<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Third Rock Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/category/third-rock/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/category/third-rock/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Tue, 16 Jun 2020 15:33:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Third Rock Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/category/third-rock/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Is it time for an upgrade?</title>
		<link>https://thirdrock.com/blog/2020/06/16/is-it-time-for-an-upgrade/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 16 Jun 2020 15:30:00 +0000</pubDate>
				<category><![CDATA[Third Rock]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9180</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/06/16/is-it-time-for-an-upgrade/">Is it time for an upgrade?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>When it comes to the cybersecurity of our devices, many of us turn a blind eye because the complexity can seem overwhelming. Questions like:</p>
<ul>
<li>What operating system are you running?</li>
<li>Do you have anti-virus AND anti-malware security?</li>
<li>What’s the difference between anti-virus and anti-malware?</li>
<li>When was your last update?</li>
</ul>
<p>The list can be longer, but a few “I don’t knows” will make anyone stop wanting to try. Keeping your operating system, antivirus and antimalware up to date is your best front line defense for cybersecurity. Vast improvements have been made to make it easier and less complicated for your PC or Mac to stay well protected. Here is a simple step by step guide to check your computer status.</p>
<h3><u><img data-recalc-dims="1" fetchpriority="high" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Windows-OS-information-e1592320587659-300x270.png?resize=300%2C270&#038;ssl=1" width="300" height="270" alt="" class="wp-image-9183 aligncenter size-medium" style="float: right;" />Windows Users</u></h3>
<p>The operating system of most PCs is Windows. That’s the easy part. The important question is, what version of Windows is on your computer? To find out, follow these simple steps:</p>
<ul>
<li>Hold the <strong>Windows logo </strong>key + <strong>R</strong>. A search box appears in the bottom corner of your screen.</li>
<li>Type <strong>winver</strong>in the <strong>Open</strong> box, and then select <strong>OK</strong>.</li>
<li>A new box will pop up showing you the version of windows your computer is running.</li>
</ul>
<p>I’ll give you a minute to check it out.</p>
<p>If your box shows anything other than Windows 10, you need a major upgrade.</p>
<h3><u>Mac Users</u></h3>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Mac-OS-information.png?resize=299%2C178&#038;ssl=1" width="299" height="178" alt="" class="wp-image-9185 aligncenter size-full" style="float: right;" />Macs are believed to be inherently safer than Windows because of the operating system. However, cybercriminals are not shying away from finding loopholes to attack your Mac. You still need diligence and the most up-to-date OS for best protection.</p>
<ul>
<li>From the Apple menu in the corner of your screen, choose <strong>About This Mac</strong>.</li>
<li>You&#8217;ll see the macOS name followed by its version number.</li>
</ul>
<p>What is the latest version? As of the day of this publication, macOS Catalina 10.15.5 is what you should see. You can reference Apple support for the most up to date list <a href="https://support.apple.com/en-us/HT201260">here</a>.</p>
<h3><u>How to update your Windows computer</u></h3>
<p>So you need an update. Let’s look at options.</p>
<p>For Windows 10 users, updates to the operating system are pushed through from Microsoft. Follow their directions (<a href="https://support.microsoft.com/en-us/help/12373/windows-update-faq">click here</a>) to make sure you have <strong>Microsoft Updates</strong> configured correctly to keep your PC updated automatically or at least with reminders.</p>
<p>Windows users running anything less than Windows 10 should visit Microsoft’s site (<a href="https://www.microsoft.com/en-us/windows/get-windows-10">click here</a>) to evaluate the best next step. Your out of date operating system is at very high risk for a cyber breach.</p>
<p>If your device is too old, it may not have the built in features you need to run Windows 10, meaning you will need a computer upgrade. If it is compatible, you will have to purchase the new operating system. Whatever your need, check with your IT department before you purchase. You may be able to get the upgrade from them if you use your personal computer for work purposes.</p>
<h3><u>How to update your Mac computer</u></h3>
<p>For Mac users, updates to the operating system are pushed through from the Apple. Follow their directions (<a href="https://support.apple.com/en-us/HT201541">click here</a>) to make sure you have updates configured correctly to keep your computer updated automatically or at least with reminders. If you are running an older device, at some point the company updates will not be compatible. If that is the case, you need to contact your IT point person about upgrading your computer or consider purchasing a new Mac. Your out of date computer is at very high risk for a cyber breach.</p>
<h3><u>Benefits of Updating = Cost savings for you and your company</u></h3>
