<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>News Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/news/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Wed, 22 Jul 2020 18:58:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>News Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/news/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>CCPA enforcement has begun</title>
		<link>https://thirdrock.com/blog/2020/07/20/ccpa-enforcement-has-begun/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Mon, 20 Jul 2020 13:19:47 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[CCPA]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[enforcement]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9321</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/07/20/ccpa-enforcement-has-begun/">CCPA enforcement has begun</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>The California Attorney General’s office recently confirmed that July 1 remained the start of enforcement for the new California Consumer Privacy Act (CCPA). The office has already sent it’s first round of compliance letters to businesses, giving them 30 days to cure any violations before facing an investigation or lawsuit.</p>
<p>With the disruptions that occurred due to the COVID-19 pandemic in the United States, many may have thought CCPA would be pushed back to allow businesses to deal with other issues. However, with the exponential increase in cyber threats, better data protection is exactly what we need.</p>
<p>The focus of CCPA is giving consumers more control of their data. Consumers must be clearly notified when their data will be collected, have the option to opt out, request information about how their data is used and sold, and require their data to be deleted.</p>
<p>There is also a provision for consumers to bring allegations against a company if they feel their data was not properly managed. Though some small lawsuits have been filed, one of the largest to date was recently brought against Walmart by a San Francisco resident, claiming they “Failed to implement and maintain reasonable security procedures and practices”.</p>
<p>Will this set the tone for businesses to be sued by customers looking for a payout? Hard to say but no doubt there will be many more complaints and lawsuits. Is your business both complaint and protected? Our CCPA compliance <a href="https://thirdrock.com/ccpa/">packages</a> offer a range of services to meet your needs rapidly and protect your business. <a href="https://thirdrock.com/contact-us">Contact us</a> today.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/07/20/ccpa-enforcement-has-begun/">CCPA enforcement has begun</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9321</post-id>	</item>
		<item>
		<title>Third Rock moves to new office</title>
		<link>https://thirdrock.com/blog/2020/02/24/third-rock-moves-to-new-office/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Mon, 24 Feb 2020 19:58:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Third Rock]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9369</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/02/24/third-rock-moves-to-new-office/">Third Rock moves to new office</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Since 1995, Third Rock has been creating solutions to help businesses navigate the confusing world of cybersecurity and compliance. We took our combined knowledge and years of experience to build a better way to manage cyber risk.</p>
<p>As our business continues to grow, Third Rock is on the move. In order to better serve our local clients, Third Rock is upgrading its office space. With more room for conferencing, we are ready to help your business work toward cyber resilience. <a href="https://thirdrock.com/contact-us">Contact us</a> to set up a time to talk about starting your journey toward Cyber Confidence.</p>
<p>&nbsp;</p>
<p>595 Round Rock West Dr Suite 401, Round Rock, Tx 78681</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/02/24/third-rock-moves-to-new-office/">Third Rock moves to new office</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9369</post-id>	</item>
		<item>
		<title>Announcing CyberCompass, LLC</title>
		<link>https://thirdrock.com/blog/2020/01/01/announcing-cybercompass-llc-2/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Wed, 01 Jan 2020 16:45:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[CyberCompass]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9326</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/01/01/announcing-cybercompass-llc-2/">Announcing CyberCompass, LLC</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Since 1995, Third Rock has been leading in improving privacy compliance and cybersecurity affordably. Starting with HIPAA compliance and seeing how healthcare was strapped with only spreadsheets as their only tool, Third Rock developed automation tools with built-in expertise to move their clients to faster and more complete cyber risk management.</p>
