<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Protect Yourself Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/protect-yourself/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/protect-yourself/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Tue, 26 Nov 2019 15:21:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Protect Yourself Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/protect-yourself/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Travel Cyber Safe</title>
		<link>https://thirdrock.com/blog/2019/11/26/travel-cyber-safe/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Tue, 26 Nov 2019 15:21:23 +0000</pubDate>
				<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[juice jacking]]></category>
		<category><![CDATA[travel]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8689</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/11/26/travel-cyber-safe/">Travel Cyber Safe</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><!-- divi:paragraph --></p>
<p>The holidays get busy. Traveling is stressful and we aren’t always as vigilant as we should be. In today’s world of data breaches, identity theft and cybercrime, there are many things we know to be cautious about. You wouldn’t give away your credit card number or let a stranger have access to your driver’s license. But are cyber safe with your phone? We have become so dependent on our phones to store sensitive and private data. Sometimes forget that we need to protect it too.</p>
<h2><!-- /divi:paragraph --> <!-- divi:paragraph -->Let’s take a look at a scenario that could happen to any of us:</h2>
<p><!-- /divi:paragraph --></p>
<p><span style="font-size: 14px;"><em>T</em></span><em style="font-size: 14px;">he morning was a rush and you made it to the airport on time, thankfully. After getting through security, there is a little time to breath. You grab some coffee, check your phone and realize you forgot to charge it. Ugh. Your phone needs to be charged to last the whole flight and still have juice when you land. You notice a charging station near your gate. There are even cords already plugged in, so you don’t have to dig yours out of your mess of a bag. Score!</em></p>
<p><!-- /divi:paragraph --><!-- divi:paragraph --></p>
<p>You may not be as lucky as you feel. Cyber criminals are taking advantage of how dependent we are on our devices and their need to be charged. This new scam, known as “juice jacking” takes advantage of your connection to your phone.</p>
<p><strong style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">How does it work?</strong></p>
<p><span style="font-size: 14px;">Phone cords are designed for 2-way communication. Data can come in, but data also goes out. This can be seen every time you attach an iPhone to your computer and iTunes wants to download your data. Convenient when you want it, but bad when the criminals want it. Criminals download malware into the charging station or physically alter the charging station installing a cable connected to a virus laden device, and wait until you connect. They then have access to everything on your phone. What do you keep saved?</span></p>
<ul>
<li>Passwords?</li>
<li>Credit card information?</li>
<li>Communications?</li>
<li>Photos?</li>
</ul>
<p><span style="font-size: 14px;">Depending on the malware, they could download your data or install malware on your phone that will continue to monitor your usage. They might even lock you out of your phone completely. The biggest concern; you may never know. A week later you’re seeing fraudulent charges on an account and trying to figure out what happened. This is very similar to the card skimmers installed at gas stations.</span></p>
<p><strong style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">What can you do?</strong></p>
<p><span style="font-size: 14px;">Thankfully there are easy ways to avoid this scam.</span></p>
<ul>
<li>Use your own AC adapter and cord</li>
<li>Plug into a wall outlet, not a charging station</li>
<li>Use a “charge only” cord at a charging station</li>
<li>Use personal car chargers</li>
<li>Use a portable charger</li>
</ul>
<p> <strong style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">Be cyber safe this holiday season</strong></p>
<p><!-- divi:paragraph --></p>
<p>Physical security is important and easy to remember. We see our wallet; we protect our wallet. This holiday season, let’s also remember our cyber safety.<span style="font-size: 14px;"> </span></p>
<hr class="wp-block-separator" />
<p>&nbsp;</p>
<p><!-- /divi:separator --></p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/11/26/travel-cyber-safe/">Travel Cyber Safe</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8689</post-id>	</item>
		<item>
		<title>Is WannaCry still a threat?</title>
		<link>https://thirdrock.com/blog/2019/10/04/is-wannacry-still-a-threat/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Fri, 04 Oct 2019 16:45:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WannaCry]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8437</guid>

					<description><![CDATA[<p>WannaCry ransomware took the world by surprise in 2017, crippling systems worldwide. Do you think it's been eradicated? Think again.</p>
<p>The post <a href="https://thirdrock.com/blog/2019/10/04/is-wannacry-still-a-threat/">Is WannaCry still a threat?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><em>If it’s not broke, don’t fix it</em></h2>
