<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Focus on Security Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/focus-on-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/focus-on-security/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Tue, 26 Nov 2019 15:21:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Focus on Security Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/focus-on-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Travel Cyber Safe</title>
		<link>https://thirdrock.com/blog/2019/11/26/travel-cyber-safe/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Tue, 26 Nov 2019 15:21:23 +0000</pubDate>
				<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[juice jacking]]></category>
		<category><![CDATA[travel]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8689</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/11/26/travel-cyber-safe/">Travel Cyber Safe</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><!-- divi:paragraph --></p>
<p>The holidays get busy. Traveling is stressful and we aren’t always as vigilant as we should be. In today’s world of data breaches, identity theft and cybercrime, there are many things we know to be cautious about. You wouldn’t give away your credit card number or let a stranger have access to your driver’s license. But are cyber safe with your phone? We have become so dependent on our phones to store sensitive and private data. Sometimes forget that we need to protect it too.</p>
<h2><!-- /divi:paragraph --> <!-- divi:paragraph -->Let’s take a look at a scenario that could happen to any of us:</h2>
<p><!-- /divi:paragraph --></p>
<p><span style="font-size: 14px;"><em>T</em></span><em style="font-size: 14px;">he morning was a rush and you made it to the airport on time, thankfully. After getting through security, there is a little time to breath. You grab some coffee, check your phone and realize you forgot to charge it. Ugh. Your phone needs to be charged to last the whole flight and still have juice when you land. You notice a charging station near your gate. There are even cords already plugged in, so you don’t have to dig yours out of your mess of a bag. Score!</em></p>
<p><!-- /divi:paragraph --><!-- divi:paragraph --></p>
<p>You may not be as lucky as you feel. Cyber criminals are taking advantage of how dependent we are on our devices and their need to be charged. This new scam, known as “juice jacking” takes advantage of your connection to your phone.</p>
<p><strong style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">How does it work?</strong></p>
<p><span style="font-size: 14px;">Phone cords are designed for 2-way communication. Data can come in, but data also goes out. This can be seen every time you attach an iPhone to your computer and iTunes wants to download your data. Convenient when you want it, but bad when the criminals want it. Criminals download malware into the charging station or physically alter the charging station installing a cable connected to a virus laden device, and wait until you connect. They then have access to everything on your phone. What do you keep saved?</span></p>
<ul>
<li>Passwords?</li>
<li>Credit card information?</li>
<li>Communications?</li>
<li>Photos?</li>
</ul>
<p><span style="font-size: 14px;">Depending on the malware, they could download your data or install malware on your phone that will continue to monitor your usage. They might even lock you out of your phone completely. The biggest concern; you may never know. A week later you’re seeing fraudulent charges on an account and trying to figure out what happened. This is very similar to the card skimmers installed at gas stations.</span></p>
<p><strong style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">What can you do?</strong></p>
<p><span style="font-size: 14px;">Thankfully there are easy ways to avoid this scam.</span></p>
<ul>
<li>Use your own AC adapter and cord</li>
<li>Plug into a wall outlet, not a charging station</li>
<li>Use a “charge only” cord at a charging station</li>
<li>Use personal car chargers</li>
<li>Use a portable charger</li>
</ul>
<p> <strong style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">Be cyber safe this holiday season</strong></p>
<p><!-- divi:paragraph --></p>
<p>Physical security is important and easy to remember. We see our wallet; we protect our wallet. This holiday season, let’s also remember our cyber safety.<span style="font-size: 14px;"> </span></p>
<hr class="wp-block-separator" />
<p>&nbsp;</p>
<p><!-- /divi:separator --></p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/11/26/travel-cyber-safe/">Travel Cyber Safe</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8689</post-id>	</item>
		<item>
		<title>IT Responsibly: Defend your Territory</title>
		<link>https://thirdrock.com/blog/2019/10/18/it-responsibly-defend-your-territory/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Fri, 18 Oct 2019 14:00:28 +0000</pubDate>
