<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Risk Management Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/risk-management/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/risk-management/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Tue, 21 Jul 2020 12:34:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Risk Management Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/risk-management/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Cyber Safety for working at home</title>
		<link>https://thirdrock.com/blog/2020/04/23/cyber-safety-for-working-at-home/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Thu, 23 Apr 2020 18:20:32 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9042</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/04/23/cyber-safety-for-working-at-home/">Cyber Safety for working at home</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Our work environments have been turned upside down. We are all in a place of creating new work routines. Having left the cyber safety net of a central office designed to protect company cybersecurity, IT departments are juggling a dispersed workforce while maintaining cybersecurity standards that protect private data.</p>
<p>Before COVID-19 forced a remote workforce, anywhere from 60 – 90% of breaches were caused by human error. We are seeing cyber criminals take advantage of extra vulnerabilities created with employees working from home. Cybersecurity is no longer just an IT thing. Protecting your company and their private data has never been closer to home, literally. Mistakes that could hurt the company start on your own network, which could also affect your personal security. Your business, IT department and your family are relying on your vigilance to be cyber safe.</p>
<h2></h2>
<h2>Cyber safety habits to put into practice</h2>
<ol>
<li><strong> </strong><strong>Separate work and personal devices<br /> </strong>If your company provides you a device, use it only for work purposes. Have a separate device for family and personal use. If separate devices are not a possibility, create separate profiles with different security settings. Use your work profile only for work purposes. If you have children who need to use the same computer, create separate profiles with parental controls that limit their ability to access and/or download content that could infect your computer.</li>
</ol>
<ol start="2">
<li><strong> </strong><strong>Lockdown your device<br /> </strong>You may feel that your device is physically safe in your home office, but you still need to protect data safety. Set a unique password for your device and lock it every time you walk away. If you are using one device for multiple profiles, have a private, unique password for your work profile that no one in your household can access. This is good practice for after quarantine as well.</li>
</ol>
<ol start="3">
<li><strong> </strong><strong>Be wary of add-ons and downloads<br /> </strong>There are many add-ons and extensions that promise to make your work run faster, smoother and better. Be cautious of downloading these onto your device. Many contain malware that give hackers access to the data on your computer. If you then link to your company network, they could gain access there as well. A good cyber safety practice is to research on trusted sites before downloading a new program or add-on.</li>
</ol>
<ol start="4">
<li><strong> </strong><strong>Use company approved sharing sites<br /> </strong>With your entire team working remotely, there is a greater need to communicate digitally. It may be more comfortable to use data sharing platforms you are used to, they may not be the most secure. Only send private data through company approved sharing sites.</li>
</ol>
<h2></h2>
<h2>Know signs of a breach</h2>
<p>Preventative measures are important to cyber safety, but breaches are still possible. It’s important to know what signs to look for in the event of a breach.</p>
<ol>
<li><strong> </strong><strong>Increase in unwanted pop-ups<br /> </strong>Pop-ups are a widely seen by-product of malware. If advertisements or system pop-ups begin appearing outside of any program, you may have been infected.</li>
</ol>
<ol start="2">
<li><strong> </strong><strong>Processing slows down<br /> </strong>Is it taking longer than usual for your computer to boot up or for programs to load? Viruses and malware run in the background, slowing down the programs you are attempting to run.</li>
</ol>
<ol start="3">
<li><strong> </strong><strong>New programs appear<br /> </strong>Computers do not add content on their own. If a new program, app or internet add-on appears on your computer, you may have a virus that inserted content onto your computer.</li>
</ol>
<h2></h2>
<h2>How do you handle a potential breach?</h2>
<ol>
<li><strong> </strong><strong>Report it!<br /> </strong>Inform your IT department of what you are experiencing. Send screen shots of error messages, pop-ups and other unwanted content. Be specific about when it started happening and what is going on.</li>
</ol>
<ol start="2">
<li><strong> </strong><strong>Don’t click<br /> </strong>Never click on suspicious content, even to try and close pop-up windows. Malware is the gateway for a virus. Clicking on the content can give them access to the data they are looking for.</li>
</ol>
<ol start="3">
<li><strong> </strong><strong>Scan with anti-virus software<br /> </strong>Company devices should be equipped with anti-virus software. If your company does not provide a device, get with your IT department about them providing access to anti-virus software. While it should do scans in the background, if you notice any of the above issues, tell it to run a full system diagnosis.</li>
</ol>
<ol start="4">
<li><strong> </strong><strong>Don’t access private data<br /> </strong>Until your issue has been resolved, do not attempt to access the company network or open any private data. If a hacker is monitoring your computer through malware, you run the risk of giving them access to that information.</li>
</ol>
<p>While human error will never be eliminated, we can all take steps to increase our awareness and cyber safety to lower our risk.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_2_3 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_center et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Want a reference to share with family, friends and coworkers? Download our checklist to make your most secure home office environment.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_button_module_wrapper et_pb_button_0_wrapper  et_pb_module ">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://thirdrock.com/wp-content/uploads/Third-Rock-Home-Office-Cybersecurity-Checklist-2020.pdf" target="_blank">Download your checklist</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/04/23/cyber-safety-for-working-at-home/">Cyber Safety for working at home</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9042</post-id>	</item>
		<item>
		<title>EXEMPT is not a FREE PASS with 23 CRR 500 NY DFS</title>
		<link>https://thirdrock.com/blog/2020/01/31/exempt-is-not-a-free-pass-with-23-crr-500-ny-dfs/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 31 Jan 2020 15:00:00 +0000</pubDate>
				<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8754</guid>

					<description><![CDATA[<p>Exempt. When we hear that word, we think about being “off the hook” or that we have immunity. We feel free of meeting the same expectation as someone else. &#160;We’ve [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2020/01/31/exempt-is-not-a-free-pass-with-23-crr-500-ny-dfs/">EXEMPT is not a FREE PASS with 23 CRR 500 NY DFS</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="has-normal-font-size">Exempt. When we hear that word, we think about being
“off the hook” or that we have immunity. We feel free of meeting the same expectation
as someone else. &nbsp;We’ve escaped fulfilling
requirements.</p>



<p class="has-normal-font-size">Not so fast! If you’re an insurance broker with clients in New York,
the NY Department of Financial Services (NYDFS) 23 NYCRR 500 cybersecurity
regulations still apply to your company.&nbsp;
Exempt means most brokers, bankers and all other financial service
organizations need to complete a risk assessment and attest to them before <strong>April
15, 2020</strong> to avoid fines and penalties.</p>



<h3 class="wp-block-heading"><strong>I’m a small, exempt, business. Why is compliance important?</strong></h3>



<p class="has-normal-font-size">Often times, small to medium sized companies get the raw end of the
deal when it comes to compliance. Higher expectations usually mean more money
and more personnel, which is easier said than done.</p>



<p class="has-normal-font-size">NYDFS recognizes how cybercrime is wreaking havoc on the financial
industry.&nbsp; They want even the smallest
companies to have basic security in place to best protect their clients and
themselves. Why? Cyber criminals know small and medium sized companies tend to
have lower security in place, making them a perfect target. In fact, according
to Verizon’s Data Breach Report, 43% of cyber-attacks targeted small
businesses.&nbsp; NYDFS is leading the nation
in getting the industry more cybersecure at all levels.</p>



<div class="wp-block-image"><figure class="alignleft size-medium"><img fetchpriority="high" decoding="async" width="286" height="300" src="//i1.wp.com/thirdrock.com/wp-content/uploads/blog-pullout-286x300.png" alt="Reserved: NYDFS regulation 500.19(a)(1) – You are entitled to this exemption when a Covered Entity has fewer than 10 employees, including independent contractors.  This is a limited exemption and you must still design and implement a cybersecurity program that meets some but not all the regulatory requirements.  This includes submitting an annual Certification of Compliance.