<p>Many people think that as long as their computer is running at a good speed and everything is working, there is no need to upgrade. Why spend money when you don’t have to, right? Wrong! The technology world cannot run on the mantra “if it’s not broke, don’t fix it” because in reality, it is broken and you just don’t know it. The proof can be seen when WannaCry ransomware was unleashed on the world in May 2017.</p>
<p>It crippled over 300,000 machines in 150 countries by targeting vulnerabilities in Windows operating systems, hitting Windows 7 the most. While Windows patched many of these vulnerabilities, their focus was, and still is, on their active operating systems, primarily Windows 10. According to Windows “every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it&#8217;s no longer supported.”<a href="#_ftn1" name="_ftnref1"><span>[1]</span></a> What does this mean for your security?</p>
<table>
<tbody>
<tr>
<td width="126">Operating System</td>
<td width="138">Availability Date</td>
<td width="156">End of Life Date</td>
<td width="150">End of Mainstream Support Date</td>
<td width="150">End of Extended Support Date</td>
</tr>
<tr>
<td width="126">Windows XP</td>
<td width="138">October 25, 2001</td>
<td width="156">January 9, 2007</td>
<td width="150">April 14, 2009</td>
<td width="150">April 8, 2014</td>
</tr>
<tr>
<td width="126">Windows Vista</td>
<td width="138">January 30, 2007</td>
<td width="156">October 22, 2010</td>
<td width="150">April 10, 2012</td>
<td width="150">April 11, 2017</td>
</tr>
<tr>
<td width="126">Windows 7</td>
<td width="138">October 22, 2009</td>
<td width="156">October 31, 2013</td>
<td width="150">January 13, 2015</td>
<td width="150">January 14, 2020</td>
</tr>
<tr>
<td width="126">Windows 8</td>
<td width="138">October 26, 2012</td>
<td width="156">October 31, 2014</td>
<td width="150">January 8, 2018</td>
<td width="150">January 10, 2023</td>
</tr>
<tr>
<td width="126">Windows 8.1</td>
<td width="138">October 18, 2013</td>
<td width="156">September 1, 2015</td>
<td width="150">January 8, 2018</td>
<td width="150">January 10, 2023</td>
</tr>
</tbody>
</table>
<h2><em>Windows Lifecycle</em></h2>
<p>According to Windows’ lifecycle policy<a href="#_ftn2" name="_ftnref2"><span>[2]</span></a>, a product is designed to have a 5 year mainstream support lifecycle followed by a 5 year extended support cycle. During the mainstream support, consumers have access to free incident support, security update support and the ability to request non-security updates. When a product moves to the extended support stage, security updates are still provided but no new features or design changes are available, and not all products are covered.</p>
<p>After the end of extended support, security updates greatly decrease. According to Microsoft, “the Extended Security Update (ESU) program is a last resort option for customers who need to run certain legacy Microsoft products past the end of support. It includes Critical and/or Important security updates for a maximum of three years after the product’s End of Extended Support date.” Who determines what is critical and important? Microsoft of course. It would have to be a huge security breach, such as WannaCry, to justify the amount of money it would take to push out an update.</p>
<p><img data-recalc-dims="1" fetchpriority="high" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Issues-with-XP.png?resize=595%2C248&#038;ssl=1" width="595" height="248" alt="" class="wp-image-8442 aligncenter size-full" scale="0" srcset="https://thirdrock.com/wp-content/uploads/Issues-with-XP.png 595w, https://thirdrock.com/wp-content/uploads/Issues-with-XP-480x200.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 595px, 100vw" /></p>
<p style="text-align: center;">Image from Windows end of XP Support<a href="#_ftn3" name="_ftnref3"><span>[3]</span></a></p>
<h2><em>What’s the risk?</em></h2>
<p>If you are running an antiquated system on your home computer, that is a risk to your security and your personal information. Not smart, but not a worldwide catastrophe. However, having one device on your work network running an old system could be devastating.</p>
<p>Though Windows created security updates to counter WannaCry, it is still active on over 145,000 devices worldwide according to a survey by Armis<a href="#_ftn4" name="_ftnref4"><span>[4]</span></a>. If even one device on your network is infected, it creates a gateway for hackers to breach your security.</p>
<p>Armis discovered that within the past 6 months, 60% of organization in the manufacturing industry and 40% in the healthcare industry experienced at least one WannaCry attack. Why? Because they tend to have older technology which makes them an easy target.</p>
<p style="text-align: center;"><em><img data-recalc-dims="1" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/tech-old-Windows-systems.png?resize=562%2C294&#038;ssl=1" width="562" height="294" alt="" class="wp-image-8440 aligncenter size-large" scale="0" /></em><em style="background-color: #ffffff; font-size: 12px; text-align: right;">Percentage of old Windows OS versions by industry type (Retail, Technology, Healthcare, Manufacturing)</em><span style="background-color: #ffffff; font-size: 12px; text-align: right;"><em style="font-size: 12px;">4</em></span></p>
