<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Focus on Technology Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/focus-on-technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/focus-on-technology/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Tue, 02 Jul 2019 12:08:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Focus on Technology Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/focus-on-technology/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Internet of Medical Things:  Real Security Threat or Hype?</title>
		<link>https://thirdrock.com/blog/2018/01/19/internet-of-medical-things-real-security-threat-or-hype/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Fri, 19 Jan 2018 15:15:11 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Technology]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[connected devices]]></category>
		<category><![CDATA[FDA]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Manufacturer Disclosure Statement for Medical Device Security]]></category>
		<category><![CDATA[medical devices]]></category>
		<category><![CDATA[Quality System Regulations]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5075</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/19/internet-of-medical-things-real-security-threat-or-hype/">Internet of Medical Things:  Real Security Threat or Hype?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-3047 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/mHealth-technolgy-sytstem-300x138.jpg?resize=300%2C138&#038;ssl=1" alt="" width="300" height="138" /></p>
<p>For decades, healthcare medical devices functioned as freestanding tools. Glucometers, lasers, infusion pumps, pressure monitors, neonatal incubators, heart monitors – each serving its unique function independently of the others. With the widespread implementation of electronic health records (EHRs), however, and the push for increased digitization of health information, these devices have increasingly been networked into the patient information ecosystem.  They now transmit PHI between a myriad of systems including the EHR system, bed management, supply chain management, and billing systems.</p>
<p>The variety and use of these devices have proliferated. The <a href="http://www.himss.org/medical-device-security">HIMSS Medical Device Security Workgroup</a> reports that hospitals and similar healthcare delivery organizations typically have “300% to 400% more medical equipment than IT devices.” In a study of US hospitals cited in <a href="https://www.wired.com/2017/03/medical-devices-next-security-nightmare/">Wired Magazine (3/02/17)</a>, <a href="https://www.zingbox.com/press-releases/survey-reveals-healthcare-it-decision-makers-approach-to-iot-security/">ZingBox reported</a> an average of 10-15 connected devices per bed. That translates into approximately 4500 connected medical devices for the average 300-bed community hospital &#8211; and up to 75,000 devices for a large metro medical center with 5,000 beds!</p>
<p><strong>Are devices vulnerable to hacking?</strong></p>
<p>To date, the number of medical device breaches and the number of patient records exposed by those breaches has been seemingly negligible when compared to the large-scale data losses due to hacks of healthcare organizations’ primary IT systems or losses of unencrypted mobile devices. But there have been hacks, and there are several reasons to expect medical devices to be increasingly exploited:</p>
<ul>
<li>As more medical device developers rely on off-the-shelf operating systems to speed development and/or facilitate integration with other systems, the vulnerabilities of the parent code are transferred to the devices, increasing their vulnerability.</li>
<li>The increased networking of devices makes them a more attractive target for hackers because they provide additional points of entry to other systems.</li>
<li>A Trend Micro study found a large number of devices to be discoverable on Shodan, a search engine routine for connected devices.</li>
</ul>
<p>In fact, <a href="https://www.darkreading.com/threat-intelligence/medical-devices-fall-short-in-security-best-practices/d/d-id/1328964">a study by Ponemon Institute</a> found that 67% of medical device makers <em>expect</em> an attack on their devices in the next 12 months!</p>
<p><strong>Didn’t the FDA pass regulations to fix this?</strong></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4973 " style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Red-notebook-of-Regulations.jpg?resize=248%2C186&#038;ssl=1" alt="" width="248" height="186" scale="0" /></p>
<p>Yes – and no, depending on who you ask. The FDA is quoted in many news articles saying that medical device manufacturers are responsible for complying with “quality system regulations” (QSRs), which include requirements for addressing cybersecurity risks, but both law firms and industry executives say the compliance environment remains murky:</p>