<p>If you want to tap out because I just mentioned spending money, stay with me a little longer. The number one reason to have the most up to date operating system is the built in security. While nothing will be full proof, Windows and Apple are constantly learning of threats and vulnerabilities. They create patches and protections to stop cybercriminals from getting in. The catch is that they only do this for their latest product.</p>
<p>While it might cost some money upfront, you will save money too. For years, the expectation was that you needed to purchase a 3<sup>rd</sup> party software to protect your computer from being infected with viruses and malware. That is no longer the case. Both Windows 10 and macOS systems have built in antivirus and anti-malware software. When compared to 3<sup>rd</sup> party options, the difference in security level is minimal. There is a slight argument for layering your protection, but that is not a guarantee to block everything. If you want to read more about this, Windows users can click <a href="https://www.howtogeek.com/225385/what%E2%80%99s-the-best-antivirus-for-windows-10-is-windows-defender-good-enough/">here</a> and Mac users can click <a href="https://www.howtogeek.com/437846/do-you-need-an-antivirus-on-a-mac/">here</a>.</p>
<p>More importantly, a breach can cost your company dearly. In fact, 60% of small businesses go out of business within six months of falling victim to cyber crime. Cybersecurity is not about latest technology, it is about safety of your customers and company data.</p>
<h3><u>The Human Firewall is Required</u></h3>
<p>Mike Moran, with Third Rock, put it this way; “Vigilant employees are still the best defense. If you are running Office365, assume that it is only going to catch 40% of the bad things coming through, you still have to be smart enough to recognize the other 60% and not click on them.”</p>
<p>No matter how much you pay for antivirus, anti-malware and top of the line cybersecurity, you still have to be a smart user. Use best practices for passwords that are hard to crack, tips to recognize phishing attempts and smart choices when searching the internet. You can’t prevent a breach, but you can reduce your chances.  Train ALL of your employees at least once a year on cybersecurity awareness.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_with_border et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_3_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: right;">Download our Cyber Hygiene Checklist for updating your device to share with friends, family and coworkers.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_button_module_wrapper et_pb_button_0_wrapper  et_pb_module ">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://thirdrock.com/wp-content/uploads/Cyber-Hygiene-Device-cybersecurity-Checklist-2020-CyberCompass.pdf" target="_blank">Download now</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/06/16/is-it-time-for-an-upgrade/">Is it time for an upgrade?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9180</post-id>	</item>
		<item>
		<title>Cyber Protection as Your Business Deals with Social Distancing</title>
		<link>https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Tue, 10 Mar 2020 12:00:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Pandemic]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8918</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/">Cyber Protection as Your Business Deals with Social Distancing</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Cyber Safety Tips for Businesses When Employees Work from Home</h2>
<p>With the threat of the Coronavirus, many companies are allowing or requiring employees to work from home. If your company deals with protected information such as healthcare, financial, consumer or personal, you should have policies and procedures in place to protect that data within your normal work environment. However, having your work force suddenly need to access this information from home may not be normal. Systems may be overloaded, sensitive information distributed in a way that you never anticipated and lines of communication disrupted. Do your policies and procedures cover such a situation, like a pandemic? Here are 6 tips to best protect your business and your clients.</p>
<h3>Train Your Employees</h3>
<p>We are not talking about the once a year standard, boring videos people half heartedly watch so they can print off a certificate proving they did it. Your employees <u>must</u> know key elements of cyber safety that they are regularly reminded of. If nothing else, make sure they know these 3 things.</p>
<ol>
<li><u>Anticipate phishing and spear phishing attacks</u>. Word will travel fast that everyone is working from home. Hackers will recognize you are vulnerable and try to take advantage of it. Tell your workforce to anticipate phishing and spear phishing attacks that will attempt to take advantage of pandemic fears. Give visual examples, have your IT on high alert searching for phishing attempts and contact employees immediately when one gets through your firewall.</li>
<li><u>Do not access sensitive information on unauthorized devices</u>. The biggest culprit: cell phones. Have policies about what devices they are allowed to use to remotely access information and make sure they know. Never store sensitive information unencrypted on a portable device.</li>
<li><u>Do not access sensitive information on unsecure networks</u>. Like working from Starbucks because they have free WiFi? That may be fine for personal use, but not when you’re accessing sensitive information. Public WiFi makes it easy for a hacker to infiltrate your computer, stealing the information you accessed.</li>