<h2><em>What’s the cost?</em></h2>
<p>It is estimated that the global effort to counter the original WannaCry attack in 2017 cost around $4 billion, including $325 million paid out in ransoms. The combined efforts to stop the attacks created the false sense of security that WannaCry is no longer a threat. This is just not true.</p>
<p>In the same way that tech companies develop better, faster and more efficient software, the criminals do too. Hackers do not stay docile. If one means to infiltrate your system fails, they look for a different back door. Having the most up to date software means that Windows is fighting those battles for you. Keeping an unsupported operating system is the same as lowering the drawbridge to the attacking army.</p>
<p>According to IBM’s Cost of a Breach Report 2019, the average cost of a breach in the United States is $8.2 million. With the average size of a breach being 25,575 records, that equates to $242 per record. Lost business was the biggest contributor to this total cost, with the average business losing $1.42 million<a href="#_ftn5" name="_ftnref5"><span>[5]</span></a>. It is hard to recover from the lack of trust a customer feels when their information was stolen on your watch.</p>
<h2><em>Next steps</em></h2>
<p>Where do you go from here? Even with these numbers, you may be asking yourself, can we really afford to find and update every device that is out of date? The bigger question is, can your business survive the cost of a breach if you don’t?</p>
<p>Start with our Cyber Quick Check to see what your cybersecurity score is. Our Security Risk Assessment includes multiple scans that pinpoint weak areas that are most vulnerable, including a full inventory of what is on your network. Don’t let your records be held ransom. Fight back with the right security.  If you’re still running Windows XP, Windows 7 or Windows Vista start an upgrade program today.  Replace your computers that have the oldest versions of Windows with new computers with the latest version of Windows as you can afford it.</p>
<p>Check your cyber score at <a href="https://cyberquickcheck.com/thirdrock">here</a></p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1"><span>[1]</span></a> <a href="https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet">https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet</a></p>
<p><a href="#_ftnref2" name="_ftn2"><span>[2]</span></a> <a href="https://support.microsoft.com/en-us/help/14085">https://support.microsoft.com/en-us/help/14085</a></p>
<p><a href="#_ftnref3" name="_ftn3"><span>[3]</span></a> <a href="https://www.microsoft.com/en-us/microsoft-365/windows/end-of-windows-xp-support">https://www.microsoft.com/en-us/microsoft-365/windows/end-of-windows-xp-support</a></p>
<p><a href="#_ftnref4" name="_ftn4"><span>[4]</span></a> <a href="https://armis.com/wannacry/">https://armis.com/wannacry/</a></p>
<p><a href="#_ftnref5" name="_ftn5"><span>[5]</span></a> IBM Security and Ponemon Institute. Cost of a Data Breach Report 2019. <a href="https://www.ibm.com/downloads/cas/ZBZLY7KL">https://www.ibm.com/downloads/cas/ZBZLY7KL</a></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2019/10/04/is-wannacry-still-a-threat/">Is WannaCry still a threat?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8437</post-id>	</item>
		<item>
		<title>Business Associates bad for business?</title>
		<link>https://thirdrock.com/blog/2019/05/21/business-associates-bad-for-business/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 21 May 2019 14:00:26 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[Business Associates]]></category>
		<category><![CDATA[cyber security]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=7509</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/05/21/business-associates-bad-for-business/">Business Associates bad for business?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In January 2019, Spiceworks surveyed 600 IT and security decision makers over a wide variety of companies, all with one thing in common: their use of third-party vendors or Business Associates (BAs). Their findings should have everyone looking more closely at their BAs. Some of the key findings were:</p>
<ul>
<li>90% of companies with third-party policies review them annually</li>
<li>81% consider their policies effective</li>
<li>44% of the companies experienced “a significant, business altering data breach caused by a vendor”</li>
<li>15% of breached companies were notified by the vendor of the breach</li>
</ul>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=423%2C282&#038;ssl=1" width="423" height="282" alt="" class="wp-image-7512 aligncenter size-medium" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=1024%2C682&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=1080%2C720&amp;ssl=1 1080w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?w=1334&amp;ssl=1 1334w" sizes="(max-width: 423px) 100vw, 423px" /></p>
<p>These statistics are startling, highlighting the chasm between the BA risk management process and the reality of vendor incident response. The most disturbing findings came after the breach. Almost 70% of the breached companies made no change to their obviously faulty risk policies and procedures, with only half of them discontinuing the vendor relationship! The negative, business altering consequences include a combination of increased operational cost and complexity, disrupted operations, financial loss and reputational damage. Reason would move to making changes, but many don’t know where to start.</p>
