<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Technology Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/technology/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Wed, 03 Jul 2019 00:35:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Technology Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/technology/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Internet of Medical Things:  Real Security Threat or Hype?</title>
		<link>https://thirdrock.com/blog/2018/01/19/internet-of-medical-things-real-security-threat-or-hype/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Fri, 19 Jan 2018 15:15:11 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Technology]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[connected devices]]></category>
		<category><![CDATA[FDA]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Manufacturer Disclosure Statement for Medical Device Security]]></category>
		<category><![CDATA[medical devices]]></category>
		<category><![CDATA[Quality System Regulations]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5075</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/19/internet-of-medical-things-real-security-threat-or-hype/">Internet of Medical Things:  Real Security Threat or Hype?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-3047 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/mHealth-technolgy-sytstem-300x138.jpg?resize=300%2C138&#038;ssl=1" alt="" width="300" height="138" /></p>
<p>For decades, healthcare medical devices functioned as freestanding tools. Glucometers, lasers, infusion pumps, pressure monitors, neonatal incubators, heart monitors – each serving its unique function independently of the others. With the widespread implementation of electronic health records (EHRs), however, and the push for increased digitization of health information, these devices have increasingly been networked into the patient information ecosystem.  They now transmit PHI between a myriad of systems including the EHR system, bed management, supply chain management, and billing systems.</p>
<p>The variety and use of these devices have proliferated. The <a href="http://www.himss.org/medical-device-security">HIMSS Medical Device Security Workgroup</a> reports that hospitals and similar healthcare delivery organizations typically have “300% to 400% more medical equipment than IT devices.” In a study of US hospitals cited in <a href="https://www.wired.com/2017/03/medical-devices-next-security-nightmare/">Wired Magazine (3/02/17)</a>, <a href="https://www.zingbox.com/press-releases/survey-reveals-healthcare-it-decision-makers-approach-to-iot-security/">ZingBox reported</a> an average of 10-15 connected devices per bed. That translates into approximately 4500 connected medical devices for the average 300-bed community hospital &#8211; and up to 75,000 devices for a large metro medical center with 5,000 beds!</p>
<p><strong>Are devices vulnerable to hacking?</strong></p>
<p>To date, the number of medical device breaches and the number of patient records exposed by those breaches has been seemingly negligible when compared to the large-scale data losses due to hacks of healthcare organizations’ primary IT systems or losses of unencrypted mobile devices. But there have been hacks, and there are several reasons to expect medical devices to be increasingly exploited:</p>
<ul>
<li>As more medical device developers rely on off-the-shelf operating systems to speed development and/or facilitate integration with other systems, the vulnerabilities of the parent code are transferred to the devices, increasing their vulnerability.</li>
<li>The increased networking of devices makes them a more attractive target for hackers because they provide additional points of entry to other systems.</li>
<li>A Trend Micro study found a large number of devices to be discoverable on Shodan, a search engine routine for connected devices.</li>
</ul>
<p>In fact, <a href="https://www.darkreading.com/threat-intelligence/medical-devices-fall-short-in-security-best-practices/d/d-id/1328964">a study by Ponemon Institute</a> found that 67% of medical device makers <em>expect</em> an attack on their devices in the next 12 months!</p>
<p><strong>Didn’t the FDA pass regulations to fix this?</strong></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4973 " style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Red-notebook-of-Regulations.jpg?resize=248%2C186&#038;ssl=1" alt="" width="248" height="186" scale="0" /></p>
<p>Yes – and no, depending on who you ask. The FDA is quoted in many news articles saying that medical device manufacturers are responsible for complying with “quality system regulations” (QSRs), which include requirements for addressing cybersecurity risks, but both law firms and industry executives say the compliance environment remains murky:</p>
<ul>
<li>Some devices have been downgraded from “Class III” – high risk and mandatory compliance – to “Class I” – low risk and “unregulated,” though they still could pose a cybersecurity risk.</li>
<li>Once a device is in use, it’s not clear whether the device manufacturer or the healthcare delivery organization is responsible for continued patching as cyber threats evolve.</li>
<li>The FDA doesn’t actually test medical devices for their compliance with the QSRs.</li>
<li>Reporting of device malfunctions, including cybersecurity breaches, to the FDA is voluntary.</li>
</ul>
<p><strong>Know-how and budget are also factors.</strong></p>
<p>Because cybersecurity of devices is still a relatively new concern in the medical device and healthcare delivery industries, lack of knowledge regarding both the threat and the appropriate risk management responses remains a problem. The <a href="https://www.zingbox.com/press-releases/survey-reveals-healthcare-it-decision-makers-approach-to-iot-security/">ZingBox study</a> also found that 70% of healthcare IT decision-makers believe that the same security solutions used for laptops and servers are sufficient for all their connected medical devices, a misconception that the report goes on to explain.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5082 " style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/spreadsheet-financials-300x200.jpg?resize=242%2C161&#038;ssl=1" alt="" width="242" height="161" /></p>