</ol>
<h3>Determine Critical Processes and Access Control</h3>
<p>This is a key component to any Pandemic plan. Who is authorized to access sensitive information, and how do you ensure they can actually access sensitive information in a highly distributed environment? Minimize your exposure by controlling access to data. Not everyone working from home needs access to sensitive information. Make sure you lock down access to only essential employees. Follow through by monitoring who is accessing data, what they are accessing and why.</p>
<h3>Multifactor Authentication</h3>
<p>For those employees who need to access sensitive information, require multifactor authentication every time they remotely access a private server. This is an easy step to implement that can have a big impact on keeping cyber criminals out.  Explain to your employees why the two-factor authentication is an important safety capability.</p>
<h3>Network Access Control</h3>
<p>While you should train your employees not to access sensitive information on unsecure networks (see tip #1), you can implement access controls that actually block a user if they do not meet a certain level of security. You should implement a Virtual Private Network (VPN) which provides higher security for your workers using their home and/or public internet that are not secure.   It’s fairly easy and inexpensive to implement. For more information on VPNs, <a href="https://www.techradar.com/vpn/best-vpn">click here</a>.</p>
<h3>Encrypt Data</h3>
<p>If information is stored locally on a device, make sure it is encrypted. Portable devices are often stolen that contain sensitive information. A simple step of encryption protects your clients’ information and protects you from hefty breach costs and fines.</p>
<h3>Provide Company Devices</h3>
<p>Laptops and cell phones should always be running the most up to date version of an operating system available (i.e. Windows 10 vs Windows 8). They should also have up to date firewall protections and antivirus software. If employees are permitted to use personal devices, it is difficult to ensure these protections stay up to date. Providing company devices that are properly configured and regularly updated help strengthen the barrier against cyber criminals.</p>
<p>Protection doesn’t have to be complicated, but it does have to be intentional. Simple steps taken by the company and the employees can go a long way. While we want to stay physically safe through this wave of the Coronavirus, let’s make sure we stay cyber safe too.</p>
<p> Concerned if you have the right precautions and planning in place? Contact Third Rock at info@thirdrock.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/">Cyber Protection as Your Business Deals with Social Distancing</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8918</post-id>	</item>
		<item>
		<title>Business Associates bad for business?</title>
		<link>https://thirdrock.com/blog/2019/05/21/business-associates-bad-for-business/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 21 May 2019 14:00:26 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[Business Associates]]></category>
		<category><![CDATA[cyber security]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=7509</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/05/21/business-associates-bad-for-business/">Business Associates bad for business?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In January 2019, Spiceworks surveyed 600 IT and security decision makers over a wide variety of companies, all with one thing in common: their use of third-party vendors or Business Associates (BAs). Their findings should have everyone looking more closely at their BAs. Some of the key findings were:</p>
<ul>
<li>90% of companies with third-party policies review them annually</li>
<li>81% consider their policies effective</li>
<li>44% of the companies experienced “a significant, business altering data breach caused by a vendor”</li>
<li>15% of breached companies were notified by the vendor of the breach</li>
</ul>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=423%2C282&#038;ssl=1" width="423" height="282" alt="" class="wp-image-7512 aligncenter size-medium" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=1024%2C682&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?resize=1080%2C720&amp;ssl=1 1080w, https://i0.wp.com/thirdrock.com/wp-content/uploads/breach-affects-chart.png?w=1334&amp;ssl=1 1334w" sizes="(max-width: 423px) 100vw, 423px" /></p>
<p>These statistics are startling, highlighting the chasm between the BA risk management process and the reality of vendor incident response. The most disturbing findings came after the breach. Almost 70% of the breached companies made no change to their obviously faulty risk policies and procedures, with only half of them discontinuing the vendor relationship! The negative, business altering consequences include a combination of increased operational cost and complexity, disrupted operations, financial loss and reputational damage. Reason would move to making changes, but many don’t know where to start.</p>
<p><strong>Evaluate Your Vendors</strong></p>
<p>Companies need to take decisive steps with their business associates to protect their customers’ data. At a minimum, a “trust by verify” approach is required, while many companies are moving to a “zero trust” model. Some options include:</p>
<ul>
<li>Contractually obligate vendors to security and privacy practices</li>