<p><strong>Evaluate Your Vendors</strong></p>
<p>Companies need to take decisive steps with their business associates to protect their customers’ data. At a minimum, a “trust by verify” approach is required, while many companies are moving to a “zero trust” model. Some options include:</p>
<ul>
<li>Contractually obligate vendors to security and privacy practices</li>
<li>Review your vendors’ security and privacy policies and procedures including their risk management plan</li>
<li>Require security risk assessments be performed annually</li>
<li>Conduct a joint risk management review focusing on data exchange and management, prior to enabling the BA access to your data</li>
<li>Request historical review and references</li>
</ul>
<p><strong style="font-size: 12px;">Security should be a joint effort</strong></p>
<p>It is essential to keep an inventory of all third-parties who can access and share your data, but that is not enough. This study found over two thirds of the companies were not confident that their vendors notify them when sharing data with other subcontractors. Properly vetting your BAs may increase the trust relationship, but additional steps should be taken.</p>
<ul>
<li>Coordinate responsibilities between both parties</li>
<li>Require and review breach notification protocol</li>
<li>Require insurance and other forms of indemnification</li>
<li>Maintain regular communication of security expectations and execution</li>
</ul>
<p>The need for vendors and BAs will always be present in our ever changing, collaborative world. Take the steps necessary to protect your company, your clients and your vendors.</p>
<p>&nbsp;</p>
<p><u>Reference</u></p>
<p>Nearly half of firms suffer data breach at hands of vendors. Mark Sangster. 6 March 2019. <a href="https://www.esentire.com/blog/nearly-half-of-firms-suffer-data-breach-at-hands-of-vendors/">https://www.esentire.com/blog/nearly-half-of-firms-suffer-data-breach-at-hands-of-vendors/</a></p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/05/21/business-associates-bad-for-business/">Business Associates bad for business?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7509</post-id>	</item>
		<item>
		<title>Security starts with knowing your weaknesses</title>
		<link>https://thirdrock.com/blog/2019/03/26/security-starts-with-knowing-your-weaknesses/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 26 Mar 2019 14:00:58 +0000</pubDate>
				<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[phishing scam]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5914</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/03/26/security-starts-with-knowing-your-weaknesses/">Security starts with knowing your weaknesses</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>One of the biggest challenges in data and information security is knowing your threat level. IBM security recently released their 2018 X-Force Threat Intelligence Index. They monitor daily security events in 130 countries throughout the year for a comprehensive understanding of trends in cyber threats.</p>
<p>One of the most prominent ways organizations were found to be inadvertently open to attacks was due to improper configuration of cloud services. Misconfigured cloud servers accounted for 43% of more than 2.7 billion compromised records. This is an increase of 20% over recorded incidents in 2017.  According to the survey, “misconfiguration is now the single-biggest risk to cloud security, with 62% of surveyed IT and security professionals noting it as a problem”. While most of these breaches appear to be the result of inadvertent actions, it is possible for an insider to maliciously expose data and hide it as an accident.</p>
<p>No matter the style of attack, financial gain is almost always the motivation. Over the past few years, ransomware became a popular choice for cyber criminals. In 2018, however, we actually see a decrease in the use of ransomware by 45%. Why? Because cryptojacking is proving far more lucrative for criminals, thus increased in use by 450%! Without the need of any hardware of their own, a cyber criminal can install a cryptocurrency miner virtually undetected. Once installed, not only is the criminal gaining valuable coin at the owner’s expense, but they are also opening the door for other kinds of breaches.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5909" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/chart-e1553564411692-300x115.png?resize=410%2C157&#038;ssl=1" alt="" width="410" height="157" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/chart-e1553564411692.png?resize=300%2C115&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/chart-e1553564411692.png?resize=768%2C294&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/chart-e1553564411692.png?w=777&amp;ssl=1 777w" sizes="(max-width: 410px) 100vw, 410px" /></p>