" class="wp-image-8761" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/blog-pullout.png?resize=286%2C300&amp;ssl=1 286w, https://i0.wp.com/thirdrock.com/wp-content/uploads/blog-pullout.png?w=366&amp;ssl=1 366w" sizes="(max-width: 286px) 100vw, 286px" /></figure></div>



<p></p>



<p></p>



<h3 class="wp-block-heading"><strong>IT manages our cyber risk, right?</strong></h3>



<p class="has-normal-font-size">This is where the false sense of security
is with many insurance brokers and organizations. Most IT departments or Manage
Service Providers (MSPs) are focused on technology and data access.&nbsp; They don’t know if you are conducting cyber
security awareness training for your employees or if you have accurate security
measures in place for vendors.</p>



<p class="has-normal-font-size">NYDFS wants businesses to move to a holistic and vigilant approach by
building a cyber resilient culture that goes beyond technology.&nbsp; To outpace the cyber criminals, you must
create a culture of cybersecurity within your company that covers your people,
processes, technology and vendors.</p>



<p class="has-normal-font-size">Not sure of your next step?&nbsp; Here
is a break down and what you need to do before April 15, 2020:</p>



<p></p>



<p></p>



<p></p>



<p></p>



<h3 class="wp-block-heading"><strong>Compliance starts with knowing your risk across your organization</strong></h3>



<p class="has-normal-font-size">All financial services, regardless of size, must do the following to design and implement a cybersecurity program to meet regulations.  </p>



<p class="has-normal-font-size">1 &#8211; <span style="font-size: inherit;">Conduct a proper risk assessment that covers </span><strong style="font-size: inherit;">14 topics around people, processes, technology and vendors.</strong></p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?fit=1024%2C488&amp;ssl=1" alt="" class="wp-image-8762" width="823" height="392" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?w=1889&amp;ssl=1 1889w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=300%2C143&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=1024%2C488&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=768%2C366&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=1536%2C732&amp;ssl=1 1536w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=1080%2C515&amp;ssl=1 1080w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=1280%2C610&amp;ssl=1 1280w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=980%2C467&amp;ssl=1 980w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=480%2C229&amp;ssl=1 480w" sizes="(max-width: 823px) 100vw, 823px" /></figure></div>



<p class="has-normal-font-size">2 &#8211; Make sure you have policies, procedures, and documentation that covers the 14 areas. </p>



<p class="has-normal-font-size">3 &#8211; NYDFS requires documentation for several plans: <em>(Make sure you check with your IT and/or IT provider you have to make sure these plans are available regarding cyber breach!)</em></p>



<figure class="wp-block-table is-style-stripes"><table><tbody><tr><td><strong>Risk Management Plan   </strong></td><td><em>Outlines what you are doing to   prevent cybercrime, improve cybersecurity and information protection and reduce cyber risk</em>   </td></tr><tr><td><strong>Incident Response Plan </strong>  </td><td><em>Details action to respond to an incident across your organization</em>   </td></tr><tr><td><strong>Business Continuity/Disaster Recovery Plan   </strong></td><td><em>Details actions to minimize and recover from a breach   across your organization</em>   </td></tr><tr><td><strong>Breach Notification Plan </strong>  </td><td><em>Defines who you need to notify, when to notify and how to notify to avoid penalties and limit liabilities</em>   </td></tr></tbody></table></figure>



<h3 class="wp-block-heading"><strong>Lacking resources, time and expertise to get NYDFS 500
compliant by April 15, 2020?</strong></h3>



<p class="has-normal-font-size">We understand that compliance can feel overwhelming. It seems
expensive, difficult, and almost unattainable.&nbsp;
The deadline looks like a huge mountain you have to climb.&nbsp; At Third Rock, we offer <a href="https://thirdrock.com/nydfs/">CyberCompass®,</a> a self-guided
automation tool to make your compliance journey easier and affordable while
still meeting the deadline. &nbsp;</p>



<p class="has-normal-font-size">CyberCompass® is automated, cloud-based compliance
software with built-in expertise that translates NYDFS government requirements
into layman’s terms. It does most of the heavy lifting for your risk
assessment, analysis, remediation and compliance documentation- including
updated policies and procedures and all the required plans. There is no
software to download or install and it can be accessed anywhere. <a href="https://youtu.be/0STdfcFqjLg">Click here</a> for a quick video about how CyberCompass® works with NYDFS
compliance. &nbsp;<strong>Note: If you are an ELANY
member, check out this CyberCompass</strong><strong>®</strong><strong> offer to </strong><a href="https://elany.org/CyberSecurityCompliance.aspx"><strong>ELANY members!</strong></a><strong></strong></p>



<p class="has-normal-font-size">Need assistance and want a compliance coach? Third Rock offers
affordable expertise to help you get to the deadline.

Don’t let cyber uncertainty keep you from
protecting your business and your clients. <a href="mailto:info@thirdrock.com?subject=Tell%20me%20more%20about%20CyberCompass™">Contact us today</a> and see how we can prepare you for the NYDFS
deadline and to best protect your clients and business.