<li>Review your vendors’ security and privacy policies and procedures including their risk management plan</li>
<li>Require security risk assessments be performed annually</li>
<li>Conduct a joint risk management review focusing on data exchange and management, prior to enabling the BA access to your data</li>
<li>Request historical review and references</li>
</ul>
<p><strong style="font-size: 12px;">Security should be a joint effort</strong></p>
<p>It is essential to keep an inventory of all third-parties who can access and share your data, but that is not enough. This study found over two thirds of the companies were not confident that their vendors notify them when sharing data with other subcontractors. Properly vetting your BAs may increase the trust relationship, but additional steps should be taken.</p>
<ul>
<li>Coordinate responsibilities between both parties</li>
<li>Require and review breach notification protocol</li>
<li>Require insurance and other forms of indemnification</li>
<li>Maintain regular communication of security expectations and execution</li>
</ul>
<p>The need for vendors and BAs will always be present in our ever changing, collaborative world. Take the steps necessary to protect your company, your clients and your vendors.</p>
<p>&nbsp;</p>
<p><u>Reference</u></p>
<p>Nearly half of firms suffer data breach at hands of vendors. Mark Sangster. 6 March 2019. <a href="https://www.esentire.com/blog/nearly-half-of-firms-suffer-data-breach-at-hands-of-vendors/">https://www.esentire.com/blog/nearly-half-of-firms-suffer-data-breach-at-hands-of-vendors/</a></p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/05/21/business-associates-bad-for-business/">Business Associates bad for business?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7509</post-id>	</item>
		<item>
		<title>Third Rock Crushed OCR Audit in less than 14 days</title>
		<link>https://thirdrock.com/blog/2018/08/29/third-rock-crushed-ocr-audit-in-less-than-14-days/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Wed, 29 Aug 2018 07:00:21 +0000</pubDate>
				<category><![CDATA[CyberCompass]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cyber risk assessment]]></category>
		<category><![CDATA[HIPAA audits]]></category>
		<category><![CDATA[OCR]]></category>
		<category><![CDATA[OCR audits]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5833</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/08/29/third-rock-crushed-ocr-audit-in-less-than-14-days/">Third Rock Crushed OCR Audit in less than 14 days</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5731" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Screen-Shot-2018-06-06-at-10.02.14-AM.png?resize=300%2C161&#038;ssl=1" alt="" width="300" height="161" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Screen-Shot-2018-06-06-at-10.02.14-AM.png?resize=300%2C161&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Screen-Shot-2018-06-06-at-10.02.14-AM.png?resize=768%2C413&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Screen-Shot-2018-06-06-at-10.02.14-AM.png?w=801&amp;ssl=1 801w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>Do you have a looming cybersecurity compliance audit with a seemingly unrealistic deadline? This case study shows how Third Rock, using CyberCompass<strong>™</strong>, was able to meet a tight OCR deadline for a healthcare client. Our Rapid Response Team, using our automated risk management platform, CyberCompass<strong>™, </strong>delivered in less than 2 weeks what competitors claimed would take at least 10.  If you are facing a cybersecurity compliance audit, recently experienced a breach, <em>or</em> are in need of an information security checkup, contact us today to see what we can do for you: info@thirdrock.com | 512.310.0020.</p>
<p style="text-align: center;">Protect your Clients. Protect Your Organization. Protect Yourself.<strong>™</strong></p>
<p>Download the Case Study for more details.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/08/29/third-rock-crushed-ocr-audit-in-less-than-14-days/">Third Rock Crushed OCR Audit in less than 14 days</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5833</post-id>	</item>
		<item>
		<title>Meet Hayden</title>
		<link>https://thirdrock.com/blog/2018/08/24/meet-hayden/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Fri, 24 Aug 2018 16:00:11 +0000</pubDate>
				<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HIPAA Privacy]]></category>
		<category><![CDATA[patient health information]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5815</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/08/24/meet-hayden/">Meet Hayden</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>&nbsp;</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5816" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?resize=1024%2C683&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p><span style="margin: 0px; line-height: 107%; font-family: 'Calibri',sans-serif; font-size: 11pt;"><span style="color: #000000;">Meet Hayden. He was born at 7:23 am on May 3. He started breathing too soon and swallowed liquid which caused him to struggle to breath.  Within an hour of being born, he was taken to the NICU. For 2 days he received amazing care from the doctors and nurses. He was discharged, happy and healthy, ready to take on the world. His future is bright and open to all possibilities.  Or is it? While the hospital protected his body, are they protecting his personal information? Can someone steal his identity, potentially jeopardizing his future? Children are a common target of identity theft because there is a false belief they are too young to have any “valuable” credentials.  What are you doing to make sure the Hayden&#8217;s in your hospital are protected? Be cyber confident so your patients (and their parents) can be confident in you.</span></span></p>