<p>“Healthcare organizations are highly-targeted by cyber threats yet have the lowest utilization of risk management software to help manage their risks.” stated Robert Felps, Third Rock CEO.    </p>
<p> <a href="https://cybercompass.co">CyberCompass®</a> cloud-based platform was born as a solution to automate the workflow and provide the navigation needed for businesses to protect themselves today and stay current as the cyber landscape and privacy laws evolve. Third Rock quickly saw that its solution was adopted by Texas Medical Liability Trust, the largest insurer of physicians in the country, Texas Health Services Authorization with its SecureTexas certification, and Texas Medical Association.</p>
<p>With the enactment of privacy laws and the expansion of the tool into other industries, CyberCompass has gone through significant and more user-friendly enhancements to save companies up to 70% of work hours.  The most powerful enhancement is the capability to do multiple regulations with one streamline assessment.  Excess Line Association of New York is currently offering CyberCompass as a free membership benefit so insurance brokers can meet New York Department of Finance 500 cybersecurity compliance certification. CyberCompass includes the following privacy and cybersecurity regulations: CCPA, CIS-20 GDPR, HIPAA, NAIC 668, NYDFS 500, NIST 171 800, and numerous state regulations.</p>
<p>Seeing the increased demand for the software and its ability to simplify cyber risk management, streamline privacy compliance and improve cybersecurity holistically, CyberCompass, LLC becomes effective on January 1, 2020. Spinning off as a separate entity, CyberCompass as well as its other tools such as CyberQuickCheck, will have greater flexibility to establish various distribution opportunities through resellers, value added resellers, strategic alliances, and partnerships. </p>
<p>“With CyberCompass as a separate legal entity, we have simplified the ability for our partners so we can develop more focused leadership and meet changing market demand faster,” stated Felps.</p>
<p>Do you have clients in need of holistic risk management across people, processes, technology and vendors? Learn more about <a href="https://cybercompass.co/partners/">partnering</a> with CyberCompass today to provide the most affordable and complete solution.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/01/01/announcing-cybercompass-llc-2/">Announcing CyberCompass, LLC</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9326</post-id>	</item>
		<item>
		<title>New enhancement greatly simplify managing cyber risk</title>
		<link>https://thirdrock.com/blog/2019/12/02/new-enhancement-greatly-simplify-managing-cyber-risk/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Mon, 02 Dec 2019 17:13:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[CyberCompass]]></category>
		<category><![CDATA[upgrade]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9349</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/12/02/new-enhancement-greatly-simplify-managing-cyber-risk/">New enhancement greatly simplify managing cyber risk</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><span>We are pleased to announce six new enhancements that make using CyberCompass® even easier:</span></h2>
<p><span>As a main distributor of CyberCompass®, we are excited for how these new enhancements can help our customers better manage their cyber risk.</span></p>
<p><span></span></p>
<h3><span>Leading edge security</span></h3>
<ul>
<li><span>Added encryption means whether you’re just working in your account, uploading documents or downloading them, all your data is secure.</span></li>
</ul>
<h3><span>Encrypted Attachment Vault:</span><span>You asked, we delivered!</span><span></span></h3>
<ul>
<li><span>Seamless ability to upload multiple attachments with ease</span></li>
<li><span>More confidence while maintaining your required compliance documentation</span></li>
<li><span>Each file is encrypted for greater security</span></li>
<li><span>Electronically store and delete attachments at any time </span></li>
</ul>
<h3><span> </span><span>Expedite User Login</span></h3>
<ul>
<li><span>Token-based authentication for faster repeat logins</span></li>
</ul>