				<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[CyberAware]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8628</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/10/18/it-responsibly-defend-your-territory/">IT Responsibly: Defend your Territory</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In the days of old, people built giant walls to defend their land. It was easy to see the invading army approach. Pull up the drawbridge, light the arrows and defend your city. Today, the walls are digital and the invaders are invisible and often robots; sneaking in the back door or under the radar, pretending to be someone we trust or attacking out of nowhere. So how do we defend our territory in a modern technology age?</p>
<p>&nbsp;</p>
<h2><strong><em>Ditch the passwords</em></strong></h2>
<p>Passwords are the first line of defense in protecting your private information. The problem with passwords though is that if you make them strong, they can be hard to remember. And if you follow the sound advice to not use the same password on any site, you may think you have to remember 30 plus long, hard to remember passwords! To this I give you 2 suggestions:</p>
<ol>
<li>Get a password manager – Don’t trust Google to save your passwords. (see previous blog) A password manager is a vault to place all those hard to remember passwords in a secure location. Read Consumer Advocate’s top ten choices in their article <a href="https://www.consumersadvocate.org/password-manager/a/best-password-manager?pd=true&amp;keyword=password%20manager%20reviews&amp;bca_campaignid=333237838&amp;bca_adgroupid=1217159630398009&amp;bca_matchtype=e&amp;bca_network=o&amp;bca_device=c&amp;msclkid=d7d70723a82d13ab59d85abdb5de1bb0&amp;utm_source=bing&amp;utm_medium=cpc&amp;utm_campaign=zh%20Password%20Manager&amp;utm_term=password%20manager%20reviews&amp;utm_content=Password%20Manager%20Reviews" target="_blank" rel="noopener noreferrer">here</a></li>
<li>Use passphrases – Instead of hard to remember letter, number and character combinations, use a full phrase as your password. Pick something you can remember and add modifications to in order to have a unique phrase for different sites. For example, “BobandSusan’sbankaccount!”</li>
</ol>
<p>&nbsp;</p>
<h2><strong><em>Multi-factor Authentication</em></strong></h2>
<p>Requiring 2 forms of verification is becoming a popular and simple way to secure data. Here’s an example one of my money accounts uses. I’m asked for the email, username, or phone number associated with my account. Once entered, I am then asked for a code that will be emailed or texted. This is very easy for me as a user. I don’t have another password to remember, the messages come through quickly and I can access my account. While it’s easy for me, it’s harder for a hacker. Someone would have to be able to access my phone or email to be able to access the original account.</p>
<p>&nbsp;</p>
<h2><strong><em>Recognize Imposters</em></strong></h2>
<p>A popular way for hackers to gain access to your data is called spoofing. They send an email from what appears to be a legitimate company claiming something to try and get you to give over your information. Your account has been compromised: type in your password. You’ve won a gift card: type in your password. You have been locked out: type in your password. We’ve seen suspicious activity: type in your password. You get the idea. Hackers use the logo of a trusted company to put you at ease, but when you click on the link it sends you to a spam site that is gathering your data, not resolving an issue. Here are things to look for:</p>
<ul>
<li>Is this normal behavior for the company in question? If not, don’t trust the link.</li>
<li>Check the email address against valid emails you have received from the company</li>
<li>Look at the link. If you click to a sign in page, check the website address. If you aren’t on the company’s main sign in page, do not put in any information.</li>
<li>When in doubt, go to your account. If you want to check activity, type in the website address you know and sign in that way. Most companies will post the notifications inside your account so you can verify.</li>
</ul></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/10/18/it-responsibly-defend-your-territory/">IT Responsibly: Defend your Territory</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8628</post-id>	</item>
		<item>
		<title>IT Responsibly: Check your settings</title>
		<link>https://thirdrock.com/blog/2019/10/11/it-responsibly-check-your-settings/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Fri, 11 Oct 2019 13:41:58 +0000</pubDate>
				<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[CyberAware]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[NCSAM]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8530</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/10/11/it-responsibly-check-your-settings/">IT Responsibly: Check your settings</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Have you recently purchased a new device? Smart phone, laptop, tablet or even a smart watch? Maybe you just downloaded the latest update to your computer or smart phone. Do you know what it did? Too many times we take for granted the base features technology and updates provide without checking that the privacy settings. Always check the settings represent what is best for you, not what is best for the company.</p>