<p style="text-align: center;"><strong>Protect your Patients. Protect your Organization. Protect Yourself.</strong>™</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/08/24/meet-hayden/">Meet Hayden</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5815</post-id>	</item>
		<item>
		<title>THT Healthcare Governance Conference 2018</title>
		<link>https://thirdrock.com/blog/2018/07/24/tht-healthcare-governance-conference-2018/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 24 Jul 2018 13:30:01 +0000</pubDate>
				<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[Healthcare Governance Conference]]></category>
		<category><![CDATA[sponsor]]></category>
		<category><![CDATA[THT]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5801</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/07/24/tht-healthcare-governance-conference-2018/">THT Healthcare Governance Conference 2018</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
							<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="size-medium wp-image-5802 aligncenter" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/THT.png?resize=300%2C152&#038;ssl=1" alt="" width="300" height="152" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/THT.png?resize=300%2C152&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/THT.png?w=659&amp;ssl=1 659w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>As a board member or executive of a hospital, have you ever wondered exactly what responsibility you have, if any, for security? Not just the physical security of the people who come to the hospital for care, but the protection of their information long after treatment has been given. Are you doing everything in your power to keep patients &#8220;cyber safe&#8221;?</p>
<p>Third Rock is excited to be a sponsor of this year&#8217;s Healthcare Governance Conference.&nbsp; Come visit us at <strong>table 15</strong> to find out exactly what questions you should be asking about the state of your cyber security.&nbsp; We can help you assess your current level of risk and create a personalized plan to get you where you need to be. Because the worst questions are the ones that are never asked.</p>
<p style="text-align: center;"><strong>Protect your Patients. Protect your Organization. Protect Yourself.</strong>™</p></div>
			</div>
			</div>		
				
				
				
				
			</div>	
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/07/24/tht-healthcare-governance-conference-2018/">THT Healthcare Governance Conference 2018</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5801</post-id>	</item>
		<item>
		<title>Third Rock Team Presenting at ISSA Austin</title>
		<link>https://thirdrock.com/blog/2018/03/19/third-rock-team-presenting-at-issa-austin/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Mon, 19 Mar 2018 17:58:02 +0000</pubDate>
				<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cyber confidence]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[ISSA Austin Chapter meeting]]></category>
		<category><![CDATA[presentation]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5237</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/03/19/third-rock-team-presenting-at-issa-austin/">Third Rock Team Presenting at ISSA Austin</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><b>Boost your Cyber Confidence!</b></p>
<p>Get some tips and inspiration when Third Rock’s Julie Rennecker, Robert Felps, and Mike Moran present <em>Healthcare: Transforming an Industry from Cyber Victim to Cyber Confident</em> at the <a href="https://austinissa.org/">ISSA Austin Chapter</a> meeting tomorrow, March 20.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/03/19/third-rock-team-presenting-at-issa-austin/">Third Rock Team Presenting at ISSA Austin</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5237</post-id>	</item>
		<item>
		<title>Shortage of Qualified Cybersecurity Workers: “…the greatest cyber risk of all.”</title>
		<link>https://thirdrock.com/blog/2018/01/17/shortage-of-qualified-cybersecurity-workers-the-greatest-cyber-risk-of-all/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Wed, 17 Jan 2018 20:00:53 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cybersecurity career options]]></category>
		<category><![CDATA[cybersecurity professional]]></category>
		<category><![CDATA[cybersecurity training]]></category>
		<category><![CDATA[cybersecurity worker shortage]]></category>
		<category><![CDATA[occupational outlook]]></category>
		<category><![CDATA[on-the-job training]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5020</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/17/shortage-of-qualified-cybersecurity-workers-the-greatest-cyber-risk-of-all/">Shortage of Qualified Cybersecurity Workers: “…the greatest cyber risk of all.”</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3604" style="margin-top: 5px; margin-right: 12px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Blue-Cyber-Security-key-on-grey-keyboard-1.jpg?resize=200%2C133&#038;ssl=1" alt="" width="200" height="133"></p>