<h3><span> </span><span>New wider viewpoint with </span><span>more</span><span> pixels</span></h3>
<ul>
<li><span>The user view area is now wider on the web page</span></li>
<li><span>Increase the available real-estate on your screen</span></li>
<li><span>See more at one time</span></li>
</ul>
<h3><span> </span><span>New Remediation Issues List Layout</span></h3>
<ul>
<li><span>New redesigned issues layout provides more information at your fingertips. </span></li>
<li><span>Easier to interpret results with new graphs: provides you more information on true state of the issues at a glance</span></li>
<li><span>Updated Issues List provides more details including:</span>
<ul>
<li><span>Threat Rank</span></li>
<li><span>Last Activity</span></li>
<li><span>Assignment information</span></li>
<li><span>Notes Icon</span></li>
</ul>
</li>
<li><span>Simplified filtering to get to your information faster: format and filter to get to the issue that meets your business needs</span></li>
</ul>
<h3><span> </span><span>Issues View now has more flexibility to better manage</span></h3>
<ul>
<li><span>Traverse through issues using the “Previous” and “Next” buttons</span></li>
<li><span>Improved page layout for easier reading and updating.</span></li>
</ul>
<p><span>Are you looking for a solution to provide holistic coverage across your people, processes, technology and vendors? <a href="/contact-us">Contact us</a> today to start your journey toward cyber resilience.</span></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/12/02/new-enhancement-greatly-simplify-managing-cyber-risk/">New enhancement greatly simplify managing cyber risk</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9349</post-id>	</item>
		<item>
		<title>CyberCompass® integrates CIS Top 20 Controls</title>
		<link>https://thirdrock.com/blog/2019/10/02/cybercompass-integrates-cis-top-20-controls/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Wed, 02 Oct 2019 18:24:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[CIS 20]]></category>
		<category><![CDATA[CyberCompass]]></category>
		<category><![CDATA[regulations]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9355</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/10/02/cybercompass-integrates-cis-top-20-controls/">CyberCompass® integrates CIS Top 20 Controls</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
<div class="et_pb_text_inner">
<div>CIS Controls were designed to help companies follow a workflow of best practices to proactively defend againt the most common attacks known on the market. With CIS’ recent release of version 7.1, <a href="https://cybercompass.co">CyberCompass®</a> now integrates these Top 20 controls . Our automated cyber risk management platform simplifies and reduces the effort for our clients needing to comply with CCPA, CIS-20, GDPR, HIPAA, NIST SP800-171, NYDFS and SECURETexas assessments.</div>
<div></div>
<div>Our risk management plan provides:</div>
<ul>
<li>multiple assessments</li>
<li>prioritized corrective actions</li>
<li>step-by-step guides</li>
<li>cyber training</li>
<li>policies and procedures</li>
<li>strategic plans</li>
<li>vendor compliance</li>
</ul>
<div>These and other great features will empower your organization to reduce your cyber risk.</div>
<div></div>
<div><img data-recalc-dims="1" fetchpriority="high" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/20-chart.png?resize=646%2C854&#038;ssl=1" width="646" height="854" alt="" class="wp-image-9356 aligncenter size-full" srcset="https://thirdrock.com/wp-content/uploads/20-chart.png 646w, https://thirdrock.com/wp-content/uploads/20-chart-480x635.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 646px, 100vw" /></div>
<div></div>
<div>
<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
<div class="et_pb_text_inner">
<p><span>CyberCompass®</span><span> has implemented all three implementation groups, IG1, IG2 and IG3 of the CIS Top 20 Controls in the platform. We have also created IG1.5 for companies in between the IG1 and IG2 needs</span></p>
<p><span><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/implementation-groups.png?resize=1016%2C297&#038;ssl=1" width="1016" height="297" alt="" class="wp-image-9357 aligncenter size-full" srcset="https://thirdrock.com/wp-content/uploads/implementation-groups.png 1016w, https://thirdrock.com/wp-content/uploads/implementation-groups-980x286.png 980w, https://thirdrock.com/wp-content/uploads/implementation-groups-480x140.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1016px, 100vw" /></span></p>
<div><span>If your company is expected to comply with the framework of CIS-20, <a href="/contact-us">call us</a> today to plan your assessment and begin your journey toward cyber resilience.</span></div>