<ul>
<li>Some devices have been downgraded from “Class III” – high risk and mandatory compliance – to “Class I” – low risk and “unregulated,” though they still could pose a cybersecurity risk.</li>
<li>Once a device is in use, it’s not clear whether the device manufacturer or the healthcare delivery organization is responsible for continued patching as cyber threats evolve.</li>
<li>The FDA doesn’t actually test medical devices for their compliance with the QSRs.</li>
<li>Reporting of device malfunctions, including cybersecurity breaches, to the FDA is voluntary.</li>
</ul>
<p><strong>Know-how and budget are also factors.</strong></p>
<p>Because cybersecurity of devices is still a relatively new concern in the medical device and healthcare delivery industries, lack of knowledge regarding both the threat and the appropriate risk management responses remains a problem. The <a href="https://www.zingbox.com/press-releases/survey-reveals-healthcare-it-decision-makers-approach-to-iot-security/">ZingBox study</a> also found that 70% of healthcare IT decision-makers believe that the same security solutions used for laptops and servers are sufficient for all their connected medical devices, a misconception that the report goes on to explain.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5082 " style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/spreadsheet-financials-300x200.jpg?resize=242%2C161&#038;ssl=1" alt="" width="242" height="161" /></p>
<p>Despite two-thirds of medical device manufacturers anticipating an attack on their devices, only 15% of study respondents anticipate taking measures to mitigate the risk! Senior executives in the field say it usually comes down to budget and production deadlines. Because cybersecurity protections don’t improve device performance in terms of clinical care, it is often looked upon as a cost. Similarly, when cybersecurity flaws are discovered too far into the development process, decision makers often determine that the rework required to build in the cybersecurity protections is too costly. So devices go to market with <em>known</em> cybersecurity flaws.</p>
<p><strong>So what to do?</strong></p>
<p>As a healthcare delivery organization, you are the gatekeeper between the medical device vendors and patients. Regardless of who is technically at fault for a medical device breach, if a breach were to occur, it would be your patients’ information lost and your reputation damaged!  Thus it is up to you and your organization to set the standard for medical devices coming into your organization and to include medical devices in your annual security risk assessment.</p>
<p>Start by requesting information from your device vendors about each of the device types on your network using the <a href="http://www.himss.org/resourcelibrary/MDS2">Manufacturer Disclosure Statement for Medical Device Security ((MDS)<sup>2</sup>)</a> which was collaboratively developed by the National Electrical Manufacturers Association (NEMA) and the Health Information and Management Systems Society (HIMSS).</p>
<p>Finally, if you have questions about assessing the risk of an Internet-connected device or need help completing a comprehensive Security Risk Assessment, contact us at <a href="mailto:info@ThirdRock.com">info@ThirdRock.com</a> or 512.310.0020.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/01/19/internet-of-medical-things-real-security-threat-or-hype/">Internet of Medical Things:  Real Security Threat or Hype?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5075</post-id>	</item>
		<item>
		<title>Thank Goodness! NIST says, &#8220;No more difficult passwords!&#8221;</title>
		<link>https://thirdrock.com/blog/2017/09/14/thank-goodness-nist-says-no-more-difficult-passwords/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 14 Sep 2017 14:00:17 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Technology]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=4278</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/14/thank-goodness-nist-says-no-more-difficult-passwords/">Thank Goodness! NIST says, &#8220;No more difficult passwords!&#8221;</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2349" style="margin-right: 10px; margin-top: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?resize=250%2C167&#038;ssl=1" alt="" width="250" height="167" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?w=600&amp;ssl=1 600w" sizes="(max-width: 250px) 100vw, 250px" />Just when you thought all hope was lost of remembering your 16 character password with upper and lower case letters, numbers, and special characters; NIST comes to the rescue. That&#8217;s right!  