<h2><strong>Location, Location, Location</strong></h2>
<p>Location services are very helpful. Let’s face it, who pulls out a paper map anymore when your navigation can tell you exactly how to get somewhere? However, your location does not need to be tracked at all times, so you should check the settings on all of your devices. Most apps have the option to only track while in use. When in doubt, it’s better to turn off location tracking until you find you need it. Phones are not the only devices that track location. Be sure to check settings on your laptop, tablets and smart watches.</p>
<p style="padding-left: 30px;"><em>“Checking in” on social media? Publicly announcing your location on a social media platform could potentially be dangerous. You are letting would be thieves and criminals know you are away from home, or informing an unwanted person how to find you.</em></p>
<p>&nbsp;</p>
<h2><strong>Just Click “No”</strong></h2>
<p>Having your passwords saved is extremely convenient, especially if you follow the rule to have different passwords for every site. Google/Chrome wants to automatically save all of these passwords for you which seems very nice of them. The issue is this is not actually secure, especially if you use public WiFi. A hacker could easily write a script to steal the saved data on your computer.</p>
<p style="padding-left: 30px;"><em>Do you do a lot of online shopping? When your browser asks to save your credit card information, be sure to choose “never”. If a hacker can get your passwords, they can also steal your credit card information.</em></p>
<p>&nbsp;</p>
<h2><strong>Public WiFi</strong></h2>
<p>Do you deal with sensitive data for work, bank online or simply enjoy online shopping? Accessing private accounts with private data on public WiFi puts you at extreme risk. It only takes one person with the know-how and malicious intent on the same WiFi to remotely access the information on your computer. Save sensitive work for private networks.</p>
<p style="padding-left: 30px;"><em>If you are a business owner, be sure to have separate WiFi networks for guests, non-sensitive  data and sensitive data. Limit access to the network for sensitive data to those who need access.</em></p>
<p style="padding-left: 30px;"><span style="color: #0000ff;"><em>PRO TIP: Consider using one computer to “surf” the web and one computer to ONLY access sensitive data web sites such as banking, financial services, stock trading, healthcare and insurance.</em></span></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/10/11/it-responsibly-check-your-settings/">IT Responsibly: Check your settings</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8530</post-id>	</item>
		<item>
		<title>BYOD – Do You Know What’s on Your Network?</title>
		<link>https://thirdrock.com/blog/2018/05/20/byod-do-you-know-whats-on-your-network/</link>
		
		<dc:creator><![CDATA[Mike Moran]]></dc:creator>
		<pubDate>Sun, 20 May 2018 19:18:45 +0000</pubDate>
				<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Bring Your Own Device]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[network discovery scan]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5623</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/05/20/byod-do-you-know-whats-on-your-network/">BYOD – Do You Know What’s on Your Network?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" fetchpriority="high" decoding="async" class="wp-image-5632 size-medium alignleft" style="margin-top: 10px; margin-right: 10px; margin-bottom: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_10348_01642.jpg?resize=300%2C200&#038;ssl=1" alt="BYOD | Bring Your Own Device | Cyber Risk Management" width="300" height="200" /></p>
<p>Is your company allowing employees to <em><strong>bring their own devices</strong></em> and use them to log onto the corporate network? If so, do you know what is happening on your network as well as how many devices are on your network?</p>
<p>Recently, I ran a network discovery at a company and found some interesting things. First, I ran the discovery during the &#8220;off hours,&#8221; meaning there should have been no one in the facility and only the automation and security systems operating.  Instead, the scan showed 70 computers, instruments, and printers running on the network.</p>
<p>Next, I ran the same scan during business hours ― full production and full staff &#8211; resulting in 120 devices being found on the network.  What were the additional devices?  Some of the devices were corporate workstations which get turned off overnight, and the remainder of the ‘new’ devices were <strong><em>personal cell phones.</em></strong></p>