<div><span></span></div>
<div><span>About CIS</span></div>
<div><span>CIS</span><sup>®</sup><span> (Center for Internet Security, Inc.) is a forward-thinking, non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. The CIS Controls</span><sup><span> </span></sup><span>and CIS Benchmarks</span><sup><span> </span></sup><span>are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. These proven guidelines are continuously refined and verified by a volunteer, global community of experienced IT professionals. Our CIS Hardened Images</span><span>™</span><span> are virtual machine emulations pre-configured to provide secure, on-demand, and scalable computing environments in the cloud. CIS is home to both the Multi-State Information Sharing and Analysis Center</span><sup>®</sup><span> (MS-ISAC</span><sup>®</sup><span>), the go-to resource for cyber threat prevention, protection, response, and recovery for U.S. State, Local, Tribal, and Territorial government entities, and the Elections Infrastructure Information Sharing and Analysis Center™ (EI-ISAC™), which supports the cybersecurity needs of U.S. State, Local and Territorial elections offices. </span><span> To learn more, visit </span><a href="https://www.cisecurity.org/" target="_blank" rel="noopener noreferrer">CISecurity.org</a><span> or follow us on Twitter: </span><a href="https://twitter.com/CISecurity" target="_blank" rel="noopener noreferrer">@CISecurity</a><span>.</span></div>
</div>
</div>
</div>
</div>
</div></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2019/10/02/cybercompass-integrates-cis-top-20-controls/">CyberCompass® integrates CIS Top 20 Controls</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9355</post-id>	</item>
		<item>
		<title>Nivola HIPAA training added to CyberCompass®</title>
		<link>https://thirdrock.com/blog/2019/09/04/nivola-hipaa-training-added-to-cybercompass/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Wed, 04 Sep 2019 18:39:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[Nivola Heathcare Solutions]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9363</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/09/04/nivola-hipaa-training-added-to-cybercompass/">Nivola HIPAA training added to CyberCompass®</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><div><span>CyberCompass® offers a new <a href="https://thirdrock.com/hipaa/#hipaa_training">HIPAA training</a> by Nivola Healthcare. Specifically developed by two of the top healthcare law professionals, you get clear and concise information vital to maintaining patient security. With CyberCompass® Nivola HIPAA training, you will  </span></div>
<div><span></span></div>
<ul>
<li><span>gain a practical understanding for HIPAA regulations.</span></li>
<li><span>how to best incorporate them with your staff and throughout the practice</span></li>
<li><span>improve your HIPAA compliance with our built in completion tracking</span></li>
</ul>
<div></div>
<div><span>The brief, engaging modules allow you to work at your own pace. With a staff driven to a shared understanding for patient privacy and security, your business gains greater compliance. It allows practices to complete the training without impacting staff productivity through its on-demand feature. By offering the training through the CyberCompass® platform, you also get the exclusive benefit of a built-in learning management system so you can easily track completion of staff members throughout their tenure with your practice – from on-boarding to annual training requirements. All your compliance reporting is easily accessible. </span></div>
<div><span style="font-size: 16px;">Note: Modules are available for specific Texas laws, including the latest HB300 </span><span style="font-size: 16px;">requirements</span><span style="font-size: 16px;"> </span><span style="font-size: 16px;">.</span></div>
<div></div>
<div>About Nivola training:</div>
<div>
<div><span>Lead by Pegi S. Block, JD and Debbie Elmore, RPh, JD, CHPC, their combined experience from the past 20 years in healthcare law provides a unique perspective to help healthcare providers avoid HIPAA fines and penalties. Before co-founding Nivola Training, Pegi represented healthcare providers both in Texas and in various multi-district litigations across the country. Debbie has represented numerous healthcare providers and medical entities in privacy and cyber law matters, regulatory and compliance matters, governmental investigations, Texas Attorney General proceedings and medical board proceedings.</span></div>
</div>