</p>
<p>The post <a href="https://thirdrock.com/blog/2020/01/31/exempt-is-not-a-free-pass-with-23-crr-500-ny-dfs/">EXEMPT is not a FREE PASS with 23 CRR 500 NY DFS</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8754</post-id>	</item>
		<item>
		<title>Prevention is Cheaper than Correction</title>
		<link>https://thirdrock.com/blog/2019/11/22/prevention-is-cheaper-than-correction/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Fri, 22 Nov 2019 15:00:59 +0000</pubDate>
				<category><![CDATA[In the News]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA Security]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8681</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/11/22/prevention-is-cheaper-than-correction/">Prevention is Cheaper than Correction</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>The healthcare industry led the nation in regulations for information security. In an effort to protect private health information (PHI), healthcare organizations are required to protect patient data against <em>any reasonably anticipate threats or hazards</em>.  You are required to perform risk assessments, but knowing your risk is not enough. Steps must be taken to fix issues and prevent data loss. Most other industries and states are joining the bandwagon with regulations of their own. The basics are the same: do your due diligence to protect data or face the consequences.</p>
<p>&nbsp;</p>
<h2><em>The Breach</em></h2>
<p>The University of Rochester Medical Center (URMC) recently agreed to a $3,000,000 settlement with the Office of Civil Rights (OCR). URMC reported data loss in 2013 when an unencrypted flash drive was lost. They again reported a breach when a personal laptop with unencrypted ePHI was stolen from a treatment facility. The fine may seem steep when you think that only 43 patients’ data was on the stolen laptop. The bigger issue, however, was the lack of progress in breach prevention from the first to the second incident.</p>
<p><em style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">The Cost</em></p>
<p><span style="font-size: 14px;">Beyond the fine to the OCR, breaches can cost a company much more. According to the IBM Security Cost of a Data Breach Report 2019, healthcare is the industry with the highest average cost at $6.45 million, not including fines. Lost business was the largest contributing factor to this total, accounting for 36% of the total cost. Other factors include detection and reporting, notification of affected parties and post breach clean up.</span></p>
<p> <em style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">Corrective Action</em></p>
<p><span style="font-size: 14px;">The list of requirements mandated by the OCR look very similar to the actions that are expected to prevent the breach in the first place.</span></p>
<ul>
<li>Conduct a Risk Analysis</li>
<li>Implement a Risk Management Plan</li>
<li>Implement customized Policies and Procedures</li>
<li>Train your staff</li>
<li>Create and maintain a body of compliance evidence</li>
</ul>
<h2><em>Prevention is always cheaper</em></h2>
<p><span style="font-size: 14px;">URMC is facing a guaranteed loss of $3,000,000 plus other expenses in breach clean up, notification and potential loss of business. The cost of our cyber risk management from assessment, reporting and remediation starts at $699/year for a small organization. Our automated tool, CyberCompass™, puts you in charge of your cyber risk, cybersecurity and compliance. Addressing all the requirements listed above, we also save you 70% of the typical cost, time and effort. An easy to use dashboard prioritizes your corrective actions, allowing you to work through them at your own pace. With built in regulations for most industries, start your move toward Cyber Confidence® today.</span></p>
<p> <span style="font-size: 14px;">Contact Us for more details or visit thirdrock.cybercompass.co</span></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/11/22/prevention-is-cheaper-than-correction/">Prevention is Cheaper than Correction</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8681</post-id>	</item>
		<item>
		<title>Is WannaCry still a threat?</title>
		<link>https://thirdrock.com/blog/2019/10/04/is-wannacry-still-a-threat/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Fri, 04 Oct 2019 16:45:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[WannaCry]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8437</guid>