<p>The <a href="https://iamcybersafe.org/gisws/">2017 Global Information Security Workforce Study (GISWS)</a> released in February 2017 forecast a shortage of 1.8 million cybersecurity workers by 2020, while a <a href="https://cybersecurityventures.com/jobs/">study by Cybersecurity Ventures</a> estimates “3.5 million unfilled cybersecurity jobs” by 2021. While the projected magnitude of the shortfall varies from one study to the next, government experts, consultants, and pundits alike are unanimous in predicting that the current shortage of qualified cybersecurity workers will only get worse for the foreseeable future, a situation <a href="https://www.csoonline.com/article/3199016/security/cisco-and-ibm-announce-historic-cybersecurity-partnership.html">Steve Morgan</a> has called &#8220;the greatest cyber risk of all.&#8221;</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5036" style="margin-top: 10px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training-Courses-in-white-on-blue-key.jpg?resize=200%2C133&#038;ssl=1" alt="" width="200" height="133"></p>
<p>There is less agreement about why the shortage exists and, therefore, how to fix it. &nbsp;The traditional school of thought is that educational institutions haven’t prepared enough graduates to meet the growing need. The implied solution from this perspective is to increase educational capacity by creating new programs and increasing enrollments in all programs through better marketing and outreach efforts. Outspoken critics of this perspective, however, say that cybersecurity is <em>not</em> an entry-level position and that graduates of cybersecurity programs lack the technical depth required to be effective.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-5034" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Training-and-Development-in-white-on-blue-key.jpg?resize=198%2C132&#038;ssl=1" alt="" width="198" height="132"></p>
<p>These critics offer an alternative perspective – cybersecurity professionals are not trained in the classroom but must be developed on the job after gaining expertise in IT operations. So rather than casting about externally for cybersecurity talent that isn’t available, IT managers should be looking within their own ranks for people who could be trained in security. For instance, in a 2015 <em>Computerworld </em>column, “<a href="https://www.computerworld.com/article/2979858/it-skills-training/the-myth-of-the-cybersecurity-skills-shortage.html">The myth of the cybersecurity skills shortage</a>,” Ira Winkler wrote, “The best security practitioners have experience in the technology and processes that they are supposed to secure…If you have no experience as a system administrator, you cannot maintain the security of a system.” He goes on to say that most of his work as a security professional has been to shore up poorly designed, poorly configured, and poorly maintained systems, which requires IT knowledge, rather than using hacking knowledge he gained in his training. But this perspective also has critics.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-5035" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Build-Talent-in-white-on-blue.jpg?resize=200%2C133&#038;ssl=1" alt="" width="200" height="133"></p>
<p>A third point of view is that IT managers who only look for security professionals with IT/computer science credentials are creating the shortage through their own myopia. In a <a href="https://hbr.org/2017/05/cybersecurity-has-a-serious-talent-shortage-heres-how-to-fix-it"><em>Harvard Business Review</em></a> article, Marc van Zadelhoff, General Manager of IBM Security, describes IBM’s approach of creating “new collar” jobs. They look for people with “unbridled curiosity, passion for problem solving, strong ethics, and an understanding of risks” – characteristics that can’t be taught – and then train them in the necessary technical skills through on-the-job programs, vocational and community college courses, and industry certification programs, such as those offered by <a href="https://www.isc2.org/">(ISC)<sup>2</sup></a>. Supporting this view is the finding in the Global Information Security Workforce Study that 87% of current cybersecurity workers began their career in another field, some in other IT roles but many in non-IT fields.</p>
<p><strong>So what’s the answer?</strong></p>
<p>Like most difficult organizational problems, there is no single cause and, therefore, no single solution. Addressing the cybersecurity personnel shortage will require focused and creative efforts on the part of educators, managers, trade associations, and employees alike.</p>
<ul>
<li>Educators need to work closely with industry to identify the needed knowledge and skills to integrate into existing curricula or to serve as the basis for new programs.</li>
<li>Managers, meanwhile, with support from HR and other training resources, may need to create their own internal on-the-job training programs for existing personnel, creating opportunities for lateral moves into security positions.</li>
<li>Managers may also need to cast a wider net for potential security talent as IBM has done, looking for people with the necessary character and an eagerness to learn outside the IT ranks.</li>
<li>Trade associations, such as <a href="http://www.issa.org/">ISSA</a> and <a href="https://www.isc2.org/">(ISC)<sup>2</sup></a>, can pool resources to raise awareness of high school, college, <em>and</em> midcareer professionals of available cybersecurity career options and the paths available for acquiring the needed knowledge and skills.</li>