<p>Now, depending on how your networks are configured, that might not be a problem. In a properly segmented network, company-owned devices would have their own segment, and employees&#8217; personal cell phones, laptops, and tablets would be on one or more additional segments. In this case, however, the staff members&#8217; devices were also on the production network, introducing significant risk for the organization. Phones are susceptible to all the same types of malware and viruses as computers. Yet, phones and tablets are much less likely to be running anti-anything (e.g., anti-virus, -malware, or -spyware).</p>
<p>Additionally, a lot of cell phones support tethering, which would allow the user to exfiltrate data via the cell phone to another computer, server, or cloud repository without the company being able to detect it.  This would be done by connecting the device to the internal network and then tethering the device to the external network.  Once connected, data can flow both directions, e.g.: Good data (company confidential data) going out and Bad data (viruses, malware, spyware) coming in.  Or worse yet, someone else could establish a presence, which would allow them to attack other companies while disguised as your company or establish a server from which they transmit spam and porn from your network.</p>
<p>The lesson to learn is that things are never as easy or as secure as you think they are. Be diligent about policies, processes, and knowing <em><strong>what</strong></em> should be flowing <em><strong>where</strong></em> on your network.</p>
<p>If you have concerns about your cyber security and would like to improve your cyber confidence and compliance, please contact us at:  <a href="mailto:info@thirdrock.com">info@thirdrock.com</a></p>
<h3 style="text-align: center;"><strong>Building a Cyber Confident</strong>℠<strong> World</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/05/20/byod-do-you-know-whats-on-your-network/">BYOD – Do You Know What’s on Your Network?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5623</post-id>	</item>
		<item>
		<title>MACRA 2017 deadlines are coming. Do you have a Security Risk Assessment scheduled before December 31st?</title>
		<link>https://thirdrock.com/blog/2017/11/02/macra-2017-deadlines-are-coming-do-you-have-a-security-risk-assessment-scheduled-before-december-31st/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Thu, 02 Nov 2017 14:00:41 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA fines]]></category>
		<category><![CDATA[MACRA]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4763</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/11/02/macra-2017-deadlines-are-coming-do-you-have-a-security-risk-assessment-scheduled-before-december-31st/">MACRA 2017 deadlines are coming. Do you have a Security Risk Assessment scheduled before December 31st?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Right now the healthcare industry is in the final race to complete the requirements for MACRA, the new reimbursement scheme for Medicare. Thousands of dollars are at risk – failing to satisfy the MACRA requirements in 2017 will result in payment reductions for all of 2019!</p>
<p>Submerged within the 2,398 pages of MACRA lies a key requirement for eligibility &#8211; completing a security risk assessment (SRA). The SRA is a “core requirement.”  Without an SRA, a healthcare practice can undo all their other efforts to achieve the high score needed to get full Medicare reimbursements and bonuses. In fact, <em><u>without an SRA, a practice is likely to face payment penalties in 2019</u></em>.</p>
<p>Be aware of two misunderstandings that give healthcare practices a false sense of security in meeting the annual requirement for a Security Risk Assessment:</p>
<ul>
<li><strong>“My EHR is HIPAA-compliant, so I don’t need to do an SRA.”</strong></li>
</ul>
<p>Simply <u>installing a certified electronic health record (EHR) does not fulfill the Meaningful Use or MACRA requirement for a security risk analysis</u>.  Even with a certified EHR, <em><strong>you must perform a full security risk analysis</strong></em> to ensure that you are properly safeguarding all the protected health information (PHI) you maintain, whether in paper or electronic form.</p>
<ul>
<li><strong>“My IT service takes care of all that security stuff.” </strong></li>
</ul>
<p><u>Don’t assume your IT service provider is taking care of security</u>.  IT companies typically believe they are only responsible for installing a firewall and anti-virus application and keeping your computers running. <em><strong>They assume the Practice Manager is handling all other aspects of system security</strong>,</em> including policies and procedures, staff training, password maintenance, mobile device management, and facility security.</p>
<p>The Security Risk Assessment isn’t just busy-work. Completing an SRA and fixing any identified gaps will increase your cybersecurity and complete a critical HIPAA requirement, saving you thousands in penalties and fines as well as protection from a breach.</p>
<p>Doing an SRA should be an important year-end &#8220;To do.&#8221;  It will give you peace of mind, letting you go into the New Year feeling more protected and positioned to increase your revenue. Don’t miss out!</p>