The National Institute of Standards and Technology wrote a brief addendum to SP 800-53 which simplifies Strength of Memorized Secrets.  You and I refer to those &#8220;secrets&#8221; as passwords.  It&#8217;s a light read, only 50 or 60 pages.  I don&#8217;t really know because I didn&#8217;t want to print it and kill four trees.  Anyway, the good news is Tom Sullivan wrote up a nice, short, one pageish, blog post about the draft from NIST.  You can find it at <a href="http://www.healthcareitnews.com/news/nist-tweaks-advice-passwords-says-make-them-easier-remember"><strong>NIST tweaks advice on passwords, says make them easier to remember</strong></a>.  Thank You, Tom!  And Thank You, NIST!</p>
<p>Seriously though, it&#8217;s a serious issue.  We all need to take care in creating strong passwords to protect our data and that of our clients.  Here&#8217;s the short list of how best to do that according to the new NIST advice:</p>
<ol>
<li>Make it easy to remember for you; e.g., &#8220;I rode a green bike as a kid.&#8221;</li>
<li>Make it something private, not publicly known. (Sports team names are not good passwords.)</li>
<li>The longer the better, longer than 12 characters.  Personally, make it longer than 16 if the system supports that length.</li>
<li>Hope the developers know to have password policies that prevent bad passwords.</li>
</ol>
<p> <span style="font-size: 12px;">Here&#8217;s the summary from the document.</span></p>
<h3 id="a5-summary" style="padding-left: 30px;"><span style="color: #808080;">A.5 Summary</span></h3>
<p style="padding-left: 30px;"><span style="color: #808080;">Length and complexity requirements beyond those recommended here significantly increase the difficulty of memorized secrets and increase user frustration. As a result, users often work around these restrictions in a way that is counterproductive. Furthermore, other mitigations such as blacklists, secure hashed storage, and rate limiting are more effective at preventing modern brute-force attacks. Therefore, no additional complexity requirements are imposed.</span></p>
<p>And you thought all your tax dollars were going to waste! 🙂</p>
<p>Join our free monthly <a href="http://thirdrock.us3.list-manage2.com/subscribe?u=1649a45c35ac1a873bb99bdb8&amp;id=7d7bf2b255">newsletter</a> to stay up-to-date on HIPAA and cybersecurity.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/09/14/thank-goodness-nist-says-no-more-difficult-passwords/">Thank Goodness! NIST says, &#8220;No more difficult passwords!&#8221;</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4278</post-id>	</item>
		<item>
		<title>Focus on Technology: Change Your Router Passwords!</title>
		<link>https://thirdrock.com/blog/2017/01/17/focus-on-technology-change-your-router-passwords/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Tue, 17 Jan 2017 15:00:18 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Focus on Technology]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber-threats]]></category>
		<category><![CDATA[hipaa]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2884</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/01/17/focus-on-technology-change-your-router-passwords/">Focus on Technology: Change Your Router Passwords!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">One of the most common services in healthcare is the connection to the internet. With all the focus on security and cyber breaches, one of the most vulnerable pieces on your connection to the internet is what is called the router / gateway. The router / gateway connects your computers and devices to the public internet and in many cases provides the initial security or barrier through the use of a built-in firewall.</p>
<p>The problem is, that while this is the door, the gateway to the internet, it is a two way door. Much like the door on your office or building, if it is not properly secured anyone can walk in. What makes this such an issue is the Internet Service Providers (ISP) that generally setup the router / gateway for your organization. Larger organizations may or may not take care of this themselves, but small and medium organizations rely on the ISP to do the install and setup.</p>
<h3>Here comes the major problem!!</h3>
<p>The ISP will generally leave the default username and password for the router / gateway. This means that anyone that gets on your network can simply connect to the router and use the commonly known list of default usernames and passwords to quickly access your router and change the settings to allow them to access your network from anywhere and steal data.</p>
<h3>How to fix this</h3>
<p>You have two options to correct this.</p>
<ol>