<p>Despite two-thirds of medical device manufacturers anticipating an attack on their devices, only 15% of study respondents anticipate taking measures to mitigate the risk! Senior executives in the field say it usually comes down to budget and production deadlines. Because cybersecurity protections don’t improve device performance in terms of clinical care, it is often looked upon as a cost. Similarly, when cybersecurity flaws are discovered too far into the development process, decision makers often determine that the rework required to build in the cybersecurity protections is too costly. So devices go to market with <em>known</em> cybersecurity flaws.</p>
<p><strong>So what to do?</strong></p>
<p>As a healthcare delivery organization, you are the gatekeeper between the medical device vendors and patients. Regardless of who is technically at fault for a medical device breach, if a breach were to occur, it would be your patients’ information lost and your reputation damaged!  Thus it is up to you and your organization to set the standard for medical devices coming into your organization and to include medical devices in your annual security risk assessment.</p>
<p>Start by requesting information from your device vendors about each of the device types on your network using the <a href="http://www.himss.org/resourcelibrary/MDS2">Manufacturer Disclosure Statement for Medical Device Security ((MDS)<sup>2</sup>)</a> which was collaboratively developed by the National Electrical Manufacturers Association (NEMA) and the Health Information and Management Systems Society (HIMSS).</p>
<p>Finally, if you have questions about assessing the risk of an Internet-connected device or need help completing a comprehensive Security Risk Assessment, contact us at <a href="mailto:info@ThirdRock.com">info@ThirdRock.com</a> or 512.310.0020.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/01/19/internet-of-medical-things-real-security-threat-or-hype/">Internet of Medical Things:  Real Security Threat or Hype?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5075</post-id>	</item>
		<item>
		<title>2018 The Year of the Meltdown and Spectre</title>
		<link>https://thirdrock.com/blog/2018/01/12/2018-the-year-of-the-meltdown-and-spectre/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 12 Jan 2018 19:30:29 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[computer processors]]></category>
		<category><![CDATA[CPUs]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[hardware flaw]]></category>
		<category><![CDATA[hardware vulnerabilities]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4933</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/12/2018-the-year-of-the-meltdown-and-spectre/">2018 The Year of the Meltdown and Spectre</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">If you don&#8217;t read about cybersecurity and stolen data everyday then you probably don&#8217;t read much news.&nbsp; But, if you scan the news headlines once in a while you&#8217;re aware of the following:</p>
<ul>
<li>2014 &#8211; The Year of the Cyber Breach</li>
<li>2015 &#8211; The Year of the Healthcare Cyber Breach</li>
<li>2016 &#8211; The Year of the Cyber Attack (it&#8217;s common news)</li>
<li>2017 &#8211; The Year of Ransomware</li>
</ul>
<p>So, what will 2018 be dubbed?&nbsp; 2018 &#8211; The Year of the Meltdown?&nbsp; Wait, what meltdown?&nbsp; Or the Year of the Spectre?&nbsp; Is that a ghost or something else?&nbsp; Well unfortunately, two major hardware vulnerabilities have been discovered in almost all computer processors (CPUs).</p>
<p><strong>What&#8217;s the Problem?</strong></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4941 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/02D01523.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/02D01523.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02D01523.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02D01523.jpg?resize=1024%2C682&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02D01523.jpg?w=2160&amp;ssl=1 2160w" sizes="(max-width: 300px) 100vw, 300px" />Meltdown and Spectre are hardware vulnerabilities in most modern computer processors (CPUs).&nbsp; These critical flaws in the processor designs allow applications (computer software programs) to steal data from other applications running on the same processor.&nbsp; Normally applications are blocked from reading data from other applications unless they have been given &#8220;permissions.&#8221;&nbsp; But Meltdown and Spectre are hardware design flaws that allow this to happen.&nbsp; A malicious software program (malware) can read data from another legitimate application without providing appropriate permissions.&nbsp; This data may include your emails, passwords from browsers or password managers, instant messengers, EMRs, EHRs, practice management systems, billing systems, credit card processing systems, the list goes on and on.</p>
<p><strong>What to do?</strong></p>
<p>There&#8217;s not much to do about the hardware flaw, it will take years for all the hardware to be replaced with new computers. However, it is important to have your IT department or support firm apply the patches as they become available.&nbsp; It is also very important to ask all of your cloud providers to confirm that they have applied the patches to all of their affected hardware.</p>
<p>Linux and Windows patches are already available. Chromebooks updated to Chrome OS 63 are protected.</p>
<p>Android devices running the latest security update, are already protected, which includes the Google phones. Other vendor&#8217;s updates are expected to be delivered soon. Users of other devices will have to wait for the updates to be pushed out by third-party manufacturers, including Samsung, Huawei and OnePlus.&nbsp; So, know which devices still need to be updated and watch for the patches to become available and apply them as soon as you can.</p>
<p><strong>What&#8217;s the Impact?</strong></p>