<p style="text-align: center;">If you have any questions about performing a Security Risk Assessment,</p>
<p style="text-align: center;">please contact us at: <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a>.</p>
<p style="text-align: center;"><strong>Protect Your Patients.  Protect Your Practice.  Protect Yourself.™</strong></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/11/02/macra-2017-deadlines-are-coming-do-you-have-a-security-risk-assessment-scheduled-before-december-31st/">MACRA 2017 deadlines are coming. Do you have a Security Risk Assessment scheduled before December 31st?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4763</post-id>	</item>
		<item>
		<title>The Most Common Mistakes in Cybersecurity are Preventable</title>
		<link>https://thirdrock.com/blog/2017/10/12/the-most-common-mistakes-in-cybersecurity-are-preventable/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Thu, 12 Oct 2017 14:00:59 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[human firewall]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[strong passwords]]></category>
		<category><![CDATA[training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4664</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/10/12/the-most-common-mistakes-in-cybersecurity-are-preventable/">The Most Common Mistakes in Cybersecurity are Preventable</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" decoding="async" class="alignleft wp-image-4665 size-medium" style="margin-bottom: 5px; margin-right: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/laptop_lock.jpg?resize=300%2C225&#038;ssl=1" alt="" width="300" height="225" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/laptop_lock.jpg?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/laptop_lock.jpg?w=500&amp;ssl=1 500w" sizes="(max-width: 300px) 100vw, 300px" />Many of the issues we see in cybersecurity, whether you are in healthcare, retail, finance, etc., are by and large preventable. It is not about having a big budget or a large team of experts. No, some of it is just common sense. It is not unlike driving a car. When driving a car you take several basic, yet important, steps to try and lower your risk of an accident. You look both ways at a stop sign, you drive safely to avoid losing control, you keep your car in working condition, and just in case you are in an accident, you&#8217;re protected by your auto insurance.</p>
<p>Nothing really difficult. Does it mean you will never have an accident? Of course not, but you significantly <em>lower your risk</em>.</p>
<p>When trying to protect your organization&#8217;s information, some of the worst &#8211; and most common &#8211; information security errors are also the ones that are the most preventable. Let&#8217;s take a look&#8230;</p>
<p><strong>Vigilance</strong> is often the first step. What do I mean, by vigilance? It is simply not taking security for granted. Far too often I hear, &#8220;The chances something will happen to us are so small.&#8221;  That always sounds good, <em>until something happens</em>.</p>
<p><strong>Antivirus</strong> is something that is surprisingly overlooked. It is not always that organizations forget to install it, it is that they forget to keep it updated and the license renewed. If your Antivirus is outdated, for any reason, it is almost as bad as having no protection.</p>
<p><strong>Email security</strong> is often overlooked, even though it is one of the easiest targets for hackers and cyber-thieves. Whether it is due to lack of end-user training or lack of security in place, it is a huge target for hackers. First and foremost your email users should be trained on proper email safety, such as how to avoid phishing messages.</p>
<p><strong>Firewalls</strong> these days are often the first line of defense and for smaller shops they are often setup by the internet service provider. The bad thing about that is the provider often leaves the default username and password in place which allows hackers to easily gain access to the firewall and let themselves in the door without knocking. This is generally a very easy change that takes only a few minutes to correct.</p>
<p>Speaking of <strong>passwords</strong>! I hate to break it to you, &#8220;1234&#8221; or &#8220;password&#8221; is a really, really poor password.</p>
<p>Finally, one of the most common mistakes in cybersecurity is&#8230;</p>
<p><strong>Backups</strong>! I know some are saying, &#8220;What do backups have to do with cybersecurity?&#8221;</p>
<p>EVERYTHING!</p>
<p>Not unlike having insurance for your car, it is only important when you need it the most. Backups are your insurance for bad things happening, whether it is a cybersecurity issue, an accidental file deletion, or a disaster. Having backups that are stored securely offsite are <em>one of the most important steps to protect your business</em>. There are many options to fit all budgets and organizations.</p>
<p>The biggest thing from all of this is to simply not overlook cybersecurity. I know it is easy to say, &#8220;It won&#8217;t happen to me.&#8221; but the odds are it will.</p>
