How to Grow Cyber Security Awareness Heroes

The top threat facing any organization today is the staff member working from a computer!  Not because this person intends to do malicious harm to the organization, but because of lack of cyber security awareness and training.  Confirmation of this is MediaPro’s 2017 State of Privacy and Security Awareness Report in which they surveyed over 1,000 people and rated their responses to real-world cyber security questions. Respondents were grouped into 3 “risk profiles” based on their correct answers; ...

Overcoming Organizational Roadblocks to Cyber Security 

In many organizations, cyber security is perceived as one of those “important-but-not-urgent” issues that keep getting put off in deference to the pressing issues of the day – insurance denials, staffing, readmissions, patient no-shows, supply shortages…the list goes on.  It’s not that organizational leaders are doing nothing. In most organizations, the basic pieces, such as a HIPAA-compliant EHR, firewall, anti-virus software, and staff training, are all in place. It is these very safeguards ...

Cyber Security: Is it Really a Matter of Life or Death?

A webinar brought to you by the National Rural Health Association and Rural Hospital Insurance of America If you are the CEO, CFO or COO of a Rural Hospital then this webinar is for YOU! But, it is open to all healthcare management. On February 21, from 2:00 pm - 3:00 pm join the Rural Hospital Insurance of America (RHIA) program manager in conversation with two of America's leading experts in cyber threat protection, prevention, detection, and response to learn how to stay ahead of the growing and evo ...

Cyber Hygiene: Are your systems hardened?

Third Rock performs Risk Assessments (Security Risk Analysis) for very small firms to large organizations in healthcare, technical, financial, insurance, oil and gas, and other industries. We know the focus of the assessment needs to be security; therefore, we run an industry standard (NIST based) scan checking computers for vulnerabilities and many variants of compliance.  (NIST stands for National Institute of Standards and Technology) Our findings show that the average covered entity is about 15% co ...

Cloud or Not-to-Cloud; The Allscripts Breach

Allscripts’ Electronic Health Records service was the first major cloud-based EHR to be significantly disrupted by a ransomware attack.  Close to 1,500 practices were affected by the EHR outage for about a week; essentially shutting down those practices.  Allscripts was hit by the SamSam virus which was launched in December 2016, crippling two of their North Carolina data centers.  Angry customers voiced their displeasure on social media and a class-action lawsuit has been filed. Hackers have been r ...

Cybersecurity and The Endless List of Compliance

I recently wrote about insurance companies raising the bar on business to protect their valuable data to acquire cyber liability insurance.  But, it's not just insurance companies that are raising the bar. Governments around the globe are now requiring all types of companies to be compliant with some type of standard to better protect the data they possess.  What many people don't realize is these standards are all based on the protection of personal/private/confidential/sensitive/valuable informatio ...

Internet of Medical Things:  Real Security Threat or Hype?

For decades, healthcare medical devices functioned as freestanding tools. Glucometers, lasers, infusion pumps, pressure monitors, neonatal incubators, heart monitors – each serving its unique function independently of the others. With the widespread implementation of electronic health records (EHRs), however, and the push for increased digitization of health information, these devices have increasingly been networked into the patient information ecosystem.  They now transmit PHI between a myriad of syste ...

Practical Steps to Protect Your Data!

Being in the business of helping our customers protect their data, my email inbox is filled with news of cyber breaches and the latest, state of the art, machine learning artificial intelligence cybersecurity systems!  I think there is an “arms race” between the security products firms and the cyber criminals.  Feels like the criminals are winning, but they have a target rich environment.  Those defending against the hackers have to be correct 100% of the time while the criminals only have to fin ...

Shortage of Qualified Cybersecurity Workers: “…the greatest cyber risk of all.”

The 2017 Global Information Security Workforce Study (GISWS) released in February 2017 forecast a shortage of 1.8 million cybersecurity workers by 2020, while a study by Cybersecurity Ventures estimates “3.5 million unfilled cybersecurity jobs” by 2021. While the projected magnitude of the shortfall varies from one study to the next, government experts, consultants, and pundits alike are unanimous in predicting that the current shortage of qualified cybersecurity workers will only get worse for the ...

With the New Year, New Regulations!

With each New Year, we always look back and review the significant events of the previous year.  By all accounts, 2017 was a wild and woolly year!  World and national politics, the stock market, terrorism and acts of mass violence, devastating hurricanes, and forest fires! The digital world saw big changes as well with the repeal of net-neutrality and some major cyber breaches.   The Equifax breach effectively impacted half the population of the United States. Uber affected another 57 million people ...

1 2 3 4 5 6 7 8 22