HIMSS 2018 – Take Aways

I attended the national HIMSS 2018 conference in Las Vegas a few weeks ago.  43,000+ roaming loose in Vegas, primarily in a few hotels and the Sands Expo Center.  It was mayhem.  I attended the Cyber Security Symposium all day Monday.  Six sessions focused on cyber security and best practices.  I then attended the keynote speech by Eric Schmidt, the CEO of Alphabet, the parent company of Google. Tuesday was primarily more sessions and a few minutes out in the expo "acres" wandering around trying to ...

Third Rock Enhances SECURETexas Capabilities

Third Rock Enhances SECURETexas Capabilities Customized to over 20 types of healthcare specialties for better protection of patient information against cyber threats    Austin, TX – March 21, 2018 – Third Rock, a preferred vendor for Texas Health Services Authority (THSA), has further simplified the SECURETexas certification process by offering a unique customized security risk assessment approach based on an organization’s practice area. Third Rock has customized its web-based security ris ...

Third Rock Team Presenting at ISSA Austin

Boost your Cyber Confidence! Get some tips and inspiration when Third Rock’s Julie Rennecker, Robert Felps, and Mike Moran present Healthcare: Transforming an Industry from Cyber Victim to Cyber Confident at the ISSA Austin Chapter meeting tomorrow, March 20. For more information and to register go to: https://www.eventbrite.com/e/austin-issa-march-2018-chapter-meeting-registration-43524591224   ...

An alternative approach to the cyber security talent shortage

Our CEO would contend there is an alternative approach to the cyber security talent shortage.  Most breaches occur because computer systems are easy to breach and people make mistakes.  Compare the number of breaches based on operating systems.  Linux and UNIX variants are more difficult to breach than Windows, especially, if you keep them patched.  Which means we need to focus some time and effort on Windows, shoring up its weak defenses.  The good news is, Windows and Linux can be hardened far m ...

How to Grow Cyber Security Awareness Heroes

The top threat facing any organization today is the staff member working from a computer!  Not because this person intends to do malicious harm to the organization, but because of lack of cyber security awareness and training.  Confirmation of this is MediaPro’s 2017 State of Privacy and Security Awareness Report in which they surveyed over 1,000 people and rated their responses to real-world cyber security questions. Respondents were grouped into 3 “risk profiles” based on their correct answers; ...

Overcoming Organizational Roadblocks to Cyber Security 

In many organizations, cyber security is perceived as one of those “important-but-not-urgent” issues that keep getting put off in deference to the pressing issues of the day – insurance denials, staffing, readmissions, patient no-shows, supply shortages…the list goes on.  It’s not that organizational leaders are doing nothing. In most organizations, the basic pieces, such as a HIPAA-compliant EHR, firewall, anti-virus software, and staff training, are all in place. It is these very safeguards ...

Cyber Security: Is it Really a Matter of Life or Death?

A webinar brought to you by the National Rural Health Association and Rural Hospital Insurance of America If you are the CEO, CFO or COO of a Rural Hospital then this webinar is for YOU! But, it is open to all healthcare management. On February 21, from 2:00 pm - 3:00 pm join the Rural Hospital Insurance of America (RHIA) program manager in conversation with two of America's leading experts in cyber threat protection, prevention, detection, and response to learn how to stay ahead of the growing and evo ...

Cyber Hygiene: Are your systems hardened?

Third Rock performs Risk Assessments (Security Risk Analysis) for very small firms to large organizations in healthcare, technical, financial, insurance, oil and gas, and other industries. We know the focus of the assessment needs to be security; therefore, we run an industry standard (NIST based) scan checking computers for vulnerabilities and many variants of compliance.  (NIST stands for National Institute of Standards and Technology) Our findings show that the average covered entity is about 15% co ...

Cloud or Not-to-Cloud; The Allscripts Breach

Allscripts’ Electronic Health Records service was the first major cloud-based EHR to be significantly disrupted by a ransomware attack.  Close to 1,500 practices were affected by the EHR outage for about a week; essentially shutting down those practices.  Allscripts was hit by the SamSam virus which was launched in December 2016, crippling two of their North Carolina data centers.  Angry customers voiced their displeasure on social media and a class-action lawsuit has been filed. Hackers have been r ...

Cybersecurity and The Endless List of Compliance

I recently wrote about insurance companies raising the bar on business to protect their valuable data to acquire cyber liability insurance.  But, it's not just insurance companies that are raising the bar. Governments around the globe are now requiring all types of companies to be compliant with some type of standard to better protect the data they possess.  What many people don't realize is these standards are all based on the protection of personal/private/confidential/sensitive/valuable informatio ...

1 2 3 4 5 6 7 22