<p>So, buckle up!</p>
<p>In recognition of October being <strong>National Cybersecurity Awareness Month</strong>, Third Rock is offering a <a href="http://cyberquickcheck.com/">FREE mini-Risk Assessment</a> to promote the role cybersecurity plays in protecting your patients, your practice and yourself.  In addition, we welcome you to visit our HIPAA and Cybersecurity <a href="https://thirdrock.com/resources/">Resources page</a>.  Do you have a cybersecurity question you&#8217;d like answered?  Email us at <a href="mailto:info@thirdrock.com?subject=National%20Health%20IT%20Week" target="_blank" rel="noopener noreferrer">info@thirdrock.com</a> or give us a call at 512.310.0020.  We&#8217;d be more than happy to help!</p>
<p style="text-align: center;"><strong>Protect Your Patients.  Protect Your Practice.  Protect Yourself.™</strong></p>
<h2></h2></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/10/12/the-most-common-mistakes-in-cybersecurity-are-preventable/">The Most Common Mistakes in Cybersecurity are Preventable</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4664</post-id>	</item>
		<item>
		<title>Don&#8217;t Click the Download Button!</title>
		<link>https://thirdrock.com/blog/2017/10/05/dont-click-the-download-button/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 05 Oct 2017 15:18:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[human firewall]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4320</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/10/05/dont-click-the-download-button/">Don&#8217;t Click the Download Button!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">I thought about naming this blog &#8220;Would the Real Download Link Expose Yourself.&#8221;  But, a few people said that wasn&#8217;t a great title.  Go figure!</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4643 size-full" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/green-download-button.jpg?resize=267%2C200&#038;ssl=1" alt="" width="267" height="200" /></p>
<p>I&#8217;m sure you&#8217;ve visited a website to download something, maybe an image or install software or maybe some template to design a cool new flyer.  You&#8217;ve probably also clicked on a large green or teal or blue or some other lovely color button that said, &#8220;Download&#8221;, only to find out it was an ad to some trash item you&#8217;re not interested in nor do you want.  It&#8217;s an irritation and waste of time.  So, you return to your previous page or site and hunt for the real download link, which is often just the words &#8220;Download Here&#8221; linked to your download object.</p>
<p>What you may not realize is, these <em>fake download buttons</em> may be taking you to a site to infect your computer with a virus or malware or ransomware.  You think you just visited some jerk that wants to sell you some trash.  In reality, that&#8217;s the least of your worries.  It may be a site operated by cyber criminals trying to steal data from your computer or hijack your computer for their use.  From now on, <strong>double check</strong> that the Download link or button is the correct download link you want.</p>
<p>Here are some tips to help you identify the fake ones vs. the real ones.</p>
<ol>
<li>Add a trustworthy ad blocker to your web browser.  uBlock Origin is a good one we use.</li>
<li>Learn to look at the &#8220;Download Button&#8221; and see if it has a the little ad play button (right arrow) in it or around it.</li>
<li>Put your mouse over the button and look at the URL it displays in the bottom left of your screen, if it&#8217;s not the local URL domain (of the current web site), something is probably not right, so don&#8217;t click.</li>
<li> Better safe than sorry, only visit reputable sites to purchase goods online and download items.</li>
</ol>
<p>Remember, be careful!</p>
<p style="text-align: center;">Join our free monthly newsletter to stay up-to-date on HIPAA and cybersecurity.</p>
<p style="text-align: center;"> Take our confidential <a href="https://cyberquickcheck.com/">free mini-Risk Assessment.</a></p>
<p style="text-align: center;"><strong>Protect Your Patients.  Protect Your Practice.  Protect Yourself.™</strong></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/10/05/dont-click-the-download-button/">Don&#8217;t Click the Download Button!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4320</post-id>	</item>
		<item>
		<title>It is Time for Us to Take Control of Our Data!</title>