<p>The number of recorded vulnerabilities has exponentially increased in the last 3 years. This is due to the “ever-expanding attack surface as new players such as IoT devices, and other smart technologies enter the fray.” The attack surface references the span by which an organization has entry points for a cyber criminal to infiltrate. Finance and Insurance registered as the highest targeted industry, due to their access to Personal Identifiable Information (PII) links directly to bank account and credit card data that can be monetized quickly. Professional services, such as legal, CPAs and consulting, is the third most targeted industry with the second highest likelihood of a breach. Valuable customer data combined with limited security budgets and staff makes it “as vulnerable as it is lucrative”.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5910" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/chart2-e1553564465916-300x205.png?resize=404%2C276&#038;ssl=1" alt="" width="404" height="276" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/chart2-e1553564465916.png?resize=300%2C205&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/chart2-e1553564465916.png?resize=768%2C524&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/chart2-e1553564465916.png?w=844&amp;ssl=1 844w" sizes="(max-width: 404px) 100vw, 404px" /></p>
<p>With all of this seemingly troubling news, you may be asking: what can we do to protect ourselves? As IBM states, we must “make security an integral part of culture and overall structure”. This is done by changing your threat landscape to reduce your risk of exposure. And that starts with knowing your risks. Our Cyber Quick Check is the first step to understanding your risk, and takes less than 5 minutes. Based on your Cyber score, discover the recommended next steps. With dedicated action and your part and the use of our automated cyber risk management system, CyberCompass™, we can increase your protection to 80% in only 90 days. The threats are real, but protection is available. Don’t wait in the dark any longer. Protect yourself and your business from threats today.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/03/26/security-starts-with-knowing-your-weaknesses/">Security starts with knowing your weaknesses</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5914</post-id>	</item>
		<item>
		<title>Are you Safe?</title>
		<link>https://thirdrock.com/blog/2018/08/17/are-you-safe/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Fri, 17 Aug 2018 15:07:28 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[personal safety]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5811</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/08/17/are-you-safe/">Are you Safe?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5813" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?resize=300%2C172&#038;ssl=1" alt="" width="300" height="172" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?resize=300%2C172&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?w=609&amp;ssl=1 609w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>Safety. Such an important word with so many different connotations. We ask safety questions constantly. Is my family safe? Will my house be safe? Is this a safe neighborhood? Are our schools safe? Many technologies are designed to specifically pacify our desire to feel safe.  We can track our child&#8217;s cellphone. We buy alarms for our homes and doorbells with cameras. Schools install cameras and specially locking doors to protect the children.  But one area most people neglect, is cyber safety. Why?  Because it is such an abstract issue.  I check the locks on my doors each night before I go to bed.  I can <em>see and confirm</em> they are locked. None of my physical senses will tell me if my PC is being hacked, until it’s too late and the ransomware notice covers the screen.  As an executive, are you doing what it takes to keep your clients safe? Is their information secure within your care? Do you even know where to start looking? Take this short quiz to see if you are on the right path. We can help you answer &#8220;Yes&#8221; to all of your security questions.</p>
<p style="text-align: center;"><strong>Protect your Patients. Protect your Organization. Protect Yourself.</strong>™</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/08/17/are-you-safe/">Are you Safe?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5811</post-id>	</item>
		<item>
		<title>Protect Yourself – Don’t let Scrooge Cyber Sabotage Your Holiday Shopping Season!</title>
		<link>https://thirdrock.com/blog/2017/12/05/protect-yourself-dont-let-scrooge-cyber-sabotage-your-holiday-shopping-season/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 05 Dec 2017 15:00:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[antivirus software]]></category>
		<category><![CDATA[card skimmers]]></category>
		<category><![CDATA[cyber-shopping tips]]></category>
		<category><![CDATA[free gifts via email]]></category>
		<category><![CDATA[limited time offers]]></category>
		<category><![CDATA[strong passwords]]></category>