<div></div></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/09/04/nivola-hipaa-training-added-to-cybercompass/">Nivola HIPAA training added to CyberCompass®</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9363</post-id>	</item>
		<item>
		<title>Third Rock now offers NY DFS 500 Risk Assessments</title>
		<link>https://thirdrock.com/blog/2019/06/14/third-rock-now-offers-ny-dfs-500-risk-assessments/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 14 Jun 2019 12:30:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[NY DFS 500]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9342</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/06/14/third-rock-now-offers-ny-dfs-500-risk-assessments/">Third Rock now offers NY DFS 500 Risk Assessments</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Third Rock, powered by <a href="https://cybercompass.co">CyberCompass®</a>, now includes the NYDFS security risk assessment required by all New York financial entities.  The <a href="http://www.dfs.ny.gov/legal/regulations/adoptions/dfsrf500txt.pdf">NYDFS Cybersecurity Regulation</a> (23 NYCRR 500) is “designed to promote the protection of customer information as well as the information technology systems of regulated entities”. This regulation requires each company to conduct a risk assessment and then implement a program with security controls for detecting and responding to cyber events.</p>
<p>The NYDFS has supervisory power over banks, insurance companies, and other financial service companies. More specifically, they supervise the following covered entities:</p>
<ul>
<li>Credit Unions</li>
<li>Health Insurers</li>
<li>Investment Companies</li>
<li>Licensed Lenders</li>
<li>Life Insurance Companies</li>
<li>Mortgage Brokers</li>
<li>Savings and Loans Associations</li>
<li>Private Bankers</li>
<li>Offices of Foreign Banks</li>
<li>Commercial Banks</li>
</ul>
<p>There are some <a href="https://thirdrock.com/blog/2020/01/31/exempt-is-not-a-free-pass-with-23-crr-500-ny-dfs/">exceptions</a> to entities that have to meet the regulations.</p>
<p>NYDFS requires entities to complete the following:</p>
<ul>
<li><strong>Risk Assessments</strong></li>
<li><strong>Audit Trail</strong> including updated policy and procedures</li>
<li><a href="https://www.varonis.com/blog/incident-response-plan/"><strong>Incident Response Plan</strong></a></li>
</ul>
<p>CyberCompass® automates the numerous steps to completing a risk assessment with its on-demand, cloud-base software so a security risk assessment can be completed in 70% less time.  It offers the unique feature to go beyond technology for information security and add the people, process and vendor compliance for information security.  </p>
<p>“We expect what is happening in New York to happen across the country,” stated Robert Felps, CEO.  “We have engineered CyberCompass to help companies meet regulations faster and require less work hours through built-in expertise and automated workflow.”</p>
<p>With Third Rock expertise and guidance, we work with you to use CyberCompass® to increase your compliance and manage your cyber risk.</p>
<table width="667">
<tbody>
<tr>
<td width="157"><strong>Steps necessary to complete Security Risk Assessments</strong></td>
<td width="510"><strong>How CyberCompass® automates workflow to complete a security risk assessment with its built-in expertise.</strong></td>
</tr>
<tr>
<td width="157"><strong>1. <span> </span></strong>Identify threats and vulnerabilities</td>
<td width="510">By answering our online, on demand risk assessment survey.  The questions have been specifically tailored and written in simple language to meet the NYDFS regulations and combined our cyber security risk expertise to assess your employees, processes, technologies and vendors.</td>
</tr>
<tr>
<td width="157"><strong>2. <span> </span></strong>Qualify the extent of the risk</td>
<td width="510">By answering our online, on demand risk assessment survey.  The questions have been specifically tailored and written in simple language to meet the NYDFS regulations and combined our cyber security risk expertise to assess your employees, processes, technologies and vendors.</td>
</tr>
<tr>
<td width="157"><strong>3. <span> </span></strong>Mitigate the risks to reduce them to an agreed and acceptable level</td>
<td width="510">CyberCompass® automatically provides the corrective actions with a step by step guide that helps you  ‘terminate’ the risk by eliminating it entirely, ‘treat’ the risk by applying security controls, ‘transfer’ the risk to a third party, or ‘tolerate’ the risk.</td>
</tr>
<tr>
<td width="157"><strong>4. <span> </span></strong>Update policies and procedures</td>