					<description><![CDATA[<p>WannaCry ransomware took the world by surprise in 2017, crippling systems worldwide. Do you think it's been eradicated? Think again.</p>
<p>The post <a href="https://thirdrock.com/blog/2019/10/04/is-wannacry-still-a-threat/">Is WannaCry still a threat?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><em>If it’s not broke, don’t fix it</em></h2>
<p>Many people think that as long as their computer is running at a good speed and everything is working, there is no need to upgrade. Why spend money when you don’t have to, right? Wrong! The technology world cannot run on the mantra “if it’s not broke, don’t fix it” because in reality, it is broken and you just don’t know it. The proof can be seen when WannaCry ransomware was unleashed on the world in May 2017.</p>
<p>It crippled over 300,000 machines in 150 countries by targeting vulnerabilities in Windows operating systems, hitting Windows 7 the most. While Windows patched many of these vulnerabilities, their focus was, and still is, on their active operating systems, primarily Windows 10. According to Windows “every Windows product has a lifecycle. The lifecycle begins when a product is released and ends when it&#8217;s no longer supported.”<a href="#_ftn1" name="_ftnref1"><span>[1]</span></a> What does this mean for your security?</p>
<table>
<tbody>
<tr>
<td width="126">Operating System</td>
<td width="138">Availability Date</td>
<td width="156">End of Life Date</td>
<td width="150">End of Mainstream Support Date</td>
<td width="150">End of Extended Support Date</td>
</tr>
<tr>
<td width="126">Windows XP</td>
<td width="138">October 25, 2001</td>
<td width="156">January 9, 2007</td>
<td width="150">April 14, 2009</td>
<td width="150">April 8, 2014</td>
</tr>
<tr>
<td width="126">Windows Vista</td>
<td width="138">January 30, 2007</td>
<td width="156">October 22, 2010</td>
<td width="150">April 10, 2012</td>
<td width="150">April 11, 2017</td>
</tr>
<tr>
<td width="126">Windows 7</td>
<td width="138">October 22, 2009</td>
<td width="156">October 31, 2013</td>
<td width="150">January 13, 2015</td>
<td width="150">January 14, 2020</td>
</tr>
<tr>
<td width="126">Windows 8</td>
<td width="138">October 26, 2012</td>
<td width="156">October 31, 2014</td>
<td width="150">January 8, 2018</td>
<td width="150">January 10, 2023</td>
</tr>
<tr>
<td width="126">Windows 8.1</td>
<td width="138">October 18, 2013</td>
<td width="156">September 1, 2015</td>
<td width="150">January 8, 2018</td>
<td width="150">January 10, 2023</td>
</tr>
</tbody>
</table>
<h2><em>Windows Lifecycle</em></h2>
<p>According to Windows’ lifecycle policy<a href="#_ftn2" name="_ftnref2"><span>[2]</span></a>, a product is designed to have a 5 year mainstream support lifecycle followed by a 5 year extended support cycle. During the mainstream support, consumers have access to free incident support, security update support and the ability to request non-security updates. When a product moves to the extended support stage, security updates are still provided but no new features or design changes are available, and not all products are covered.</p>
<p>After the end of extended support, security updates greatly decrease. According to Microsoft, “the Extended Security Update (ESU) program is a last resort option for customers who need to run certain legacy Microsoft products past the end of support. It includes Critical and/or Important security updates for a maximum of three years after the product’s End of Extended Support date.” Who determines what is critical and important? Microsoft of course. It would have to be a huge security breach, such as WannaCry, to justify the amount of money it would take to push out an update.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Issues-with-XP.png?resize=595%2C248&#038;ssl=1" width="595" height="248" alt="" class="wp-image-8442 aligncenter size-full" scale="0" srcset="https://thirdrock.com/wp-content/uploads/Issues-with-XP.png 595w, https://thirdrock.com/wp-content/uploads/Issues-with-XP-480x200.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 595px, 100vw" /></p>
<p style="text-align: center;">Image from Windows end of XP Support<a href="#_ftn3" name="_ftnref3"><span>[3]</span></a></p>
<h2><em>What’s the risk?</em></h2>
<p>If you are running an antiquated system on your home computer, that is a risk to your security and your personal information. Not smart, but not a worldwide catastrophe. However, having one device on your work network running an old system could be devastating.</p>
<p>Though Windows created security updates to counter WannaCry, it is still active on over 145,000 devices worldwide according to a survey by Armis<a href="#_ftn4" name="_ftnref4"><span>[4]</span></a>. If even one device on your network is infected, it creates a gateway for hackers to breach your security.</p>
<p>Armis discovered that within the past 6 months, 60% of organization in the manufacturing industry and 40% in the healthcare industry experienced at least one WannaCry attack. Why? Because they tend to have older technology which makes them an easy target.</p>
<p style="text-align: center;"><em><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/tech-old-Windows-systems.png?resize=562%2C294&#038;ssl=1" width="562" height="294" alt="" class="wp-image-8440 aligncenter size-large" scale="0" /></em><em style="background-color: #ffffff; font-size: 12px; text-align: right;">Percentage of old Windows OS versions by industry type (Retail, Technology, Healthcare, Manufacturing)</em><span style="background-color: #ffffff; font-size: 12px; text-align: right;"><em style="font-size: 12px;">4</em></span></p>
<h2><em>What’s the cost?</em></h2>
<p>It is estimated that the global effort to counter the original WannaCry attack in 2017 cost around $4 billion, including $325 million paid out in ransoms. The combined efforts to stop the attacks created the false sense of security that WannaCry is no longer a threat. This is just not true.</p>
<p>In the same way that tech companies develop better, faster and more efficient software, the criminals do too. Hackers do not stay docile. If one means to infiltrate your system fails, they look for a different back door. Having the most up to date software means that Windows is fighting those battles for you. Keeping an unsupported operating system is the same as lowering the drawbridge to the attacking army.</p>
<p>According to IBM’s Cost of a Breach Report 2019, the average cost of a breach in the United States is $8.2 million. With the average size of a breach being 25,575 records, that equates to $242 per record. Lost business was the biggest contributor to this total cost, with the average business losing $1.42 million<a href="#_ftn5" name="_ftnref5"><span>[5]</span></a>. It is hard to recover from the lack of trust a customer feels when their information was stolen on your watch.</p>
<h2><em>Next steps</em></h2>
<p>Where do you go from here? Even with these numbers, you may be asking yourself, can we really afford to find and update every device that is out of date? The bigger question is, can your business survive the cost of a breach if you don’t?</p>
<p>Start with our Cyber Quick Check to see what your cybersecurity score is. Our Security Risk Assessment includes multiple scans that pinpoint weak areas that are most vulnerable, including a full inventory of what is on your network. Don’t let your records be held ransom. Fight back with the right security.  If you’re still running Windows XP, Windows 7 or Windows Vista start an upgrade program today.  Replace your computers that have the oldest versions of Windows with new computers with the latest version of Windows as you can afford it.</p>
<p>Check your cyber score at <a href="https://cyberquickcheck.com/thirdrock">here</a></p>
<p>&nbsp;</p>
<p><a href="#_ftnref1" name="_ftn1"><span>[1]</span></a> <a href="https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet">https://support.microsoft.com/en-us/help/13853/windows-lifecycle-fact-sheet</a></p>
<p><a href="#_ftnref2" name="_ftn2"><span>[2]</span></a> <a href="https://support.microsoft.com/en-us/help/14085">https://support.microsoft.com/en-us/help/14085</a></p>
<p><a href="#_ftnref3" name="_ftn3"><span>[3]</span></a> <a href="https://www.microsoft.com/en-us/microsoft-365/windows/end-of-windows-xp-support">https://www.microsoft.com/en-us/microsoft-365/windows/end-of-windows-xp-support</a></p>
<p><a href="#_ftnref4" name="_ftn4"><span>[4]</span></a> <a href="https://armis.com/wannacry/">https://armis.com/wannacry/</a></p>
<p><a href="#_ftnref5" name="_ftn5"><span>[5]</span></a> IBM Security and Ponemon Institute. Cost of a Data Breach Report 2019. <a href="https://www.ibm.com/downloads/cas/ZBZLY7KL">https://www.ibm.com/downloads/cas/ZBZLY7KL</a></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2019/10/04/is-wannacry-still-a-threat/">Is WannaCry still a threat?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8437</post-id>	</item>
		<item>
		<title>Key Themes at Texas Health Care Security &#038; Technology Conference</title>
		<link>https://thirdrock.com/blog/2018/05/08/key-themes-at-texas-health-care-security-technology-conference/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Tue, 08 May 2018 14:00:20 +0000</pubDate>