		<category><![CDATA[two-factor authentication]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4845</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/12/05/protect-yourself-dont-let-scrooge-cyber-sabotage-your-holiday-shopping-season/">Protect Yourself – Don’t let Scrooge Cyber Sabotage Your Holiday Shopping Season!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">We are into the Holiday Season and Cyber Scrooges &#8211; cyber criminals &#8211; are alive and well!  Breaches seem to be a daily occurrence.  In the area where I live, they even recommend paying for gas with cash and don’t use a credit card at the pump due to card skimmers.  So, I’m out holiday shopping and I’m lucky if I have two dollars in my wallet.  That means I have to stop at a cash machine to pay for gas.  Wait, that cash machine could have a card skimmer attached to it!  I guess I have to go into the bank to get cash as well!  Bah humbug!</p>
<p>So, here’s some helpful advice to make you and your family a little cyber-safer during the Holiday Season.</p>
<ol>
<li><strong>Avoid using a debit card!</strong> A debit card provides direct access to your bank account.  Most banks will return the funds if a theft occurs, but generally you have to detect it and report it.  It may take time and effort to get the refund.  Use a credit card and review all the charges before paying the bill.  I use a credit card to buy gas!</li>
<li><strong>Regularly review your bank accounts</strong> for unknown transactions, say twice a week. Set up alerts so you are notified when large withdrawals are made.</li>
<li><strong>Set up two-factor authentication</strong> to access your bank account. This means your bank will text you a code as the final step to log into your bank account.  It is a small pain, but the protection it provides is well worth the effort!</li>
<li><strong>Keep your antivirus software up to date and use strong passwords. </strong> These are absolutely necessary if your device is connected to the Internet.</li>
<li><strong>Finally, use caution when cyber-shopping. </strong>We just had a record setting Cyber Monday. The Internet allows us to shop anywhere with ease.  Search engines can provide a wide range of “stores” that are selling the toy your son or daughter must find under the tree Christmas morning.  The problem is you can’t easily tell if the seller is an honest business or a guy on his computer in the basement scamming people.  Bad businesses can buy “likes” and positive reviews for a few dollars to make themselves appear legitimate.  Here are a few cyber-shopping tips:</li>
</ol>
<ul>
<li><strong>Don’t chase the lowest price.</strong> Shop with known and trusted companies.  If something is too good to be true, it isn’t and it can cost you a lot!  Companies that have the lowest price may not be investing in safeguards to protect your personal information.</li>
<li><strong>Watch out for limited time offers.</strong> You click on a link for the item you want, and low and behold it is on sale at a ridiculous price for the next 90 seconds! Stop! It is designed to prevent you from fully reviewing the product and seller.  It’s not worth the risk.  There will be a legitimate “Black Friday” deal in a day or so!</li>
<li><strong>Watch out for websites spelled close to well-established businesses</strong>. They can be common misspellings or have extensions on their names.  Hover your mouse over the link and read the URL.  If it reads differently than what you expect, don’t click on the link.</li>
<li><strong>Don’t fall for free gifts via email.</strong> These are phishing emails designed to enable viruses to be loaded on to your computer to steal your personal data.</li>
<li><strong>Never give out more information than is necessary.</strong> If a site asks you for your social security number or driver’s license number, etc., stop and decide if you need to provide additional personal data.</li>
</ul>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4860 size-medium" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_10326_12544-300x200.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200" /></p>
<p style="text-align: left;"><strong>We here at Third Rock wish you and your family a very wonderful Holiday Season and a Happy New Year!</strong></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/12/05/protect-yourself-dont-let-scrooge-cyber-sabotage-your-holiday-shopping-season/">Protect Yourself – Don’t let Scrooge Cyber Sabotage Your Holiday Shopping Season!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4845</post-id>	</item>
		<item>
		<title>Too Many Passwords and Too Little “Personal” Memory!</title>
		<link>https://thirdrock.com/blog/2017/10/19/too-many-passwords-and-too-little-personal-memory/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 19 Oct 2017 14:00:55 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4718</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/10/19/too-many-passwords-and-too-little-personal-memory/">Too Many Passwords and Too Little “Personal” Memory!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-2266 size-full" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/chain-with-padlock-around-computer-monitor.jpg?resize=108%2C100&#038;ssl=1" alt="" width="108" height="100" />I began my morning by starting up my PC and getting the message “Your password has expired. You must change it now!” Temporarily frozen at my keyboard, my mind is churning to think up a new password that I have a decent chance of remembering.  Should I tweak the old password by a digit or create a new one?  Luckily NIST has phased out the requirement to regularly change passwords.  But every website seems to require a password.  I have about 200 passwords to manage, what a pain!  I can’t begin to remember them all.  Most people create a spreadsheet or write them in a notebook.</p>