		<link>https://thirdrock.com/blog/2017/09/28/it-is-time-for-us-to-take-control-of-our-data/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 28 Sep 2017 16:38:47 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4591</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/28/it-is-time-for-us-to-take-control-of-our-data/">It is Time for Us to Take Control of Our Data!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-1415 size-full" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ARRRGH-Background-Design.-The-Word-Cloud-Concept.c655643_s.jpg?resize=267%2C200&#038;ssl=1" alt="" width="267" height="200">The EquiFax breach really has me angry.&nbsp; Mostly because I have no control over any aspect of this mess.&nbsp; EquiFax scoops up data on all of us without our consent.&nbsp; They seem unaccountable and untouchable.&nbsp;&nbsp; With a last name like mine, I’ve had many opportunities to dispute incorrect data on my credit reports, which is always time consuming and irritating.&nbsp; They make it known how unimportant you are and assume you are “guilty” unless you prove otherwise.&nbsp; They collect data on all the people in the U.S. old enough to make purchases using credit, and they don’t even bother to encrypt it!&nbsp; Worse yet they didn&#8217;t even bother to patch their systems after they had several breaches earlier this year!&nbsp; Talk about arrogant!</p>
<p>Is EquiFax just one bad apple?&nbsp; Sadly, they are not. &nbsp;Historically, industries with self-certification of compliance to data protection regulations have woefully low compliance. &nbsp;Government surveys say the healthcare industry is about 15 percent compliant!&nbsp; With respect to the credit card industry, they are better than the healthcare industry by a whopping 5 percent!&nbsp; Eighty percent of businesses fall short.&nbsp; The insurance and financial industries currently have NO regulations to protect your data!&nbsp; The “good news” is regulations are being drafted and are being implemented starting with New York state.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3133 size-medium" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Information-Security-on-Red-Key-on-white-keyboard.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200"></p>
<p>I hope EquiFax is a tipping point for the consumers in our country!&nbsp; It’s time we take control of our data and demand it is properly protected.&nbsp; Nothing seems safe when each morning news declares there is another data breach and the North Koreans launched another missile! It is alarming and discouraging.&nbsp; But I shouldn’t have to give away my hard-earned credit score to buy that shiny new toy for my man cave (I wish!) for a low price on the Internet. I shouldn’t have to worry that my most confidential data is in jeopardy because I had my annual physical! Should I buy that insurance policy to protect my family, or will the data I provide on the application fall into the hands of cybercriminals and cause significant damage to my family?</p>
<p>Going forward, I will do my homework when purchasing online by selecting reputable companies and not chasing the lowest price.&nbsp; I will ask my doctor when was the last time his practice did a security risk assessment and all staff had cyber security training?&nbsp; Does their medical system encrypt the data at all points (most don&#8217;t)?&nbsp; I will look at my financial and insurance companies with a skeptical eye and make informed decisions.&nbsp; I will also add my voice to the Equifax failure to better protect my children and their future.</p>
<p>I encourage you to take our confidential&nbsp;<a href="https://cyberquickcheck.com/">free mini-Risk Assessment</a>&nbsp;to see how compliant your organization is. Should you discover you aren&#8217;t as compliant as you had hoped, contact us at&nbsp;<a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a>. &nbsp;We&#8217;d be happy to help you improve your score and protect your patients, your practice, and yourself!</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/09/28/it-is-time-for-us-to-take-control-of-our-data/">It is Time for Us to Take Control of Our Data!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4591</post-id>	</item>
		<item>
		<title>PHISHING ALERT – DocuSign &#8211; Don’t click!</title>
		<link>https://thirdrock.com/blog/2017/09/22/phising-alert-docusign-dont-click/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Fri, 22 Sep 2017 19:40:42 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[human firewall]]></category>
		<category><![CDATA[phishing scam]]></category>
		<category><![CDATA[security alert]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4560</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/22/phising-alert-docusign-dont-click/">PHISHING ALERT – DocuSign &#8211; Don’t click!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Heads up, everyone – our team has gotten phishing emails like this one posing as messages from DocuSign.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-4565 aligncenter" style="border: 1px solid #808080;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/DocuSign-Phishing-msg.jpg.png?resize=329%2C185&#038;ssl=1" alt="" width="329" height="185" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/DocuSign-Phishing-msg.jpg.png?resize=300%2C169&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/DocuSign-Phishing-msg.jpg.png?resize=768%2C433&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/DocuSign-Phishing-msg.jpg.png?w=886&amp;ssl=1 886w" sizes="(max-width: 329px) 100vw, 329px" /></p>