<li>Most ISP&#8217;s have instructions on how to access and change the router&#8217;s username and password. You can login and change it yourself.</li>
<li>If you are unsure, contact the ISP and they can walk you through the process.</li>
</ol>
<p>This is a critical issue that is extremely prevalent in many organizations, not just healthcare.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/01/17/focus-on-technology-change-your-router-passwords/">Focus on Technology: Change Your Router Passwords!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2884</post-id>	</item>
		<item>
		<title>Why using Gmail, Yahoo Mail, or Hotmail in healthcare is bad</title>
		<link>https://thirdrock.com/blog/2016/12/20/why-using-gmail-yahoo-mail-or-hotmail-in-healthcare-is-bad/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Tue, 20 Dec 2016 14:30:25 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Focus on Technology]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[gmail]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[hotmail]]></category>
		<category><![CDATA[secure email]]></category>
		<category><![CDATA[yahoo mail]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2740</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/12/20/why-using-gmail-yahoo-mail-or-hotmail-in-healthcare-is-bad/">Why using Gmail, Yahoo Mail, or Hotmail in healthcare is bad</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/email_security_121216.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-2743 size-medium" style="margin-bottom: 5px; margin-left: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/email_security_121216.jpg?resize=300%2C225&#038;ssl=1" width="300" height="225" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/email_security_121216.jpg?resize=300%2C225&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/email_security_121216.jpg?w=533&amp;ssl=1 533w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>Time and time again we see healthcare organizations using free email accounts. While convenient, it is an extremely dangerous decision in a world where HIPAA fines are increasing in cost and occurrence.</p>
<p>If you or your employees have access to or use the free email services from you organization’s network, either officially for business and/or for personal use, you are at an extreme risk of being breached!</p>
<p>Why? Think about what can be sent via email. Whether you are using email to send patients reminders or any other communication, there is a strong likelihood of PHI being sent. If you allow employees to access those accounts from your organization’s network, it is easy for them to send patient data either by accident or to steal data.</p>
<p>Guess what happens if a hacker gets into an email account that your employee uses? You’ve been breached and need to report it, which will trigger a HIPAA audit.</p>
<p><strong>Now, think about these headlines over the last year…</strong></p>
<ul>
<li>Hundreds of Millions of Email Accounts Hacked and Traded Online, Says Expert</li>
<li>A Russian hacker has 272 million stolen Gmail, Yahoo, and Hotmail passwords</li>
<li>500 Million Yahoo Accounts Hacked, Change Your Passwords Now</li>
<li>and on and on…</li>
</ul>
<p>What is worse is that the free email services make their money by serving ads in their online email client. Have you ever wondered how they tailor those ads? They do it by data-mining your emails, which means that any potential PHI data is now being kept in their databases!</p>
<p>Notice we didn&#8217;t even go into the threat of malware and ransomware, which is also extremely high when using these free services.</p>
<p>There is never a good reason to use the free email services within a health organization or any organization that deals with PHI. More importantly it is extremely important to block access to these services on your organization’s firewall so that no one can access them from your organization’s resources.</p>
<p>If you are looking for hosted email service providers, there are options out there and most will not break the bank. Below is a list of a few of the options. (note we are not tied to these providers)</p>
<ul>
<li><a href="https://www.hushmail.com/business/healthcare/">Hushmail</a></li>
<li><a href="https://www.emailpros.com/">Email Pros</a></li>
<li><a href="https://mdofficemail.com/">MD OfficeMail</a></li>
<li>Also Microsoft Office 365 can be setup for HIPAA, as long as you get it setup and the BAA in place.</li>
</ul>
<p><b>Sources</b></p>
<ul>
<li><a href="http://www.nbcnews.com/tech/security/hundreds-millions-email-accounts-hacked-traded-online-says-expert-n568491">Hundreds of Millions of Email Accounts Hacked and Traded Online, Says Expert</a></li>
<li><a href="https://www.yahoo.com/tech/report-russian-hacker-trading-email-194402089.html">A Russian hacker has 272 million stolen Gmail, Yahoo, and Hotmail passwords</a></li>