<p>The potential impact is stolen protected or sensitive data; a data breach.&nbsp; But, even if you install the patches and prevent a breach there is the possibility the patches will degrade your computer CPU performance.&nbsp; On new CPUs (computers) the performance degradation may only be 5% based on what the experts are predicting.&nbsp; But on CPUs older than five years, experts are predicting much worse performance.&nbsp; Unfortunately, we&#8217;ll have to wait and see.</p>
<p><strong>More Info?</strong></p>
<p>For more details on Meltdown and Spectre visit the <a href="https://meltdownattack.com/">Meltdown Attack site</a> at <a href="https://meltdownattack.com/">https://meltdownattack.com/</a></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/01/12/2018-the-year-of-the-meltdown-and-spectre/">2018 The Year of the Meltdown and Spectre</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4933</post-id>	</item>
		<item>
		<title>Congress Addresses Medical Device Vulnerabilities</title>
		<link>https://thirdrock.com/blog/2017/09/07/congress-addresses-medical-device-vulnerabilities/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 07 Sep 2017 14:00:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[at risk]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[internet of things]]></category>
		<category><![CDATA[IoT devices]]></category>
		<category><![CDATA[legislation]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Medical Device Cybersecurity Act of 2017]]></category>
		<category><![CDATA[medical devices]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4442</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/07/congress-addresses-medical-device-vulnerabilities/">Congress Addresses Medical Device Vulnerabilities</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4445 " style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_18941_08286-300x200.jpg?resize=250%2C166&#038;ssl=1" alt="" width="250" height="166" /></p>
<p>The Medical Device Cybersecurity Act of 2017 was introduced on August 1, 2017 by Senator Richard Blumenthal (D-CT).  The new bill is intended to improve the security of medical devices and increase transparency. If passed, it would make healthcare organizations aware of the cyber capabilities of devices and the extent to which those devices have been tested.  Is this another law adding burden to a strained healthcare industry or a vital piece of legislation designed to protect the public?  Let’s see if this bill is really needed.</p>
<p>Recent global cyber-attacks established the vulnerability of several medical devices that could result in the theft of electronic Protected Healthcare Information (ePHI) or worse, the potential to cause patient injury or death.  The Wannacry virus infected both Siemens and Bayer medical devices.  You might think that isn’t such a big deal as Wannacry infected a wide range of companies and systems, including a considerable number of hospitals in England that were crippled as their IT systems were rendered useless with the ransomware.</p>
<p>But recent studies show that the medical device manufacturers are not investing in the cybersecurity of new medical devices.  Last year, the Department of Homeland Security issued an alert about the Pyxis Supply Station from CareFusion when the drug cabinet system was found to have over <strong>1,400 </strong>vulnerabilities.  This year researchers reviewed implantable cardiac devices and uncovered more than <strong>8,000</strong> security flaws in multiple devices.  It is interesting to note that a new form of MedJack malware, developed specifically to attack medical devices such as heart monitors and MRI machines, was discovered earlier this year.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4454" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_33594_69585-1.jpg?resize=200%2C133&#038;ssl=1" alt="" width="200" height="133" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_33594_69585-1.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_33594_69585-1.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_33594_69585-1.jpg?resize=1024%2C683&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_33594_69585-1.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_33594_69585-1.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 200px) 100vw, 200px" /></p>
<p>The explosion of Internet of Things (IoT) devices has manufacturers rushing devices to market to beat the competition and claim market share.  Devices that are not cyber-hardened in the design process and fully tested prior to delivery to the customer (Provider) place the burden of patient protection on the care environment; on the nurses, doctors and their IT support organization who are already overburdened and underfunded. (See our previous post for caregivers <a href="https://thirdrock.com/blog/2017/08/03/healthy-skepticism-your-best-cyber-defense/">Healthy Skepticism &#8211; Your Best Cyber Defense</a>)</p>
<p>If we step back and look at the situation, the patients (all of us) are at risk. We are at risk of having our identities stolen and at risk of suffering harm or even death.  In summary, I hope Congress passes this legislation quickly!</p>
<p>Join our free monthly <a href="http://thirdrock.us3.list-manage2.com/subscribe?u=1649a45c35ac1a873bb99bdb8&amp;id=7d7bf2b255">newsletter</a> to stay up-to-date on HIPAA and cybersecurity.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/09/07/congress-addresses-medical-device-vulnerabilities/">Congress Addresses Medical Device Vulnerabilities</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4442</post-id>	</item>
		<item>
		<title>Healthy Skepticism &#8211; Your Best Cyber Defense</title>
		<link>https://thirdrock.com/blog/2017/08/03/healthy-skepticism-your-best-cyber-defense/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Thu, 03 Aug 2017 14:00:04 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[data backup]]></category>
		<category><![CDATA[data transmission]]></category>
		<category><![CDATA[electronic healthcare devices]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[hard-coded passwords]]></category>
		<category><![CDATA[healthcare team]]></category>
		<category><![CDATA[human firewall]]></category>
		<category><![CDATA[patient care devices]]></category>