<p>DON’T CLICK unless (a) the message is from someone you know and (b) is a message and document you were expecting.</p>
<p>If you receive too many documents via DocuSign to remember if you were expecting the message/document or not, take these precautions:</p>
<p style="padding-left: 30px;">·         Hover your mouse over the Download link.</p>
<p style="padding-left: 30px;">·         Carefully read the url that appears.</p>
<p style="padding-left: 30px;">·         If the url is not for DocuSign, delete the email immediately.</p>
<p style="padding-left: 30px;">·         Then ask your IT provider to ensure the web filter, firewall, and anti-virus are all up-to-date.</p>
<p>DocuSign is a legitimate business that provides a valuable service to the business community. This is not their fault – these messages are a hoax.</p>
<p>Contact us today if you would like to have your IT system scanned to identify unaddressed vulnerabilities.</p>
<p style="text-align: center;">Join our free monthly newsletter to stay up-to-date on HIPAA and cybersecurity.</p>
<p style="text-align: center;">Protect Your Patients. Protect your Practice. Protect Yourself. ™</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/09/22/phising-alert-docusign-dont-click/">PHISHING ALERT – DocuSign &#8211; Don’t click!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4560</post-id>	</item>
		<item>
		<title>Focus on Security: In plain sight</title>
		<link>https://thirdrock.com/blog/2017/07/27/focus-on-security-in-plain-sight/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Thu, 27 Jul 2017 14:00:58 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=4110</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/07/27/focus-on-security-in-plain-sight/">Focus on Security: In plain sight</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/secure_doc1.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4111" style="margin-bottom: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/secure_doc1.jpg?resize=225%2C150&#038;ssl=1" alt="" width="225" height="150" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/secure_doc1.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/secure_doc1.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/secure_doc1.jpg?w=933&amp;ssl=1 933w" sizes="(max-width: 225px) 100vw, 225px" /></a>Sometimes we tend to focus strictly on the technical side of security and compliance and fail to notice the very important issues hiding in plain sight. While a hacker breaking into your network and stealing ePHI is the threat that is being talked about the most, it is sometimes the overlooked old-fashioned threats that present the greater risk.</p>
<p>Think about how many times a patient record has been sitting somewhere and how long does it actually take for someone to pick it up and walk off? What about allowing easy access to documents or equipment that contain sensitive data? Over the years we have seen clients forget some of the simple things that they could do to protect patient information.</p>
<p><strong>Below is a simple walk-through checklist</strong> that you can use to recognize and fix security issues that may be hiding in plain sight&#8230;</p>
<ol>
<li>Have any documents been left on the counter face up when not in use?</li>
<li>Have patient documents been left on a surface that is accessible to patients, visitors, vendors, etc.?</li>
<li>Have paper charts been left unattended where someone could grab them while walking down a hall?</li>
<li>Are all discarded documents containing PHI shredded or placed in a locked container to await shredding?</li>
<li>Have security cameras been installed to track unauthorized access to anywhere patient data could be found?</li>
<li>When calling a patient from the waiting room, do staff use only the patient&#8217;s name, and preferably only a first name?</li>
<li>Have staff logged out of all unattended computers, especially those in exam rooms and publicly-accessible hallways?</li>
<li>Do you and your staff lock unattended rooms that could provide access to the network or computer equipment?</li>
<li>Is the back door (or other secondary entrance) ever left open or unlocked for any reason?</li>
<li>Do you and your staff lock offices when unattended?</li>
</ol>
<p>Sometimes, just by walking through on a weekly basis you can find simple issues that need to be addressed. We recommend doing this during business hours as you want to see what your visitors see. Not only will this help you be more vigilant in your security, but it will allow visitors to rest easier seeing that you are actively taking steps to protect them and their health information.</p>
<p style="text-align: center;"><strong>Protect Your Patients.  Protect Your Practice.  Protect Yourself.™</strong></p>
<p style="text-align: center;"><a href="mailto:info@thirdrock.com">info@thirdrock.com</a> | 512.310.0020</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/07/27/focus-on-security-in-plain-sight/">Focus on Security: In plain sight</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4110</post-id>	</item>
	</channel>
</rss>
