action in our lives.
<ol>
<li>Pulling our heads out of the sand is scary.</li>
<li>It forces the issue of death; ours, people we care for and our business/livelihood.</li>
<li>Swift massive disruptions in our lives are frightening.</li>
</ol>
</li>
<li>It is a large complex integration effort that requires substantial resources.
<ol>
<li>Which means it is difficult to organize.</li>
<li>The all-encompassing aspect makes it difficult to get our arms and head around it.</li>
<li>Therefore we are not confident of the amount of effort and time required.</li>
<li>We must admit we can’t do it alone.</li>
<li>We often have to seek and find expert advice and assistance.</li>
</ol>
</li>
<li>It incites holistic confusion.
<ol>
<li>We don’t know where to start.</li>
<li>We don’t know what we don’t know.</li>
</ol>
</li>
<li>Difficult to justify until there is a disruptive event.
<ol>
<li>By documenting policies and procedures, utilizing technology that simplifies operations and recovery, and prioritizing what&#8217;s important to keep the doors open, we actually improve daily operations.</li>
<li>We don&#8217;t recognize that the process of creating a contingency plan forces us to review and improve the company’s strategy and operations to improve overall company performance.</li>
</ol>
</li>
<li>It is an insurance policy, and we all love to buy insurance!
<ol>
<li>Insurance as a “necessary evil” and we tend to procrastinate buying it because “I am reliable and careful”.</li>
<li>Why waste time on something we may never use.</li>
</ol>
</li>
</ol>
<p>If you don&#8217;t have a contingency plan for your business, you should start now.  Here&#8217;s a simple outline to help you get started.</p>
<h3>Plan Outline</h3>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft size-full wp-image-529" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/BCDR_Plan_Diagram1.png?resize=588%2C583" alt="BCDR_Plan_Diagram" width="588" height="583" /></p>
<div style="clear: both;"></div>
<p>Robert Felps has created business continuity and disaster recovery plans (contingency plans) for single doctor healthcare practices to multi-billion dollar healthcare companies.  His latest effort has been a ready to use Contingency Plan for the healthcare industry.  It is a plan that takes about 16 hours to update and be usable, as opposed to the standard 140+ hours to create a plan yourself starting with a template.  For more details visit Third Rock&#8217;s BC/DR page or contact Third Rock at <a href="mailto:info@thirdrock.com">info@thirdrock.com</a>.</p>
<p>The post <a href="https://thirdrock.com/blog/2014/11/25/road-blocks-to-creating-your-contingency-plan/">Road Blocks to Creating Your Contingency Plan</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">365</post-id>	</item>
		<item>
		<title>Outgrowing the “As Needed” Technology</title>
		<link>https://thirdrock.com/blog/2014/04/10/outgrowing-the-as-needed-technology/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Fri, 11 Apr 2014 00:38:12 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[business assessments]]></category>
		<category><![CDATA[planning]]></category>
		<category><![CDATA[strategy]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=227</guid>

					<description><![CDATA[<p>All organizations have been there, that start-up company that is more worried about making a profit than what its technology plan is for the next year, let alone three plus [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2014/04/10/outgrowing-the-as-needed-technology/">Outgrowing the “As Needed” Technology</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/2014/04/hand_money_300x200.jpg"><img data-recalc-dims="1" loading="lazy" decoding="async" class="size-full wp-image-228 alignright" style="margin-top: 10px; margin-bottom: 10px;" alt="hand_money_300x200" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/2014/04/hand_money_300x200.jpg?resize=300%2C200" width="300" height="200"></a>All organizations have been there, that start-up company that is more worried about making a profit than what its technology plan is for the next year, let alone three plus years. When you are a small company with a few employees or maybe even just yourself, it is easy to get in to the routine of simply grabbing a solution to fit the need you have at that moment.</p>
<p>Honestly, there is no reason to even try to change someone’s mind that is going about their technology purchases in an “as needed” basis. Sure it is nice to be able to plan something and get a budget ready to support the business, but that is not feasible because as anyone who has started a business knows, that “business plan” changes daily if not hourly early on, as does the tools that you need to support those changes.</p>
<p>Not to mention when you are starting a business, you are not always in the position to have a “budget” for long term technology plans.</p>
<h3>Where Things Go Wrong</h3>
<p>The issue is not starting out in the “as needed” mode it is getting into the “strategic” mode to where your technology matches your business needs, not to mention many other concerns.</p>
<p>When your organization went out and grabbed software, networking gear, hardware, etc. most likely there was little concern in…</p>
<ul>
<li>Security</li>
<li>Scaling to fit growth</li>
<li>Compliance</li>
<li>Availability</li>
<li>Disaster Recovery</li>
<li>Right tool for the job</li>
<li>Team (access, sharing)</li>
<li>…and much more</li>
</ul>
<p>The problem is not “just” that those areas may not have been the “right fit” it how do you move from the “as needed” platform to where you need to be? It is not always a simple rip and replace. Obviously, you want to avoid costing downtime for your team which costs your productivity and ultimately your bottom line.</p>
<p>There has to be a plan to not only find the right tools for your organization, but how to get there with the minimal impact on your business.</p>
<h3>“IT” Technology is a Business Decision</h3>
<p>A lot of organizations moving from that small business into medium sized organizations and even enterprises often make the mistake of thinking that technology decisions should be taken care of by the “IT” department and in some cases that department is an “IT Guy”. That generally will get you just a step beyond the “as needed” IT and into a “what did we get?” solutions.</p>
<p>Business technology has to be a business decision and planned as any other area of business would be planned.</p>
<h4>Business Impacts</h4>
<ul>
<li>Budget &#8211; Technology can have a negative impact that can really grow if you get the wrong solutions.</li>
<li>Efficiency – The right solution can increase you productivity and actually contribute to your business growth. The wrong technology can stunt your business growth.</li>
<li>Compliance – Your CFO will thank you for making sure that all your data and technology is compliant to the standards. Nothing like shelling out 100’s of $1000 for not being compliant. This is becoming a huge focus through-out the industry after major breaches like, Target.</li>
<li>Business Continuity – How long can your business last if a key technology that your business relies on? Making sure that you can recover from a disaster before your business goes “out of business” is one of those things that is a bit critical.</li>
</ul>
<h3>Don’t Think “I can’t afford it, RIGHT NOW”</h3>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright size-full wp-image-229" style="margin-right: 10px; margin-left: 10px;" alt="strategy_head_300x225" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/2014/04/strategy_head_300x225.jpg?resize=300%2C225" width="300" height="225">Many growing organizations feel they can’t afford a big change in their technology infrastructure right now. No one is saying that you have to do it all right now. That is not always feasible. However it is important to change how you do things.</p>
<p>Before going and getting that next “as needed” piece of technology, sit down with your executive team and either your in-house IT “guy” whether it be a CIO/CTO, Architect, etc. or a Solutions Architect Consultant.</p>
<p>Now you can put a plan in place to get on the right track, discuss what technology will best fit your business, stay within a budget (and what that budget is), and <strong>keep your business IN BUSINESS!</strong></p>
<p>The post <a href="https://thirdrock.com/blog/2014/04/10/outgrowing-the-as-needed-technology/">Outgrowing the “As Needed” Technology</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">227</post-id>	</item>
	</channel>
</rss>