		<category><![CDATA[questions to ask to protect your patients and yourself]]></category>
		<category><![CDATA[Risk]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=4142</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/08/03/healthy-skepticism-your-best-cyber-defense/">Healthy Skepticism &#8211; Your Best Cyber Defense</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4151 " style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_19061_72929-e1501696303233-300x248.jpg?resize=160%2C132&#038;ssl=1" alt="" width="160" height="132" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_19061_72929-e1501696303233.jpg?resize=300%2C248&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_19061_72929-e1501696303233.jpg?resize=768%2C635&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_19061_72929-e1501696303233.jpg?resize=1024%2C846&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_19061_72929-e1501696303233.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_19061_72929-e1501696303233.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 160px) 100vw, 160px" /></p>
<p>It&#8217;s no longer news that most of us are uber-connected. We use phone apps for weather, meditation, mapping, games, travel, texting, and more.  Online management of home devices, including thermostats, coffee makers, and alarm systems make it possible for us to remotely control many aspects of our lives. These technologies offer previously unthinkable convenience – <em>and</em> a great deal of risk to their owner&#8217;s physical and information security.</p>
<p>Healthcare, too, is becoming more connected for all the same reasons you may use networked devices at home &#8211; speed, convenience, control, and situation transparency. For instance, in-room cameras are very helpful for preventing patient falls. They can also be used by nurses to determine if a patient’s telemetry alarm is due to a loose lead or a real cardiac event. All this convenience, however, comes with the same risks as an online thermostat at home – these devices are vulnerable to attack (<a href="https://www.healthdatamanagement.com/magazine/health-data-management-may-june-2017"><em>Health Data Management</em></a>, May/June 2017).</p>
<p>Many of the devices in use today were deployed before security standards for them had been developed. Even relatively new devices released while the FDA was working on the rules may not be up to snuff. For example, this spring an IT Director for a brand new hospital told me about receiving devices for the hospital, which he was responsible for installing and maintaining, and learning they did not adhere to some very basic security principles!</p>
<p><strong>So what can members of the care team do?  </strong></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-4149 alignright" style="margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=279%2C196&#038;ssl=1" alt="" width="279" height="196" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=300%2C211&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=768%2C540&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?resize=1024%2C720&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02G68129.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 279px) 100vw, 279px" />You – nurses, respiratory therapists, surgical technicians, medical technologists, radiology techs – can be the “Human Firewall.” The healthy skepticism that care team members are trained to bring to all aspects of their work can play an important role in cybersecurity as well.</p>
<p>Staff often assume that the “IT gurus” have carefully reviewed all devices or computer applications and deemed them &#8220;safe&#8221; – WRONG! Smart devices and applications are proliferating rapidly due to the advent of the Internet of Things.  This combination provides great opportunity to the cyber criminals! The obvious conclusion is it’s now <em>everyone’s</em> job to look out for the patient&#8217;s information safety.</p>
<p>So ask the hard questions – and protect your patients and yourself in the process.</p>
<p><strong>1. Does this device transmit data?</strong></p>
<p>If the answer is yes, ask more hard questions:</p>
<ul>
<li>Is the transmitted data encrypted during transmission?</li>
<li>Does the device store data as well? If so, is the data encrypted when stored? Is the data backed up regularly?</li>
<li>Where is the manufacturer’s proof that the device is cybersecure?</li>
<li>Does the manufacturer’s cybersecurity claim state the standards against which they tested the device?       (<em>Hint: You don’t have to know the standard – you only need to ask your IT and BioMed departments to validate them</em>.)</li>
</ul>
<p><strong>2. Can this device or app access my Contacts? my Location?</strong></p>
<p>If so, ask how to turn those “features” off – <em>or</em> for documentation explaining all the steps taken to ensure your phone, computer, or patient care devices won’t be hacked.</p>
<p><strong>3. Can the password be changed?</strong></p>
<p>For this question, the wrong answer is “No.”  Devices with hard-coded passwords – those with a single, manufacturer-issued password used by everyone on the team –  can be “weaponized” by a cyber criminal to penetrate the organization’s network and send malware to other computers. If the answer is “No,” contact management – “This device is unsafe to use.”</p>
<p><strong>4. Would you feel safe if this device was being used on you or a family member, and the organization was hit with a virus or ransomware attack?</strong></p>
<p>Healthcare is risky business – there are physical risks and electronic risks &#8211; and there’s no way to make it completely safe. But working together, we can certainly make it saf<em>er.</em></p>
<p>If you’re not sure your organization has taken all the proper steps to ensure patient information security, contact us to arrange for a comprehensive HIPAA security risk analysis to identify any gaps in your network security or operating procedures.</p>
<p style="text-align: center;"><a href="mailto:info@thirdrock.com">info@thirdrock.com</a> | 512.310.0020</p>