<li>Workers already in cybersecurity positions will need to adapt to their role as teacher/mentor to those moving into security positions, respecting those with non-IT backgrounds as possibly bringing in fresh perspectives.</li>
</ul>
<p>Finally, even if there were an excess of cybersecurity pros, they cannot safeguard an organization alone. All workers, managers, and executives, from the front desk and loading dock up to the C-suite must come to recognize that cybersecurity is now a part of <em>everyone</em>’s job! More on this in the weeks to come.</p>
<p>Is a personnel shortage putting your organization at risk? Contact us for a third-party Security Risk Assessment to find out: 512.310.0020 or <a href="mailto:info@thirdrock.com">info@thirdrock.com</a>.</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/01/17/shortage-of-qualified-cybersecurity-workers-the-greatest-cyber-risk-of-all/">Shortage of Qualified Cybersecurity Workers: “…the greatest cyber risk of all.”</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5020</post-id>	</item>
		<item>
		<title>2018 The Year of the Meltdown and Spectre</title>
		<link>https://thirdrock.com/blog/2018/01/12/2018-the-year-of-the-meltdown-and-spectre/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 12 Jan 2018 19:30:29 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[computer processors]]></category>
		<category><![CDATA[CPUs]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[hardware flaw]]></category>
		<category><![CDATA[hardware vulnerabilities]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4933</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/01/12/2018-the-year-of-the-meltdown-and-spectre/">2018 The Year of the Meltdown and Spectre</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">If you don&#8217;t read about cybersecurity and stolen data everyday then you probably don&#8217;t read much news.&nbsp; But, if you scan the news headlines once in a while you&#8217;re aware of the following:</p>
<ul>
<li>2014 &#8211; The Year of the Cyber Breach</li>
<li>2015 &#8211; The Year of the Healthcare Cyber Breach</li>
<li>2016 &#8211; The Year of the Cyber Attack (it&#8217;s common news)</li>
<li>2017 &#8211; The Year of Ransomware</li>
</ul>
<p>So, what will 2018 be dubbed?&nbsp; 2018 &#8211; The Year of the Meltdown?&nbsp; Wait, what meltdown?&nbsp; Or the Year of the Spectre?&nbsp; Is that a ghost or something else?&nbsp; Well unfortunately, two major hardware vulnerabilities have been discovered in almost all computer processors (CPUs).</p>
<p><strong>What&#8217;s the Problem?</strong></p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4941 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/02D01523.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/02D01523.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02D01523.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02D01523.jpg?resize=1024%2C682&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/02D01523.jpg?w=2160&amp;ssl=1 2160w" sizes="(max-width: 300px) 100vw, 300px" />Meltdown and Spectre are hardware vulnerabilities in most modern computer processors (CPUs).&nbsp; These critical flaws in the processor designs allow applications (computer software programs) to steal data from other applications running on the same processor.&nbsp; Normally applications are blocked from reading data from other applications unless they have been given &#8220;permissions.&#8221;&nbsp; But Meltdown and Spectre are hardware design flaws that allow this to happen.&nbsp; A malicious software program (malware) can read data from another legitimate application without providing appropriate permissions.&nbsp; This data may include your emails, passwords from browsers or password managers, instant messengers, EMRs, EHRs, practice management systems, billing systems, credit card processing systems, the list goes on and on.</p>
<p><strong>What to do?</strong></p>
<p>There&#8217;s not much to do about the hardware flaw, it will take years for all the hardware to be replaced with new computers. However, it is important to have your IT department or support firm apply the patches as they become available.&nbsp; It is also very important to ask all of your cloud providers to confirm that they have applied the patches to all of their affected hardware.</p>
<p>Linux and Windows patches are already available. Chromebooks updated to Chrome OS 63 are protected.</p>
<p>Android devices running the latest security update, are already protected, which includes the Google phones. Other vendor&#8217;s updates are expected to be delivered soon. Users of other devices will have to wait for the updates to be pushed out by third-party manufacturers, including Samsung, Huawei and OnePlus.&nbsp; So, know which devices still need to be updated and watch for the patches to become available and apply them as soon as you can.</p>
<p><strong>What&#8217;s the Impact?</strong></p>
<p>The potential impact is stolen protected or sensitive data; a data breach.&nbsp; But, even if you install the patches and prevent a breach there is the possibility the patches will degrade your computer CPU performance.&nbsp; On new CPUs (computers) the performance degradation may only be 5% based on what the experts are predicting.&nbsp; But on CPUs older than five years, experts are predicting much worse performance.&nbsp; Unfortunately, we&#8217;ll have to wait and see.</p>
<p><strong>More Info?</strong></p>