				<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[continuous improvement process]]></category>
		<category><![CDATA[cyber risk management]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[financial impact of a breach]]></category>
		<category><![CDATA[guidance and remedies]]></category>
		<category><![CDATA[holistic approach]]></category>
		<category><![CDATA[holistic cyber risk management]]></category>
		<category><![CDATA[incident response plan]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[team sport]]></category>
		<category><![CDATA[Texas Health Care Security & Technology Conference]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5529</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/05/08/key-themes-at-texas-health-care-security-technology-conference/">Key Themes at Texas Health Care Security &#038; Technology Conference</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5548 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/02C86071.jpg?resize=200%2C300&#038;ssl=1" alt="Hats off to Fernando Martinez and his team" width="200" height="300" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/02C86071.jpg?resize=200%2C300&amp;ssl=1 200w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02C86071.jpg?resize=768%2C1152&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02C86071.jpg?resize=683%2C1024&amp;ssl=1 683w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02C86071.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02C86071.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 200px) 100vw, 200px" /></p>
<p>Last month Robert Felps and I were fortunate to attend THA’s inaugural Texas Health Care Security &amp; Technology Conference. Great speakers, wonderful host and facility, collegiate atmosphere – a great learning experience overall. Hats off to Fernando Martinez, THA&#8217;s Chief Digital Officer, and his team for a great couple of days. Here&#8217;s a brief recap of the key takeaways.</p>
<p><strong>REALITY</strong></p>
<ol>
<li><strong>Cyber threats are dynamic. </strong><a href="https://www.linkedin.com/in/bvirtue">Bill Virtue</a> reminded us that there have been more than 4000 ransomware attacks per day since the beginning of 2016 (that’s 2,892,000 attacks in 2 years!), and <a href="https://www.linkedin.com/in/mechols">Michael Echols</a> reported that the cyber criminals are continually learning and sharing information.</li>
</ol>
<ol start="2">
<li><strong>Patient safety is at stake.</strong> <a href="https://www.linkedin.com/in/yatessecurity">Randy Yates</a>, <a href="https://www.linkedin.com/in/william-phillips-ab18047">Bill Phillips</a>, and <a href="https://www.linkedin.com/in/bobchaput">Bob Chaput</a> all gave examples of how the proliferation of medical IoT presents an increasing risk of patient harm if an attack shuts down or alters the performance of both diagnostic and treatment equipment, including CAT scanners, ultrasound machines, infusion pumps, and ventilators.<strong style="font-size: 12px;"> </strong></li>
</ol>
<ol start="3">
<li><strong>The real financial impact of a breach can be 10x the OCR fine!</strong> The hard costs of notifications can add up quickly, the most common being legal fees, lawsuits, technology support, forensics experts, increased marketing costs, and increased staff time. The less tangible costs of brand damage will be evident in the bottom line. The examples were sobering.</li>
</ol>
<p>Before everyone fell into complete despair, however, each speaker also offered guidance and remedies – as Bob Chaput of Clearwater put it, “No matter where you are, there <em><u>is</u></em> a path forward.” Below are key themes of the speakers’ recommendations, which I’ve labeled “reality <em>management</em>” because another key takeaway from the conference was that there is no such thing as being “done” with cybersecurity because cyber risk management is an ongoing process.</p>
<p><strong>REALITY MANAGEMENT</strong></p>
<ol>
<li><strong>Cybersecurity <em>is</em> risk management.</strong> This was the title of Michael Echols&#8217; presentation and pretty much sums up all the points that follow.</li>
<li><strong><strong>Cybersecurity is a team sport.</strong></strong> IT cannot and should not be managing cybersecurity in isolation. Everyone in the C-suite needs to understand the role they play in keeping patient data safe and the steps they need to take to get their managers and staff on board.</li>
<li><strong>A Security Risk Assessment is the essential first step.</strong> “You can’t secure your system if you don’t know where the vulnerabilities are.”</li>
<li><strong>Any device or equipment that connects to the network must be included in the SRA</strong>. Even devices that don’t tie directly into the EHR, such as a remote-controlled thermostat on the blood refrigeration unit – or the aquarium in the waiting area! – can be a point of entry for a malware attack.</li>
<li><strong>Cybersecurity requires a holistic, programmatic approach</strong>.<img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5551 size-medium" style="margin-left: 10px; margin-top: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/02F05316.jpg?resize=300%2C200&#038;ssl=1" alt="Cybersecurity is a team sport | tug of war" width="300" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/02F05316.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02F05316.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02F05316.jpg?resize=1024%2C683&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02F05316.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02F05316.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" /> A single, new cybersecurity technology will not make your organization secure. Once the vulnerabilities have been identified via the security risk assessment, addressing those vulnerabilities will require administrative action, process improvements, and staff education and reinforcement, as well as technology adjustments. See #2 – <em>cybersecurity is a team sport.</em></li>
<li><strong>Establish an incident response plan – and practice it regularly.</strong> Organizations that prepare recover faster and incur fewer costs – hard and soft costs &#8211; in the event of a ransomware attack or other breach.</li>
<li><strong>Bottom line: Start now – and continue! </strong>Cyber risk management is a continuous improvement process.</li>
</ol>
<p>In summary: (1) the threat is real and persistent; (2) technology alone won&#8217;t solve the problem.</p>
<p>If you’ve been an active cybersecurity player, there are few surprises here. Hopefully, however, it is reassuring to hear that you’re on the right path, and you’re not alone – hospital executives across the state and across the country are working hard to get out of the fire-fighting business and into holistic cyber risk management.</p>
<p style="text-align: center;"><strong>Building a CyberConfident™ World</strong></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/05/08/key-themes-at-texas-health-care-security-technology-conference/">Key Themes at Texas Health Care Security &#038; Technology Conference</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5529</post-id>	</item>
		<item>
		<title>Shortage of Qualified Cybersecurity Workers: “…the greatest cyber risk of all.”</title>
		<link>https://thirdrock.com/blog/2018/01/17/shortage-of-qualified-cybersecurity-workers-the-greatest-cyber-risk-of-all/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Wed, 17 Jan 2018 20:00:53 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cybersecurity career options]]></category>
		<category><![CDATA[cybersecurity professional]]></category>
		<category><![CDATA[cybersecurity training]]></category>
		<category><![CDATA[cybersecurity worker shortage]]></category>
		<category><![CDATA[occupational outlook]]></category>
		<category><![CDATA[on-the-job training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5020</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/17/shortage-of-qualified-cybersecurity-workers-the-greatest-cyber-risk-of-all/">Shortage of Qualified Cybersecurity Workers: “…the greatest cyber risk of all.”</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3604" style="margin-top: 5px; margin-right: 12px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Blue-Cyber-Security-key-on-grey-keyboard-1.jpg?resize=200%2C133&#038;ssl=1" alt="" width="200" height="133"></p>
<p>The <a href="https://iamcybersafe.org/gisws/">2017 Global Information Security Workforce Study (GISWS)</a> released in February 2017 forecast a shortage of 1.8 million cybersecurity workers by 2020, while a <a href="https://cybersecurityventures.com/jobs/">study by Cybersecurity Ventures</a> estimates “3.5 million unfilled cybersecurity jobs” by 2021. While the projected magnitude of the shortfall varies from one study to the next, government experts, consultants, and pundits alike are unanimous in predicting that the current shortage of qualified cybersecurity workers will only get worse for the foreseeable future, a situation <a href="https://www.csoonline.com/article/3199016/security/cisco-and-ibm-announce-historic-cybersecurity-partnership.html">Steve Morgan</a> has called &#8220;the greatest cyber risk of all.&#8221;</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5036" style="margin-top: 10px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training-Courses-in-white-on-blue-key.jpg?resize=200%2C133&#038;ssl=1" alt="" width="200" height="133"></p>