<p>When people have lots of passwords, they tend to reuse them or choose weak ones which are very dangerous.  We have seen that when a PC is hacked, cybercriminals know how to gather account information and passwords to exploit everything they can as fast as possible.  Common or weak passwords allow faster harvesting of your identity and funds!</p>
<p>How to securely deal with the ever-increasing number of passwords?  Get a password manager app!  A password manager encrypts your passwords and stores them in a virtual “vault”.  It can be added to your browsers to automatically load and record accounts, user names and passwords.  Then you can use complex passwords, without having to remember or record them.  Most apps will even generate very complex passwords automatically if desired.  All you have to do is remember ONE strong password to access your vault. Some apps can be accessed without passwords using biometric recognition or multi-factor authentication. Your vault can be accessed from multiple devices including smart phones.  The good news is many good password apps are offered at no cost.  We use LastPass, but here is a link to reviews of the best known password managers.</p>
<p><a href="https://www.tomsguide.com/us/best-password-managers,review-3785.html">https://www.tomsguide.com/us/best-password-managers,review-3785.html</a></p>
<p>The one additional suggestion I will recommend is to make sure you can export your passwords out of the app in a <em>human readable format</em> and completely wipe the vault should you elect to change apps or no longer use one.  A password app will make you and your data safer, and reduce the hassle of managing passwords!  And we all need that!</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/10/19/too-many-passwords-and-too-little-personal-memory/">Too Many Passwords and Too Little “Personal” Memory!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4718</post-id>	</item>
		<item>
		<title>The Equifax Data Breach – What You should do to Protect Yourself!</title>
		<link>https://thirdrock.com/blog/2017/09/21/the-equifax-data-breach-what-you-should-do-to-protect-yourself/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 21 Sep 2017 14:00:40 +0000</pubDate>
				<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Protect yourself]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4514</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/21/the-equifax-data-breach-what-you-should-do-to-protect-yourself/">The Equifax Data Breach – What You should do to Protect Yourself!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1566" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Data-breach-blue-letters-c843442_s.jpg?resize=200%2C150&#038;ssl=1" alt="" width="200" height="150" /></p>
<p>Stealing headlines from Hurricane Irma was the revelation that Equifax experienced a major data breach during the summer.  Equifax is one of the “big three” credit monitoring services and therefore the data they collect on each of us is broad and deep.  They estimate that data for 143 million people &#8211;  nearly half the population of the United States – has been stolen!</p>
<p>What does this breach mean for you?  Your financial history and ability to buy a home, new car, or even get healthcare could be at stake.  Here are recommended steps to protect you and your family.</p>
<ol>
<li><strong>Be skeptical!</strong> Equifax is looking out for itself, not you!  They will fight to survive this fiasco, spending the minimum required. Don’t give away your rights &#8211; read all documents carefully before signing. Don’t rush to sign any agreements. The aftermath of the breach will play out over months, not hours, and new information will emerge every week.</li>
<li><strong>Be cautious!</strong> This breach is so large, scammers will take advantage of it.  We learned this morning that a hacktivist created a fake EquiFax website where consumers could check to see if their information was stolen.  EquiFax actually linked to this bogus site and directed consumers to it!  (Remember item 1 &#8211; Be Skeptical!) Also be wary of offers to sign up for credit monitoring services and giving out any additional personal information!  Validate the authenticity of any such services. Research these services because many do not provide the protection you need or believe you will receive.</li>
<li><strong>Assume your data has been stolen,</strong> <em>even if Equifax says your data has not been stolen</em>! Breaches tend to grow over time because companies often under-report to minimize the bad publicity. As the company investigates the breach, they are also likely to uncover more theft that wasn’t obvious at the beginning of the investigation. For instance, on Tuesday of this week, it was publicized that EquiFax suffered additional breaches this year before this major breach.</li>
<li><strong>Check the Equifax website</strong> set up to inform people if their data was stolen. The link to the site is  <a href="http://www.equifaxsecurity2017.com/">equifaxsecurity2017.com</a>.  Questions abound about whether the website provides accurate responses or not!  Remember, be skeptical!</li>