<p style="text-align: center;"><strong>Protect Your Patients.  Protect Your Practice.  Protect Yourself.™</strong></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/08/03/healthy-skepticism-your-best-cyber-defense/">Healthy Skepticism &#8211; Your Best Cyber Defense</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4142</post-id>	</item>
		<item>
		<title>Best Defense Against Ransomware is a Good Backup</title>
		<link>https://thirdrock.com/blog/2017/05/16/best-defense-against-ransomware-is-a-good-backup/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Tue, 16 May 2017 07:00:00 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[backup & recovery]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3764</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/05/16/best-defense-against-ransomware-is-a-good-backup/">Best Defense Against Ransomware is a Good Backup</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3765" style="margin-right: 10px; margin-top: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/wannacry_05-300x227.png?resize=275%2C208&#038;ssl=1" alt="" width="275" height="208" /></p>
<p>By now, most have heard or been affected by the WannaCry ransomware that has spread to over 150 countries at last count.</p>
<p>The WannaCry ransomware started taking over users&#8217; files on Friday, demanding $300 to restore access.</p>
<p>Hundreds of thousands of computers have been affected so far. Computer giant Microsoft said the attack should serve as a wake-up call.</p>
<p>The first line of defense in this is always having a <strong><em>properly maintained firewall</em></strong> both on your network and on each individual computer system. However, as we all know, your network can and will be breached at some point, whether or not it is due to WannaCry or some other ransomware or virus; it will happen.</p>
<p><strong>What is the best defense against ransomware and other malware?</strong></p>
<p><em><strong>A good backup!</strong></em></p>
<p>It sounds simple, but amazingly most either are not doing backups or not verifying that the backup works. I worked with an organization that had been backing up for several years, but had never tested restoring the files. Well, they got hit with a bad virus, and it was determined that restoring the previous day&#8217;s backup would be the best way to recover. Unfortunately, the backup was corrupted and would not work. We went back to previous days and weeks, and <em>none</em> of their backups were good.</p>
<p>Having a backup is not good for anything if you can&#8217;t actually recover the data when you need it.</p>
<ol>
<li> To get started, <em><strong>investigate business level backup systems</strong></em> that will work in your environment. It truly is a case by case basis on which backup system is right for your organization; depending on size, speed, hours, etc.</li>
<li><strong><em>Schedule restore tests</em></strong> on a regular basis to make sure that you have a valid backup that you can recover from in the case of an attack.</li>
<li><strong><em>Maintain the backup system</em></strong> to ensure that it is considered &#8220;mission critical&#8221; as it is the last line of defense for your entire business.</li>
</ol>
<p><strong>Bottom line:  Stay ahead of ransomware by maintaining complete, working backups!</strong></p>
<p>For questions about how to evaluate and improve your own backup practices or for a comprehensive Security Risk Assessment, contact us at info@ThirdRock.com.</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/05/16/best-defense-against-ransomware-is-a-good-backup/">Best Defense Against Ransomware is a Good Backup</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3764</post-id>	</item>
		<item>
		<title>One small step for man, one giant leap for privacy!</title>
		<link>https://thirdrock.com/blog/2017/03/23/one-small-step-for-man-one-giant-leap-for-privacy/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 23 Mar 2017 14:00:08 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3091</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/03/23/one-small-step-for-man-one-giant-leap-for-privacy/">One small step for man, one giant leap for privacy!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">“To err is human”… a pretty obvious statement. So if we all know we are going to make mistakes, why not add an extra level of security to mitigate the effects of the mistake?</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-1479 alignright" style="margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Data-Encryption-Red-over-white-Text-c655360_s.jpg?resize=210%2C157&#038;ssl=1" width="210" height="157" /></p>
<p>I am sure we have all been in the predicament of sending John C. an email, but when we clicked on our contacts list we accidentally sent it to John B. I have conversations constantly with clients and friends about encrypting their email to protect themselves and often get the same set of questions…</p>
<ul>
<li>“Isn’t that expensive?”</li>
<li>“How does someone unlock the email I sent?”</li>
<li>“Won’t that take a lot longer for me to encrypt it?”</li>
<li>“Why should I take the extra time? The person who gets it will just delete it.”</li>
</ul>
<p>There seems to be a lack of understanding in the market place of how simple it is to take this <em>one extra step</em> to protect yourself and private information.</p>
<p>This has become an increasingly obvious issue in the healthcare space. The amount of ePHI sent daily between providers, insurers, patients, labs, etc. is vast and sooner or later mistakes will be made. When one patient receives another patient&#8217;s records this typically worries the individual who receives it and angers the patient whose information was released &#8211; accidentally or not. There are numerous low cost encrypted email services and even most of your standard email platforms come with settings for encryption. Encrypting your email ultimately protects you, your patients, and your practice.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3100 size-full" style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/white-padlock-on-4-red-puzzle-pieces.jpg?resize=200%2C200&#038;ssl=1" width="200" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/white-padlock-on-4-red-puzzle-pieces.jpg?w=200&amp;ssl=1 200w, https://i0.wp.com/thirdrock.com/wp-content/uploads/white-padlock-on-4-red-puzzle-pieces.jpg?resize=150%2C150&amp;ssl=1 150w, https://i0.wp.com/thirdrock.com/wp-content/uploads/white-padlock-on-4-red-puzzle-pieces.jpg?resize=160%2C160&amp;ssl=1 160w" sizes="(max-width: 200px) 100vw, 200px" /></p>