<p>There is less agreement about why the shortage exists and, therefore, how to fix it. &nbsp;The traditional school of thought is that educational institutions haven’t prepared enough graduates to meet the growing need. The implied solution from this perspective is to increase educational capacity by creating new programs and increasing enrollments in all programs through better marketing and outreach efforts. Outspoken critics of this perspective, however, say that cybersecurity is <em>not</em> an entry-level position and that graduates of cybersecurity programs lack the technical depth required to be effective.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-5034" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training-and-Development-in-white-on-blue-key.jpg?resize=198%2C132&#038;ssl=1" alt="" width="198" height="132"></p>
<p>These critics offer an alternative perspective – cybersecurity professionals are not trained in the classroom but must be developed on the job after gaining expertise in IT operations. So rather than casting about externally for cybersecurity talent that isn’t available, IT managers should be looking within their own ranks for people who could be trained in security. For instance, in a 2015 <em>Computerworld </em>column, “<a href="https://www.computerworld.com/article/2979858/it-skills-training/the-myth-of-the-cybersecurity-skills-shortage.html">The myth of the cybersecurity skills shortage</a>,” Ira Winkler wrote, “The best security practitioners have experience in the technology and processes that they are supposed to secure…If you have no experience as a system administrator, you cannot maintain the security of a system.” He goes on to say that most of his work as a security professional has been to shore up poorly designed, poorly configured, and poorly maintained systems, which requires IT knowledge, rather than using hacking knowledge he gained in his training. But this perspective also has critics.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5035" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Build-Talent-in-white-on-blue.jpg?resize=200%2C133&#038;ssl=1" alt="" width="200" height="133"></p>
<p>A third point of view is that IT managers who only look for security professionals with IT/computer science credentials are creating the shortage through their own myopia. In a <a href="https://hbr.org/2017/05/cybersecurity-has-a-serious-talent-shortage-heres-how-to-fix-it"><em>Harvard Business Review</em></a> article, Marc van Zadelhoff, General Manager of IBM Security, describes IBM’s approach of creating “new collar” jobs. They look for people with “unbridled curiosity, passion for problem solving, strong ethics, and an understanding of risks” – characteristics that can’t be taught – and then train them in the necessary technical skills through on-the-job programs, vocational and community college courses, and industry certification programs, such as those offered by <a href="https://www.isc2.org/">(ISC)<sup>2</sup></a>. Supporting this view is the finding in the Global Information Security Workforce Study that 87% of current cybersecurity workers began their career in another field, some in other IT roles but many in non-IT fields.</p>
<p><strong>So what’s the answer?</strong></p>
<p>Like most difficult organizational problems, there is no single cause and, therefore, no single solution. Addressing the cybersecurity personnel shortage will require focused and creative efforts on the part of educators, managers, trade associations, and employees alike.</p>
<ul>
<li>Educators need to work closely with industry to identify the needed knowledge and skills to integrate into existing curricula or to serve as the basis for new programs.</li>
<li>Managers, meanwhile, with support from HR and other training resources, may need to create their own internal on-the-job training programs for existing personnel, creating opportunities for lateral moves into security positions.</li>
<li>Managers may also need to cast a wider net for potential security talent as IBM has done, looking for people with the necessary character and an eagerness to learn outside the IT ranks.</li>
<li>Trade associations, such as <a href="http://www.issa.org/">ISSA</a> and <a href="https://www.isc2.org/">(ISC)<sup>2</sup></a>, can pool resources to raise awareness of high school, college, <em>and</em> midcareer professionals of available cybersecurity career options and the paths available for acquiring the needed knowledge and skills.</li>
<li>Workers already in cybersecurity positions will need to adapt to their role as teacher/mentor to those moving into security positions, respecting those with non-IT backgrounds as possibly bringing in fresh perspectives.</li>
</ul>
<p>Finally, even if there were an excess of cybersecurity pros, they cannot safeguard an organization alone. All workers, managers, and executives, from the front desk and loading dock up to the C-suite must come to recognize that cybersecurity is now a part of <em>everyone</em>’s job! More on this in the weeks to come.</p>
<p>Is a personnel shortage putting your organization at risk? Contact us for a third-party Security Risk Assessment to find out: 512.310.0020 or <a href="mailto:info@thirdrock.com">info@thirdrock.com</a>.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/01/17/shortage-of-qualified-cybersecurity-workers-the-greatest-cyber-risk-of-all/">Shortage of Qualified Cybersecurity Workers: “…the greatest cyber risk of all.”</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5020</post-id>	</item>
		<item>
		<title>Cyber Liability Insurance Becoming More Difficult to Purchase</title>
		<link>https://thirdrock.com/blog/2018/01/16/cyber-liability-insurance-becoming-more-difficult-to-purchase/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 16 Jan 2018 15:00:37 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[cyber breach protection]]></category>
		<category><![CDATA[cyber liability insurance]]></category>
		<category><![CDATA[cyber risk assessment]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach insurance]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4936</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/16/cyber-liability-insurance-becoming-more-difficult-to-purchase/">Cyber Liability Insurance Becoming More Difficult to Purchase</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4947 size-full" style="margin-top: 8px; margin-right: 12px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/cyber-insurance.jpg?resize=267%2C200&#038;ssl=1" alt="" width="267" height="200" /></p>
<p>Hopefully, you&#8217;ve realized one of your pieces of defense in the cybersecurity war is Cyber Liability Insurance or Data Breach Insurance, sometimes called Cyber Insurance.  What you may not know is that cyber liability insurance is getting more difficult to obtain.  Several insurance companies we&#8217;ve spoken with have reported that in 2017, cyber liability claims outpaced other claim types, including medical liability claims!  In very simple terms, this means that cyber liability insurance is costing the insurance companies a lot of money.  As you know insurance companies are not in business to lose money, so they are now taking steps to reduce their losses.</p>
<p><strong>More Difficult to Acquire</strong></p>
<p>As the cost of providing cyber insurance increases, the insurance companies look for ways to offset those costs or losses.  One of the obvious ways is to raise premiums, but that&#8217;s not good for sales.  Another way is to better evaluate each client and charge according to their risks or liabilities.  The insurance companies have done this by asking more technical questions during the application process to ascertain how well the client is protecting the valuable data.  The smart insurance companies are now requiring a Cybersecurity Risk Assessment (aka &#8220;HIPAA lite&#8221;) before quoting the price of cyber insurance.</p>
<p><strong>More Expensive</strong></p>
<p>One of the effects of all the cyber attacks is a rise in cyber liability premiums.  Although we couldn&#8217;t find reliable estimates of the increase in premiums for cyber liability insurance, we did talk to several insurance companies that estimated premiums have more than doubled in less than 18 months.  Whether they have gone up 5% or 100% isn&#8217;t the issue &#8211; the issue is that cyber attacks are so common that the insurance companies are having to pay out on claims and they plan to recover their losses.  Take note of this and take action.  Harden your systems, make sure your backups can be restored successfully and buy cyber insurance from a reputable company (and read the fine print).</p>
<p><strong>More Needed</strong></p>