<td width="510">CyberCompass® has a built-in template to provide you a complete set of policies and procedures.</td>
</tr>
<tr>
<td width="157"><strong>5. <span> </span></strong>Create incident response plan</td>
<td width="510">A unique feature, only CyberCompass® can create the required incident response plan</td>
</tr>
<tr>
<td width="157"><strong>6. <span> </span></strong>Review, monitor and audit.</td>
<td width="510">Utilizing CyberCompass® software subscription and built in notifications, CyberCompass® empowers you to manage cyber risk in one place across the entire organization.</td>
</tr>
</tbody>
</table></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/06/14/third-rock-now-offers-ny-dfs-500-risk-assessments/">Third Rock now offers NY DFS 500 Risk Assessments</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9342</post-id>	</item>
		<item>
		<title>Ignorance is not Innocence</title>
		<link>https://thirdrock.com/blog/2019/06/11/ignorance-is-not-innocence/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 11 Jun 2019 14:00:30 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[culpability]]></category>
		<category><![CDATA[HITECH]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=7561</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/06/11/ignorance-is-not-innocence/">Ignorance is not Innocence</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Cyber security breaches are constantly in the news. Hundreds, if not thousands, occur across every kind of industry each year. Healthcare has consistently been a prime target for cyber criminals to gain access to personal health information (PHI) which can be sold for high profit on the dark web. In fact, 2018 marked an all-time high of $28.7 million in fines from HIPAA entities and their business associates.</p>
<p> In an effort to encourage healthcare organizations to better protect their patients’ information the Health Information Technology for Economic and Clinical Health (HITECH) Act was instituted, though the wording of the original bill left much open to interpretation. An element of the Act created tiers for HIPAA and breach violations. However, HHS admitted there was inconsistent language in the HITECH Act about the penalty scheme. Due to this, the penalty cap for every tier was set at $1.5 million. Commenters expressed concerns that the “penalty scheme is inconsistent with the HITECH Act’s establishment of different tiers based on culpability.”</p>
<p> So what is the culpability? Webster defines it as the “guilt or blame that is deserved”. HITECH tiers define it like this:</p>
<ul>
<li> the person did not know (and, by exercising reasonable diligence, would not have known) that the person violated the provision;</li>
<li>the violation was due to reasonable cause, and not willful neglect;</li>
<li>the violation was due to willful neglect that is timely corrected; and</li>
<li>the violation was due to willful neglect that is not timely corrected.</li>
</ul>
<p>Under the new payment scheme, fines will increase based on which tier your breach falls into:</p>
<p>&nbsp;</p>
<table>
<tbody>
<tr>
<td width="180">
<p><strong>Culpability</strong></p>
</td>
<td width="180">
<p><strong>Min Penalty/ Violation</strong></p>
</td>
<td width="180">
<p><strong>Max Penalty/ Violation</strong></p>
</td>
<td width="180">
<p><strong>Annual Limit</strong></p>
</td>
</tr>
<tr>
<td width="180">
<p>No Knowledge</p>
</td>
<td width="180">
<p>$100</p>
</td>
<td width="180">
<p>$50,000</p>
</td>
<td width="180">
<p>$25,000</p>
</td>
</tr>
<tr>
<td width="180">
<p>Reasonable Cause</p>
</td>
<td width="180">
<p>$1,000</p>
</td>
<td width="180">
<p>$50,000</p>
</td>
<td width="180">
<p>$100,000</p>
</td>
</tr>
<tr>
<td width="180">
<p>Willful Neglect – Corrected</p>
</td>
<td width="180">
<p>$10,000</p>
</td>
<td width="180">
<p>$50,000</p>
</td>
<td width="180">
<p>$250,000</p>
</td>
</tr>
<tr>
<td width="180">
<p>Willful Neglect – Not Corrected</p>
</td>
<td width="180">
<p>$50,000</p>
</td>
<td width="180">
<p>$50,000</p>
</td>
<td width="180">
<p>$1,500,000</p>
</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>This is all great and nice to know, but what does this look like in practice? It might look something like this: </p>
<ul>
<li>You have completed a wholistic Security Risk Assessment and have made efforts to improve your cyber security. Even with reasonable policies and procedures in place, a breach still occurred.</li>
<li>You have certain elements of security in place, but a breach got through by a reasonable cause, such as an employee falling for a phishing scheme.</li>
<li>You made no effort to protect your cyber security, but worked to correct the problem after a breach.</li>