<li><strong>Keep all your records!</strong> Record all your interactions with Equifax. Ask for email confirmations after phone conversations. Save email as PDFs.  Any costs you incur, get receipts and put them in a specific location or folder.</li>
<li><strong>Check your credit report</strong> at; <a href="https://www.annualcreditreport.com/index.action">https://www.annualcreditreport.com/index.action</a>.  This is a free service and you can get one free report a year from each credit reporting service.  I recommend getting one report every 4 months from a different service so you can maintain a fairly regular status of your credit information.</li>
<li><strong>Freeze your Credit</strong> – this is your last option and prevents companies from checking your credit score in an effort to get additional credit. This is not something you should do without evaluating your circumstances.  If you are planning to purchase a new car, take out a loan, or get a new credit card, you should evaluate your options.</li>
</ol>
<p>This blog was originally intended as the second article in the new <strong>“Protect Yourself” </strong>section of our monthly newsletter.  We focus on protecting small to medium sized <em>businesses</em> but felt we needed to offer some cyber protection information to the individual <em>people</em> who read our newsletter.  I was looking forward to gradually building up our readers knowledge and skills to eventually cover this topic, but the Equifax breach is just like hurricanes Harvey, Irma and Maria – unpredictable and causing a lot of damage and pain.  I hope this helps you all and best of luck!  We are all going to need it!  And please remember and help in any way you can all those affected by these hurricanes.</p>
<p style="text-align: center;">Join our free monthly <a href="http://thirdrock.us3.list-manage2.com/subscribe?u=1649a45c35ac1a873bb99bdb8&amp;id=7d7bf2b255">newsletter</a> to stay up-to-date on HIPAA and cybersecurity.</p>
<p style="text-align: center;">Protect Your Patients. Protect your Practice. Protect Yourself. ™</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/09/21/the-equifax-data-breach-what-you-should-do-to-protect-yourself/">The Equifax Data Breach – What You should do to Protect Yourself!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4514</post-id>	</item>
		<item>
		<title>Protect Yourself!</title>
		<link>https://thirdrock.com/blog/2017/09/20/protect-yourself/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Wed, 20 Sep 2017 14:00:01 +0000</pubDate>
				<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[Protect yourself]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4528</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/20/protect-yourself/">Protect Yourself!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>If you’ve read our blog articles before, you’ve seen our tag line; <em>Protect your Patients. Protect your Practice. Protect Yourself.</em>  Most of our articles focus on protecting your practice and patients.  Very few have been focused on <em>you</em>, the individual and <em>your</em> protection.  Now each newsletter will include advice on how you can better protect yourself and your confidential data. Hopefully we can help your family and friends as well.</p>
<p>So, let’s start at square one; your home computer.  If it is connected to the Internet, it is vulnerable to cyber attack. Install a reputable antivirus software package on your system and turn on automatic updates.  Thousands of new computer viruses are created daily and existing ones are continually updated in an effort to sneak past antivirus software.  Almost a million new variants per day!  It&#8217;s very important that antivirus software is continually updated to recognize the latest viruses.  If you use on-line banking or bill payment, it is <em>essential</em> to have antivirus software.  There are many good products on the market that will cost between $20 to $60 per year.  There are some decent free versions available as well.  Search on 2017 antivirus reviews and a wide range of reviews are available, most from publications.  In my opinion, most are not completely unbiased due to ad revenue issues.  I tend to rely on Av-Test, an independent lab:  <a href="https://www.av-test.org/en/antivirus/home-windows/">https://www.av-test.org/en/antivirus/home-windows/</a>.</p>
<p>I won’t recommend a product as preferences vary and it boils down to personal preference.  I will say I don’t rely on Microsoft’s Windows Defender.  There are also concerns about Kaspersky Lab, which is always rated high, but there are worries about links to the Russian intelligence agencies. Though Kaspersky denies any ties to Russian government or spy organizations, the US government is blocking purchase and use of the software in its organizations.</p>
<p>Hope this helps you personally!  Join our free monthly <a href="http://thirdrock.us3.list-manage2.com/subscribe?u=1649a45c35ac1a873bb99bdb8&amp;id=7d7bf2b255">newsletter</a> to stay up-to-date on HIPAA and cybersecurity.</p>
<p style="text-align: center;">Protect Your Patients. Protect your Practice. Protect Yourself. ™</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/09/20/protect-yourself/">Protect Yourself!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4528</post-id>	</item>
	</channel>
</rss>