<p>Most small businesses either don&#8217;t have cyber liability insurance or not near enough.  The average remediation effort after suffering a cyber breach and loss of data is over $800,000 dollars.  Of small businesses that actually have cyber liability insurance, the estimated average coverage is $100,000.  That&#8217;s leaving them with a $700,000 shortfall to pay out of pocket.  That doesn&#8217;t include loss of reputation, revenue, and clients.</p>
<p><strong>Take Aways</strong></p>
<ol>
<li>Perform a cyber risk assessment that complies with the government-required standards for your industry. (HIPAA, NIST 171, GDPR, FISMA, NAIC&#8217;s Insurance Data Security Model Law). The risk assessment will give you the information you need to reduce your probability of a cyber breach and if you are breached, the information needed to reduce the impact. Reducing the risk of a breach <em>and</em> reducing the impact if a breach should occur should also translate into reducing your cyber insurance premiums.</li>
<li>Based on the risk assessment results, take the necessary corrective actions to harden your cyber defenses.</li>
<li>Consider purchasing cyber liability insurance. If you already have cyber liability insurance, you might consider purchasing more than you already have.</li>
<li>Do the risk assessment first!</li>
</ol>
<p>Do you need help performing a cyber risk assessment?  Email us at <a href="mailto:info@thirdrock.com?subject=National%20Health%20IT%20Week" target="_blank" rel="noopener noreferrer">info@thirdrock.com</a> or give us a call at 512.310.0020.  We&#8217;d be more than happy to help!</p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/01/16/cyber-liability-insurance-becoming-more-difficult-to-purchase/">Cyber Liability Insurance Becoming More Difficult to Purchase</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4936</post-id>	</item>
		<item>
		<title>MACRA 2017 deadlines are coming. Do you have a Security Risk Assessment scheduled before December 31st?</title>
		<link>https://thirdrock.com/blog/2017/11/02/macra-2017-deadlines-are-coming-do-you-have-a-security-risk-assessment-scheduled-before-december-31st/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Thu, 02 Nov 2017 14:00:41 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA fines]]></category>
		<category><![CDATA[MACRA]]></category>
		<category><![CDATA[PHI]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4763</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/11/02/macra-2017-deadlines-are-coming-do-you-have-a-security-risk-assessment-scheduled-before-december-31st/">MACRA 2017 deadlines are coming. Do you have a Security Risk Assessment scheduled before December 31st?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Right now the healthcare industry is in the final race to complete the requirements for MACRA, the new reimbursement scheme for Medicare. Thousands of dollars are at risk – failing to satisfy the MACRA requirements in 2017 will result in payment reductions for all of 2019!</p>
<p>Submerged within the 2,398 pages of MACRA lies a key requirement for eligibility &#8211; completing a security risk assessment (SRA). The SRA is a “core requirement.”  Without an SRA, a healthcare practice can undo all their other efforts to achieve the high score needed to get full Medicare reimbursements and bonuses. In fact, <em><u>without an SRA, a practice is likely to face payment penalties in 2019</u></em>.</p>
<p>Be aware of two misunderstandings that give healthcare practices a false sense of security in meeting the annual requirement for a Security Risk Assessment:</p>
<ul>
<li><strong>“My EHR is HIPAA-compliant, so I don’t need to do an SRA.”</strong></li>
</ul>
<p>Simply <u>installing a certified electronic health record (EHR) does not fulfill the Meaningful Use or MACRA requirement for a security risk analysis</u>.  Even with a certified EHR, <em><strong>you must perform a full security risk analysis</strong></em> to ensure that you are properly safeguarding all the protected health information (PHI) you maintain, whether in paper or electronic form.</p>
<ul>
<li><strong>“My IT service takes care of all that security stuff.” </strong></li>
</ul>
<p><u>Don’t assume your IT service provider is taking care of security</u>.  IT companies typically believe they are only responsible for installing a firewall and anti-virus application and keeping your computers running. <em><strong>They assume the Practice Manager is handling all other aspects of system security</strong>,</em> including policies and procedures, staff training, password maintenance, mobile device management, and facility security.</p>
<p>The Security Risk Assessment isn’t just busy-work. Completing an SRA and fixing any identified gaps will increase your cybersecurity and complete a critical HIPAA requirement, saving you thousands in penalties and fines as well as protection from a breach.</p>
<p>Doing an SRA should be an important year-end &#8220;To do.&#8221;  It will give you peace of mind, letting you go into the New Year feeling more protected and positioned to increase your revenue. Don’t miss out!</p>
<p style="text-align: center;">If you have any questions about performing a Security Risk Assessment,</p>
<p style="text-align: center;">please contact us at: <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a>.</p>
<p style="text-align: center;"><strong>Protect Your Patients.  Protect Your Practice.  Protect Yourself.™</strong></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/11/02/macra-2017-deadlines-are-coming-do-you-have-a-security-risk-assessment-scheduled-before-december-31st/">MACRA 2017 deadlines are coming. Do you have a Security Risk Assessment scheduled before December 31st?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4763</post-id>	</item>
		<item>
		<title>HIPAA Compliance is a Business Decision</title>
		<link>https://thirdrock.com/blog/2017/10/18/hipaa-compliance-is-a-business-decision/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Wed, 18 Oct 2017 15:10:57 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Business Associates]]></category>
		<category><![CDATA[business decision]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[fines]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[OCR audits]]></category>
		<category><![CDATA[remediation costs]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4706</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/10/18/hipaa-compliance-is-a-business-decision/">HIPAA Compliance is a Business Decision</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-2261 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/poker_chips_and_dice-300x297.jpg?resize=300%2C297&#038;ssl=1" alt="" width="300" height="297" />A couple of weeks ago, I was talking with a technology vendor who is starting to move into the healthcare space. Their technology isn’t used in the creation or manipulation of patients’ protected health information (PHI), but they do store information on behalf of healthcare organizations that could <em>potentially </em>include PHI. They wanted to know, “Are we required to comply with HIPAA?” Technically – yes. On the other hand, there are hundreds of healthcare organizations and healthcare vendors who actively choose not to comply.</p>
<p>As a healthcare organization or vendor with narrow profit margins, it’s understandable that one might think of HIPAA as a deferrable expense. After all, what are the chances of an information breach? Of an OCR audit?</p>
<p>Unfortunately, the chances are significant &#8211; and growing. Consider these facts:</p>
<ul>
<li>A healthcare record is worth 100-300 times the value of a credit card record on the black market (i.e., $100-$300 per healthcare record vs. $1 per credit card account number). Consequently, cyber criminals are <em>targeting</em> healthcare organizations.</li>
<li>Healthcare organizations, in general, are very vulnerable to cyber attacks for a variety of reasons, including lack of personnel with cybersecurity expertise; years of under-investment in IT infrastructure; naivete regarding the threats; high staff churn; and poor physical facility controls.</li>
<li>The risk of an OCR audit is <em>very small</em>. The risk of a covered entity being breached is <em>very high. If breached, the risk of an OCR audit goes to 100%.</em></li>
<li>If a Covered Entity is breached and then audited, the risk of that Covered Entity’s Business Associates being audited is also very high.</li>
<li>When audited, organizations that can demonstrate they have taken all appropriate precautions will be fined at the lowest rate &#8211; or not at all. On the other hand, organizations that have actively neglected cybersecurity and HIPAA compliance will be fined at the &#8220;highest rate.&#8221; In fact, some recent fines levied by the OCR have exceeded what was previously thought to be the &#8220;maximum allowable.&#8221;</li>
<li>The fine is only a portion of the total breach remediation costs. Other costs include patient notification (approximately $4 per affected patient); credit monitoring for affected individuals (free to the patients) for 1-3 years; legal fees; class action lawsuit settlements; personnel time spent handling the remediation; and reputation loss.</li>
<li>Finally, HIPAA violations can now be prosecuted as both civil and criminal offenses.</li>