<li>You made no effort to protect your cyber security and did not attempt to correct it after a breach.</li>
</ul>
<p>If you read the HHS OCR’s audit summary letters you can conclude that doing number one will keep you from being fined $50,000 for willful neglect regarding a risk assessment, but option four will land you a $50,000 fine.</p>
<p>Which tier best applies to you?  Do you even know where to start?</p>
<p> Our Cyber Quick Check can have you on the path to a better understanding of your current cyber security in less than 2 minutes. Because knowing is the first step toward empowering you to manage your cyber risk.</p>
<p>&nbsp;</p>
<p><a href="https://cyberquickcheck.com/thirdrock">https://cyberquickcheck.com/thirdrock</a></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2019/06/11/ignorance-is-not-innocence/">Ignorance is not Innocence</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7561</post-id>	</item>
		<item>
		<title>Third Rock&#8217;s New GDPR Assessment Capabilities Expedite Compliance</title>
		<link>https://thirdrock.com/blog/2018/04/26/third-rocks-new-gdpr-assessment-capabilities-expedite-compliance/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Thu, 26 Apr 2018 15:00:31 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[benchmarking]]></category>
		<category><![CDATA[Body of Evidence]]></category>
		<category><![CDATA[corrective actions]]></category>
		<category><![CDATA[Cyber Confidence℠]]></category>
		<category><![CDATA[cyber risk management software]]></category>
		<category><![CDATA[CyberCompass™]]></category>
		<category><![CDATA[GDPR risk assessment]]></category>
		<category><![CDATA[General Data Protection Regulation Risk Assessment]]></category>
		<category><![CDATA[HIPAA Security Risk Assessment]]></category>
		<category><![CDATA[NIST SP 800-171]]></category>
		<category><![CDATA[SECURETexas]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[vulnerability scans]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5491</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/04/26/third-rocks-new-gdpr-assessment-capabilities-expedite-compliance/">Third Rock&#8217;s New GDPR Assessment Capabilities Expedite Compliance</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;"></p>
<p><strong><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5522 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=300%2C214&#038;ssl=1" alt="" width="300" height="214" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=300%2C214&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=768%2C549&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?resize=1024%2C731&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/AdobeStock_157142521.jpeg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" /></strong></p>
<h2 style="text-align: center;"><span style="font-size: 12px;"><strong><em>More than half of companies impacted by GDPR are not ready for May 25<sup>th</sup> deadline</em></strong></span></h2>
<p><strong>Round Rock, TX – April 26, 2018</strong> – Third Rock, a supplier of cyber risk management software, announced today the launch of its General Data Protection Regulation (GDPR) Risk Assessment, the newest enhancement to its cyber risk management software to help companies become GDPR compliant before the May 25, 2018 deadline set by the European Union (EU).</p>
<p>GDPR applies to every company that collects, processes or stores an EU citizen’s data, regardless of sector, size and geographical location. The consulting firm <a href="https://www.gartner.com/newsroom/id/3701117">Gartner</a> estimates that more than half of the companies that are subject to the GDPR will not be in compliance this year and will be at risk for fines by the EU. A risk assessment is a required action to meet GDPR compliance regulations for protecting EU citizens’ data.</p>
<p>The full integration of the GDPR assessment into Third Rock’s current web based cyber risk management software platform, <a href="http://www.compassdb.io">CyberCompass™</a>, allows companies to quickly complete the assessment and then automatically generate a prioritized corrective action plan.  Robert Felps, CEO of Third Rock, explained, “This software provides rapid benchmarking of an organization’s compliance status, prioritizes needed corrective actions, and maintains the Body of Evidence in the event of an audit by regulatory authorities.  Companies can then choose to implement the corrective actions themselves, collaborate with Third Rock, or engage their current compliance consulting firm. Most companies can achieve GDPR compliance in approximately two to twelve weeks.”</p>