<p>I recently ran across an article that gives a very simple explanation of how encryption works and the advantages. When we do make mistakes and the wrong person can’t open the information, we have ultimately protected everyone with a single, simple step. Let’s do all of mankind a favor and take one small step…ENCRYPT.</p>
<p>I hope you enjoy the article.</p>
<p><a href="https://www.ltnow.com/how-does-email-encryption-work/">https://www.ltnow.com/how-does-email-encryption-work/</a></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/03/23/one-small-step-for-man-one-giant-leap-for-privacy/">One small step for man, one giant leap for privacy!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3091</post-id>	</item>
		<item>
		<title>Why Physicians should never use public Wi-Fi</title>
		<link>https://thirdrock.com/blog/2017/01/10/why-physicians-should-never-use-public-wi-fi/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 10 Jan 2017 15:00:01 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[Cyber-threats]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[mobile phone hotspot]]></category>
		<category><![CDATA[virtual private network]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2781</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/01/10/why-physicians-should-never-use-public-wi-fi/">Why Physicians should never use public Wi-Fi</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2823 size-medium" style="margin-top: 10px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Free-Wi-Fi-on-tablet.jpg?resize=257%2C168&#038;ssl=1" width="257" height="168" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Free-Wi-Fi-on-tablet.jpg?resize=300%2C196&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Free-Wi-Fi-on-tablet.jpg?w=306&amp;ssl=1 306w" sizes="(max-width: 257px) 100vw, 257px" /></p>
<p>We all enjoy the convenience of being somewhere, like a coffee shop, airport, hotel room, or lobby of a building waiting, and hopping on the free WiFi to catch up on some work. Unfortunately, all healthcare workers should avoid free WiFi at all costs.  It is very important to realize that if you can access the free WiFi, so can anyone else. They can even leave devices behind that stay on the WiFi, breach other systems and transmit the data back to their &#8220;home&#8221; base.  If you share a local WiFi network, it is fairly easy for someone to access your device (laptop, tablet, phone) and copy data from your device to theirs without you ever knowing it.  It&#8217;s worth noting that criminals can infect your device with a virus or malware and later take control or steal data from your device.</p>
<p><span style="font-size: 12px;"> </span></p>
<p>There are several things you can do to prevent a breach &#8230;</p>
<ol style="padding-left: 1em;">
<li style="text-indent: -1em;">Don&#8217;t connect to free WiFi networks.</li>
<li style="text-indent: -1em;">Use your mobile phone hotspot or wait until you&#8217;re on a known secure network.</li>
<li style="text-indent: -1em;">If you do use free WiFi or connect remotely to your EMR or other applications use a VPN (virtual private network).</li>
<li style="text-indent: -1em;">Make sure you have a properly configured firewall on your device and select &#8220;public&#8221; network when you connect.</li>
<li style="text-indent: -1em;">Encrypt the data on your device.</li>
<li style="text-indent: -1em;">Did I say, &#8220;Don&#8217;t use free WiFi networks.&#8221;?</li>
<li style="text-indent: -1em;">Don&#8217;t download, access, or store PHI on mobile devices.</li>
</ol>
<p>Their are various ways to address the above list, contact your tech expert for assistance and make it a high priority.</p>
<p>Take away:  Make cyber security a top priority for 2017, take a step each week to improve your cyber security.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/01/10/why-physicians-should-never-use-public-wi-fi/">Why Physicians should never use public Wi-Fi</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2781</post-id>	</item>
		<item>
		<title>The IoT, Little “Things” with Big Implications</title>
		<link>https://thirdrock.com/blog/2016/12/15/the-iot-little-things-with-big-implications/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 15 Dec 2016 15:00:35 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[IoT devices]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2620</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/12/15/the-iot-little-things-with-big-implications/">The IoT, Little “Things” with Big Implications</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1134" style="margin-right: 10px; margin-top: 8px; margin-bottom: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/cyber-attack-c707671_s.jpg?resize=160%2C120&#038;ssl=1" alt="Cyber Attack - Red Color Text on Dark Digital Background." width="160" height="120" /></p>
<p>You may have experienced the first coordinated cyber attack using “Internet of Things”, IoT. I bet you are wondering how did it affect me? How did it happen?  Did you notice on October 21<sup>st</sup> that Facebook and LinkedIn were not available?  Maybe you noticed that Amazon couldn’t take your order, and email was really slow? This was the result of a DDoS attack, Distributed Denial of Service, which have been going on for years, but this one was different.</p>
<p>Typically, DDoS attacks are the result of a virus or malware infecting many PCs, and then when instructed by the malware’s author, flooding the targeted victim’s web address with thousands of messages.  This creates an Internet traffic jam and stops the victim’s ability to communicate via the Internet.  This particular attack was on a key Internet asset which acts as the Internet’s address book, and the result was a major Internet disruption on the East Coast.  It eventually spread to the West Coast as well.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-2626" style="margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Internet-of-Things-in-spyglass-white-text-on-red-ribbon-with-brown-background.jpg?resize=137%2C102&#038;ssl=1" alt="Internet of Things through Magnifying Glass on Old Paper with Red Vertical Line." width="137" height="102" /></p>