<li><a href="http://lifehacker.com/500-million-yahoo-accounts-hacked-change-your-password-1786958537">500 Million Yahoo Accounts Hacked, Change Your Passwords Now</a></li>
<li><a href="http://www.bbc.com/news/world-us-canada-38324527"><strong>1 Billion</strong> Yahoo Accounts Hacked</a></li>
</ul></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/12/20/why-using-gmail-yahoo-mail-or-hotmail-in-healthcare-is-bad/">Why using Gmail, Yahoo Mail, or Hotmail in healthcare is bad</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2740</post-id>	</item>
		<item>
		<title>Focus on Technology: HIPAA Quick Fixes</title>
		<link>https://thirdrock.com/blog/2016/09/27/hipaa-technology-quick-fix/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Tue, 27 Sep 2016 14:00:37 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Focus on Technology]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[automatic updates]]></category>
		<category><![CDATA[Quick fix]]></category>
		<category><![CDATA[strong passwords]]></category>
		<category><![CDATA[training]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2300</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/09/27/hipaa-technology-quick-fix/">Focus on Technology: HIPAA Quick Fixes</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" width="300" height="200" class="alignleft wp-image-2349 size-medium" style="margin-bottom: 20px; margin-right: 10px;" alt="Keep IT Simple" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?resize=300%2C200&#038;ssl=1" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?w=600&amp;ssl=1 600w" sizes="(max-width: 300px) 100vw, 300px" /></a>While meeting all the HIPAA requirements for your technology (computer, network, etc.) requires some planning, there are some quick fixes that can greatly reduce the odds of your organization being breached while at the same time starting you on your path to compliance.</p>
<p>Below are some common issues that we see at all sizes of organizations. How you go about correcting some of them is determined by the size and resources of your organization.</p>
<div style="clear: both;"></div>
<h4>Quick Fix #1</h4>
<p><strong>Issue: The operating system (i.e. Windows) on your organization&#8217;s computers / laptops is out of date. </strong></p>
<p><strong>Details:</strong> Hackers are constantly finding new ways into your computers. If you do not keep your computer up to date, it leaves these vulnerabilities open for attack.</p>
<p><strong>Fix:</strong> For smaller organizations you will need to manually check each of your computers to make sure automatic updates are turned on and updating. Alternatively there are centralized patch management systems that can help, if you are running on a Windows domain.</p>
<h4>Quick Fix #2</h4>
<p><strong>Issue: Weak password! Simple passwords DO NOT WORK!</strong></p>
<p><strong>Details:</strong> Hackers can download a tool off of the internet to crack passwords fairly easily. The weaker the password the more likely the hacker will be able to breach your computer and network.</p>
<p><strong>Fix:</strong> Require that all users have unique accounts and passwords that are a minimum of 12 characters with a mix of UPPERCASE, lowercase, numbers, and at least one special character (i.e. !@#$%^&amp;*). You should also have your users change their password every 90 days max. If you have a Windows domain you can enforce this with a domain policy.</p>
<h4>Quick Fix #3</h4>
<p><strong>Issue: Outdated Antivirus</strong></p>
<p><strong>Details:</strong> Similar to #1, if your antivirus is out of date, your computers and networks are vulnerable to the latest virus&#8217;, malware, and ransomware.</p>
<p><strong>Fix:</strong> Check all of your computer&#8217;s antivirus software to ensure that it still has an active subscription, is running, and is being updated. Most major antivirus companies have business versions of their product that allow you to centrally manage the antivirus and reduce the likelihood of something happening.</p>
<h4>Quick Fix #4</h4>
<p><strong>Issue: Lack of trained staff</strong></p>
<p><strong>Details:</strong> Staff that has not been trained to watch out for malware in emails or on the web is generally the most likely way for your organization to become a victim of malware or ransomware.</p>
<p><strong>Fix:</strong> Ensure the staff is properly trained in HIPAA. There are plenty of online training courses that are neither expensive nor time consuming. While the return on investment may be hidden, it is huge.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/09/27/hipaa-technology-quick-fix/">Focus on Technology: HIPAA Quick Fixes</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2300</post-id>	</item>
	</channel>
</rss>