</ul>
<p>Whether and how to invest in cybersecurity training and technology and HIPAA compliance is a business decision only you can make based on your own ethics and risk tolerance. Be sure, however, to base your decision on facts. Up-to-date breach information across industries is available at the Identity Theft Resource Center (ITRC). A list of healthcare organizations fined for HIPAA violations following a breach can be found on the <a href="https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf">HHS OCR’s Breach Report list</a>. Whatever your choice, ensure that you have protected your customers’ data, protected your organization from the risk of data loss, and protected yourself by understanding and complying with all relevant laws.</p>
<h3 style="text-align: center;"><strong>Protect your Patients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/10/18/hipaa-compliance-is-a-business-decision/">HIPAA Compliance is a Business Decision</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4706</post-id>	</item>
		<item>
		<title>Could this breach have been prevented? – A new series</title>
		<link>https://thirdrock.com/blog/2017/09/26/could-this-breach-have-been-prevented-a-new-series/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Tue, 26 Sep 2017 14:00:37 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[HIPAA Training]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[continuous improvement]]></category>
		<category><![CDATA[culture of compliance]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA Security]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[leadership]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy training]]></category>
		<category><![CDATA[process improvement]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4572</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/26/could-this-breach-have-been-prevented-a-new-series/">Could this breach have been prevented? – A new series</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4087 size-medium" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/continuous-improvment-yellow-keyboard-key.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200" scale="0" style="font-size: 12px; margin-top: 5px; margin-right: 10px;" /></p>
<p>One of the first lessons of process improvement is that <em>preventing errors is much less expensive and time-consuming than remedying the damage after the fact</em>. The same is true for an information breach. The time and cost for installing new software, training staff members, and reinforcing policies and procedures pales in comparison to cleaning up the damage of an information privacy or security breach.</p>
<p>Recent headlines of multi-million-dollar OCR fines and the hundreds, thousands – even millions! – of lives affected suggest the scale of the damage to both businesses and individuals. The news reports rarely explain, however, exactly <em>how</em> the breach could have been averted. This is the first in a new series of articles using publicly reported breaches as teaching opportunities for breach prevention. These are not intended as an “I told you so” for the organizations breached – each incident could happen at almost any healthcare organization today. <em>The goal is for all of us to continuously improve our understanding of the risks to patient information and the options available to us for protecting that information without creating an oppressive atmosphere for our patients, staff, and visitors.</em></p>
<p><strong><em>Unauthorized photographs of a surgical patient</em></strong></p>
<p>This first example was reported in the <em>HIPAAJournal</em> just last week. Basically, surgical staff members photographed a patient’s genital injury using their personal phones and shared the photos with friends. Details of the incident are available in the <a href="https://www.hipaajournal.com/hospital-staff-discovered-taken-shared-photographs-patients-genital-injury-8968/">HIPAAJournal post</a>. What we want to focus on here is whether and how management could have prevented this breach.</p>
<p>This incident is particularly egregious because the information disclosed was so sensitive and because so many health care professionals and staff members – the very people charged with keeping the patient and his information safe – were complicit in the violation. I understand that in the face of such irresponsible behavior, a manager might be tempted to feel helpless &#8211; “I can’t watch every person every minute. What can I possibly do to make sure none of my staff ever do something stupid?” Here are some suggestions.</p>
<p><strong>Action 1: Policy disallowing use of personal phones in the OR (or any patient area) <em>for any reason</em></strong>.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="size-medium wp-image-4187 alignright" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?resize=1024%2C683&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_8815_00637.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>As a former frontline nurse, I understand the tendency to scoff at policy – “What good’s a policy? People will do whatever they want to anyway!” There’s some truth to that – practice never perfectly matches policy – but <em>what a policy does do is establish clear guidelines for expected behavior.</em></p>
<p>If the hospital wants staff to have mobile communications, they need to supply them with Vocera badges or other devices and not rely on staff members’ personal telephones. Personal phones can be used at the desk and in the break room, but not in patient areas – period. <em>Responsibility for enforcing the policy must be shared</em> by charge nurses and circulating nurses, not just the department manager or director. A charge nurse found not to be enforcing the policy could be suspended just as if s/he had been using the phone him or herself.</p>
<p><strong>Action 2:  Intensive staff training, retraining, and reinforcement</strong>.</p>
<p>The speed and shamelessness with which these staff members brandished their phones suggests gross ignorance of the HIPAA Privacy and Security Requirements <em>and</em> of the potential consequences for violating them – termination, civil charges and fines, and criminal charges that could include probation or jail time.  <em>Staff should receive comprehensive HIPAA training during their orientation before being given access to patients or PHI.</em> That <em>training should then be reinforced</em> with shorter refresher courses and/or routine discussions of patient privacy and information security in staff meetings, organizational Town Hall sessions, and online forums on the organization’s intranet.</p>
<p><strong>Action 3:  Leadership in the moment</strong>.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4149 size-medium" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=300%2C211&#038;ssl=1" alt="" width="300" height="211" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=300%2C211&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=768%2C540&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=1024%2C720&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" />In the OR, the anesthesiologist, the surgeon, and the circulating nurse all possess significant authority. Any one of these individuals could have called a halt, required everyone to power off their phones, sealed the room, and called hospital security to confiscate the phones until someone from IT could sit with each individual involved to clear the photos.</p>
<p>This action is still more Band-aid than prevention, but <em>it is the actions of leaders in the heat of the moment that either reinforce or undermine policy and training.</em> It did sound like the executives were taking the incident very seriously and had applied appropriate sanctions. It may also have been the case that the circulating nurse or surgeon brought the incident to the executives’ attention – that information wasn’t included in the article. The critical takeaway is that <em>protecting patient privacy, confidentiality, and information security are now as important a leadership responsibility as patient safety and infection control.</em></p>
<p>The above actions, taken together, are the pillars of creating a Culture of Compliance. Whether the focus of the compliance is HIPAA, CLABSI protocols, or hand washing – <em>all require clear expectations, appropriate training, and unrelenting leadership</em>. Culture is powerful – the trick is to create a culture that makes it easy – automatic – to <em>do the right thing</em>.</p>
<p>Our very best wishes to the patient and everyone at UPMC Bedford Memorial trying to remedy the situation.</p>
<p>If you need assistance establishing a <em>culture of compliance</em> please contact us at <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a></p>
<p style="text-align: center;"><strong>Protect Your Patients.  Protect Your Practice.  Protect Yourself.™</strong></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/09/26/could-this-breach-have-been-prevented-a-new-series/">Could this breach have been prevented? – A new series</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4572</post-id>	</item>
	</channel>
</rss>