<p>Where does the “IoT” fit into all this?  This DDoS focused on IoT devices to cause the traffic jam.  Now you&#8217;re wondering, just what is an IoT device?  According to the National Institute of Standards (NIST), an IoT device must have <em>sensing</em>, <em>computing</em>, <em>communication</em>, and <em>actuation </em>capabilities<em>.</em>  Thus, it has a computer with software programs which enables the other 3 required attributes.  It is connected to a network and ultimately the Internet to enable <em>communications</em> with other devices such as your smartphone, and thus the requested data is sent back to you, after <em>sensing</em> that you did close your garage door after leaving for work this morning.  Or you can <em>actuate</em> the door locks on your Buick while lying on the sunny tropical beach.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2623 " style="margin-right: 10px; margin-top: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Hacking-blue-text-on-green-binary-background.jpg?resize=110%2C100&#038;ssl=1" alt="Hacking Online Representing World Wide Web And Website" width="110" height="100" /></p>
<p>Surely my digital thermostat, baby monitor, VCR, vacuum cleaner, garage door opener, or refrigerator couldn’t be involved in such an evil deed as a DDoS attack?  Yes, they can, and maybe they were!  All these relatively inexpensive IoT devices have very basic or no Internet security capabilities at all.  Most are installed with default passwords which can readily be found via a quick Google search.  Thus, they can be readily hacked and re-purposed to do other things.  There are numerous instances where digital thermostats have been hacked to access home networks and steal personal information and financial data.  Could your thermostat be spying on you when you are logging into your bank account?</p>
<p>Let’s take this up to the next level.  What about your business?  The healthcare industry, like all others, is seeing a flood of new IoT devices addressing complex issues to reduce workloads and wait times.  Whenever you install an IoT device in your practice, take time to consider the potential downsides.  Each new device on your network, is another vulnerability.  You must evaluate its security capabilities before it is installed.  Plus, consider the ability to maintain proper security in the future.  Ask yourself,</p>
<ul>
<li>Is the password strong enough?</li>
<li>Can your IT staff or managed services provider support the device?</li>
<li>How does the company selling the device service it?</li>
<li>What information is it transmitting?</li>
<li>Is the data encrypted on the device and during transmission?</li>
</ul>
<p>These are not easy questions, but essential to help protect your practice’s and your patient’s sensitive data.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/12/15/the-iot-little-things-with-big-implications/">The IoT, Little “Things” with Big Implications</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2620</post-id>	</item>
		<item>
		<title>Focus on Technology: HIPAA Quick Fixes</title>
		<link>https://thirdrock.com/blog/2016/09/27/hipaa-technology-quick-fix/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Tue, 27 Sep 2016 14:00:37 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Focus on Technology]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[automatic updates]]></category>
		<category><![CDATA[Quick fix]]></category>
		<category><![CDATA[strong passwords]]></category>
		<category><![CDATA[training]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2300</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/09/27/hipaa-technology-quick-fix/">Focus on Technology: HIPAA Quick Fixes</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" width="300" height="200" class="alignleft wp-image-2349 size-medium" style="margin-bottom: 20px; margin-right: 10px;" alt="Keep IT Simple" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?resize=300%2C200&#038;ssl=1" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?w=600&amp;ssl=1 600w" sizes="(max-width: 300px) 100vw, 300px" /></a>While meeting all the HIPAA requirements for your technology (computer, network, etc.) requires some planning, there are some quick fixes that can greatly reduce the odds of your organization being breached while at the same time starting you on your path to compliance.</p>
<p>Below are some common issues that we see at all sizes of organizations. How you go about correcting some of them is determined by the size and resources of your organization.</p>
<div style="clear: both;"></div>
<h4>Quick Fix #1</h4>
<p><strong>Issue: The operating system (i.e. Windows) on your organization&#8217;s computers / laptops is out of date. </strong></p>
<p><strong>Details:</strong> Hackers are constantly finding new ways into your computers. If you do not keep your computer up to date, it leaves these vulnerabilities open for attack.</p>
<p><strong>Fix:</strong> For smaller organizations you will need to manually check each of your computers to make sure automatic updates are turned on and updating. Alternatively there are centralized patch management systems that can help, if you are running on a Windows domain.</p>
<h4>Quick Fix #2</h4>
<p><strong>Issue: Weak password! Simple passwords DO NOT WORK!</strong></p>
<p><strong>Details:</strong> Hackers can download a tool off of the internet to crack passwords fairly easily. The weaker the password the more likely the hacker will be able to breach your computer and network.</p>
<p><strong>Fix:</strong> Require that all users have unique accounts and passwords that are a minimum of 12 characters with a mix of UPPERCASE, lowercase, numbers, and at least one special character (i.e. !@#$%^&amp;*). You should also have your users change their password every 90 days max. If you have a Windows domain you can enforce this with a domain policy.</p>