<p>Third Rock’s CyberCompass™ GDPR Risk Assessment provides a comprehensive, user-friendly experience. Most companies use a mix of forms and spreadsheets to manage cyber risk. Natan Bradbury, CEO of <a href="http://www.vitechpros.com">VITECH Pros </a>who partnered with Third Rock to test the new assessment stated, &#8220;You don&#8217;t know how long I&#8217;ve been looking for an application like this!  I&#8217;ve been cobbling together Excel and Word documents and some other tools to complete assessments.”  CyberCompass™ has been documented to achieve 65% time savings compared to other assessment approaches.</p>
<p><strong> </strong><strong style="font-size: 12px;">About Third Rock</strong></p>
<p>Third Rock specializes in simplifying cyber risk management to enable organizations to holistically assess and manage their cyber risk by engaging employees, refining processes, and hardening technical systems, creating a culture of Cyber Confidence℠. Third Rock’s CyberCompass™ software includes: HIPAA, GDPR, NIST SP 800-171, and <a href="http://www.thsa.org">SECURETexas</a> assessments, along with comprehensive workstation and network vulnerability scans. Third Rock is proud to partner with <a href="http://www.tmlt.org">Texas Medical Liability Trust</a> and Texas Health Services Authority. Learn more at <a href="http://www.thirdrock.com#www.thirdrock.com">ThirdRock.com</a>.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/04/26/third-rocks-new-gdpr-assessment-capabilities-expedite-compliance/">Third Rock&#8217;s New GDPR Assessment Capabilities Expedite Compliance</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5491</post-id>	</item>
		<item>
		<title>Protect Your Clients, Your Clients&#8217; Data, and Your Business &#8211; a webinar offered by Developmental Services Network</title>
		<link>https://thirdrock.com/blog/2018/01/11/protect-your-clients-your-clients-data-and-your-business-a-webinar-offered-by-developmental-services-network/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Thu, 11 Jan 2018 21:00:29 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[DSN webinar]]></category>
		<category><![CDATA[webinar]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4918</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/11/protect-your-clients-your-clients-data-and-your-business-a-webinar-offered-by-developmental-services-network/">Protect Your Clients, Your Clients&#8217; Data, and Your Business &#8211; a webinar offered by Developmental Services Network</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-427 alignleft" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/profile-robert-felps.jpg?resize=183%2C183&#038;ssl=1" alt="" width="183" height="183" /><span style="font-size: 12px;"></span></p>
<p><span style="font-size: 12px;">Robert Felps, CEO of Third Rock, is proud to present a cybersecurity webinar &#8211; </span><strong style="font-size: 12px;"><em>Protect Your Clients, Your Clients&#8217; Data, and Your Business</em></strong><span style="font-size: 12px;"> &#8211; for Developmental Services Network on Thursday, January 18, 2018, 10:30 am &#8211; 11:30 am PST.</span></p>
<ul>
<li><strong><em>Did you know your client data is worth 50 times more than a credit card number on the dark web?</em></strong></li>
<li><strong><em>A HIPAA approved client management system does not make you HIPAA compliant, nor does it completely protect your client data.</em></strong></li>
<li><strong><em>Learn steps to improve your cybersecurity and achieve HIPAA compliance easily and affordably!</em></strong></li>
</ul>
<p>For more than 15 years Developmental Services Network (DSN) has served its members as California&#8217;s only trade association dedicated exclusively to providers of intermediate care facility (ICF) services for people with developmental disabilities.  DSN&#8217;s strength comes from its members who recognize the importance of working together, sharing information, conducting and receiving training, and providing critical regulatory and fiscal analysis of the activities of the various governmental entities involved in oversight and funding of the program.</p>
<p>Registration is FREE for Developmental Services Network members. Registration for non-members is $50.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/01/11/protect-your-clients-your-clients-data-and-your-business-a-webinar-offered-by-developmental-services-network/">Protect Your Clients, Your Clients&#8217; Data, and Your Business &#8211; a webinar offered by Developmental Services Network</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4918</post-id>	</item>
	</channel>
</rss>