<p>For more details on Meltdown and Spectre visit the <a href="https://meltdownattack.com/">Meltdown Attack site</a> at <a href="https://meltdownattack.com/">https://meltdownattack.com/</a></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/01/12/2018-the-year-of-the-meltdown-and-spectre/">2018 The Year of the Meltdown and Spectre</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4933</post-id>	</item>
		<item>
		<title>Protect Yourself – Don’t let Scrooge Cyber Sabotage Your Holiday Shopping Season!</title>
		<link>https://thirdrock.com/blog/2017/12/05/protect-yourself-dont-let-scrooge-cyber-sabotage-your-holiday-shopping-season/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 05 Dec 2017 15:00:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[antivirus software]]></category>
		<category><![CDATA[card skimmers]]></category>
		<category><![CDATA[cyber-shopping tips]]></category>
		<category><![CDATA[free gifts via email]]></category>
		<category><![CDATA[limited time offers]]></category>
		<category><![CDATA[strong passwords]]></category>
		<category><![CDATA[two-factor authentication]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4845</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/12/05/protect-yourself-dont-let-scrooge-cyber-sabotage-your-holiday-shopping-season/">Protect Yourself – Don’t let Scrooge Cyber Sabotage Your Holiday Shopping Season!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">We are into the Holiday Season and Cyber Scrooges &#8211; cyber criminals &#8211; are alive and well!  Breaches seem to be a daily occurrence.  In the area where I live, they even recommend paying for gas with cash and don’t use a credit card at the pump due to card skimmers.  So, I’m out holiday shopping and I’m lucky if I have two dollars in my wallet.  That means I have to stop at a cash machine to pay for gas.  Wait, that cash machine could have a card skimmer attached to it!  I guess I have to go into the bank to get cash as well!  Bah humbug!</p>
<p>So, here’s some helpful advice to make you and your family a little cyber-safer during the Holiday Season.</p>
<ol>
<li><strong>Avoid using a debit card!</strong> A debit card provides direct access to your bank account.  Most banks will return the funds if a theft occurs, but generally you have to detect it and report it.  It may take time and effort to get the refund.  Use a credit card and review all the charges before paying the bill.  I use a credit card to buy gas!</li>
<li><strong>Regularly review your bank accounts</strong> for unknown transactions, say twice a week. Set up alerts so you are notified when large withdrawals are made.</li>
<li><strong>Set up two-factor authentication</strong> to access your bank account. This means your bank will text you a code as the final step to log into your bank account.  It is a small pain, but the protection it provides is well worth the effort!</li>
<li><strong>Keep your antivirus software up to date and use strong passwords. </strong> These are absolutely necessary if your device is connected to the Internet.</li>
<li><strong>Finally, use caution when cyber-shopping. </strong>We just had a record setting Cyber Monday. The Internet allows us to shop anywhere with ease.  Search engines can provide a wide range of “stores” that are selling the toy your son or daughter must find under the tree Christmas morning.  The problem is you can’t easily tell if the seller is an honest business or a guy on his computer in the basement scamming people.  Bad businesses can buy “likes” and positive reviews for a few dollars to make themselves appear legitimate.  Here are a few cyber-shopping tips:</li>
</ol>
<ul>
<li><strong>Don’t chase the lowest price.</strong> Shop with known and trusted companies.  If something is too good to be true, it isn’t and it can cost you a lot!  Companies that have the lowest price may not be investing in safeguards to protect your personal information.</li>
<li><strong>Watch out for limited time offers.</strong> You click on a link for the item you want, and low and behold it is on sale at a ridiculous price for the next 90 seconds! Stop! It is designed to prevent you from fully reviewing the product and seller.  It’s not worth the risk.  There will be a legitimate “Black Friday” deal in a day or so!</li>
<li><strong>Watch out for websites spelled close to well-established businesses</strong>. They can be common misspellings or have extensions on their names.  Hover your mouse over the link and read the URL.  If it reads differently than what you expect, don’t click on the link.</li>
<li><strong>Don’t fall for free gifts via email.</strong> These are phishing emails designed to enable viruses to be loaded on to your computer to steal your personal data.</li>
<li><strong>Never give out more information than is necessary.</strong> If a site asks you for your social security number or driver’s license number, etc., stop and decide if you need to provide additional personal data.</li>
</ul>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-4860 size-medium" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_10326_12544-300x200.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200" /></p>
<p style="text-align: left;"><strong>We here at Third Rock wish you and your family a very wonderful Holiday Season and a Happy New Year!</strong></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2017/12/05/protect-yourself-dont-let-scrooge-cyber-sabotage-your-holiday-shopping-season/">Protect Yourself – Don’t let Scrooge Cyber Sabotage Your Holiday Shopping Season!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4845</post-id>	</item>
	</channel>
</rss>