<h4>Quick Fix #3</h4>
<p><strong>Issue: Outdated Antivirus</strong></p>
<p><strong>Details:</strong> Similar to #1, if your antivirus is out of date, your computers and networks are vulnerable to the latest virus&#8217;, malware, and ransomware.</p>
<p><strong>Fix:</strong> Check all of your computer&#8217;s antivirus software to ensure that it still has an active subscription, is running, and is being updated. Most major antivirus companies have business versions of their product that allow you to centrally manage the antivirus and reduce the likelihood of something happening.</p>
<h4>Quick Fix #4</h4>
<p><strong>Issue: Lack of trained staff</strong></p>
<p><strong>Details:</strong> Staff that has not been trained to watch out for malware in emails or on the web is generally the most likely way for your organization to become a victim of malware or ransomware.</p>
<p><strong>Fix:</strong> Ensure the staff is properly trained in HIPAA. There are plenty of online training courses that are neither expensive nor time consuming. While the return on investment may be hidden, it is huge.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/09/27/hipaa-technology-quick-fix/">Focus on Technology: HIPAA Quick Fixes</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2300</post-id>	</item>
		<item>
		<title>Focus on Technology: Windows 10 shortcuts</title>
		<link>https://thirdrock.com/blog/2016/09/08/focus-on-technology-windows-10-shortcuts/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 08 Sep 2016 14:00:58 +0000</pubDate>
				<category><![CDATA[Technology]]></category>
		<category><![CDATA[keyboard shortcuts]]></category>
		<category><![CDATA[technology tips]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2120</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/09/08/focus-on-technology-windows-10-shortcuts/">Focus on Technology: Windows 10 shortcuts</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-2168 " style="margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/tipstricks-key.jpg?resize=101%2C76&#038;ssl=1" alt="Tips and Tricks Orange Button - Finger Pushing Button of Black Computer Keyboard. Blurred Background. Closeup View." width="101" height="76" /></p>
<p>If you&#8217;re like me, sometimes you&#8217;re a slow learner or you just like things the way they were. Why change a good thing, right?  Windows 10 has some nice new features, but I thought Windows 7 was simple and easy to use, plus I know it.  Here are some tips on how to navigate Windows 10 a little easier.  Hope they help.</p>
<table style="border: 1px solid #888888; border-collapse: collapse; border-spacing: 5px; cell-padding: 5px;">
<tbody>
<tr>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Right Mouse Click on Windows (Start) Icon</td>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">This will pop-up a list of applications like on Windows 7.</td>
</tr>
<tr style="background-color: #f2f2f2;">
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Windows Key &#8211; Alt &#8211; Esc</td>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Toggle through all open windows (applications)</td>
</tr>
<tr>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Ctrl &#8211; Shift &#8211; Esc</td>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Open Task Manager (click on More Details in bottom left)</td>
</tr>
<tr style="background-color: #f2f2f2;">
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Esc</td>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Escape from current pop-up from a shortcut.</td>
</tr>
<tr>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Windows Key &#8211; D</td>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Show the Desktop.</td>
</tr>
<tr style="background-color: #f2f2f2;">
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Windows Key &#8211; Tab</td>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Show running tasks (applications).</td>
</tr>
<tr>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Windows Key &#8211; Ctrl Key &#8211; D</td>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Open new virtual desktop window.</td>
</tr>
<tr style="background-color: #f2f2f2;">
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Windows Key &#8211; Ctrl Key &#8211; Left or Right Arrow</td>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Move left or right between virtual desktops.</td>
</tr>
<tr>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Windows Key &#8211; Ctrl Key &#8211; F4</td>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Closes the current virtual desktop</td>
</tr>
<tr style="background-color: #f2f2f2;">
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Windows Key &#8211; Up Arrow</td>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Changes current window from normal to full screen or from minimized to normal.</td>
</tr>
<tr>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Windows Key &#8211; Down Arrow</td>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Changes current window from full screen to normal or from normal to minimized.</td>
</tr>
<tr style="background-color: #f2f2f2;">
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Windows Key &#8211; Left or Right Arrow</td>
<td style="border: 1px solid #888888; padding-left: 5px; padding-right: 5px;">Moves current window to left half of screen or right half. Combine with Up or Down Arrow keys to move to top left quarter, etc.</td>
</tr>
</tbody>
</table>
<p>The <a href="http://www.howtogeek.com/">HowToGeek</a> web site has a large listing of <a href="http://www.howtogeek.com/198122/32-new-keyboard-shortcuts-in-the-windows-10-technical-preview/http://www.howtogeek.com/198122/32-new-keyboard-shortcuts-in-the-windows-10-technical-preview/http://www.howtogeek.com/198122/32-new-keyboard-shortcuts-in-the-windows-10-technical-preview/http://www.howtogeek.com/198122/32-new-keyboard-shortcuts-in-the-windows-10-technical-preview/">Windows 10 keyboard shortcuts</a>.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/09/08/focus-on-technology-windows-10-shortcuts/">Focus on Technology: Windows 10 shortcuts</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2120</post-id>	</item>
	</channel>
</rss>
