<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>anti-virus Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/tag/anti-virus/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/tag/anti-virus/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Tue, 02 Jul 2019 12:08:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>anti-virus Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/tag/anti-virus/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Cyber Hygiene: Are your systems hardened?</title>
		<link>https://thirdrock.com/blog/2018/02/08/cyber-hygiene-are-your-systems-hardened/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 08 Feb 2018 15:00:46 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[auto-update]]></category>
		<category><![CDATA[backups]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[Managed Security Services Provider]]></category>
		<category><![CDATA[Managed Service Provider]]></category>
		<category><![CDATA[MSP]]></category>
		<category><![CDATA[MSSP]]></category>
		<category><![CDATA[NIST Compliant SRA]]></category>
		<category><![CDATA[Security Risk Assessment]]></category>
		<category><![CDATA[software]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5105</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/02/08/cyber-hygiene-are-your-systems-hardened/">Cyber Hygiene: Are your systems hardened?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" fetchpriority="high" decoding="async" class="size-medium wp-image-5129 alignright" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ING_19047_00156-300x225.jpg?resize=300%2C225&#038;ssl=1" alt="" width="300" height="225" /></p>
<p>Third Rock performs Risk Assessments (Security Risk Analysis) for very small firms to large organizations in healthcare, technical, financial, insurance, oil and gas, and other industries. We know the focus of the assessment needs to be security; therefore, we run an industry standard (NIST based) scan checking computers for vulnerabilities and many variants of compliance.  (NIST stands for National Institute of Standards and Technology) Our findings show that the average covered entity is about 15% compliant and the Windows Operating System is about 27% compliant against the NIST test.  It&#8217;s obvious to us that cybersecurity has not been addressed.</p>
<p>You might ask, &#8220;How do we improve these findings and correct these issues?&#8221;</p>
<p>It&#8217;s actually not too difficult.</p>
<ol>
<li>Make sure your software is up-to-date.  You should have &#8220;auto-update&#8221; turned on for operating systems, anti-virus software, and applications.</li>
<li>Ensure that your backups are (a) current, (b) secure, (c) off-site, and that they work. Test the backups on a daily basis to make sure they have not been encrypted by <a class="glossaryLink " href="https://thirdrock.com/glossary/ransomware/" data-cmtooltip="A type of malicious software designed to block access to a computer system until a sum of money is paid.">ransomware</a>.</li>
<li>Correct the deficiencies of the Windows operating system, including setting up password policies.  Utilizing a domain is wise.</li>
<li>Hire competent IT staff or a Managed Service Provider to provide consistent service for your computers and network.  Paying for assistance only when you have a problem means no one is monitoring your network or computers on a regular basis.</li>
<li>Make sure your network has been locked down. Change firewall logins regularly, and use strong passwords.  Hide or turn off WiFi broadcasting and use strong passwords.  Do NOT allow guests onto the company network.</li>
<li>If you&#8217;re a larger covered entity, you should consider hiring a Managed Security Services Provider (MSSP).</li>
</ol>
<p>Hope this helps you think about cybersecurity in a new light and to take action to harden your systems and network.</p>
<p>If you have any questions drop us an email at <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a>.  We&#8217;re happy to help!</p>
<h3 style="text-align: center;"><strong>Protect your Clients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/02/08/cyber-hygiene-are-your-systems-hardened/">Cyber Hygiene: Are your systems hardened?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5105</post-id>	</item>
		<item>
		<title>Protect Yourself!</title>
		<link>https://thirdrock.com/blog/2017/09/20/protect-yourself/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Wed, 20 Sep 2017 14:00:01 +0000</pubDate>
				<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[Protect yourself]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4528</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/20/protect-yourself/">Protect Yourself!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>If you’ve read our blog articles before, you’ve seen our tag line; <em>Protect your Patients. Protect your Practice. Protect Yourself.</em>  Most of our articles focus on protecting your practice and patients.  Very few have been focused on <em>you</em>, the individual and <em>your</em> protection.  Now each newsletter will include advice on how you can better protect yourself and your confidential data. Hopefully we can help your family and friends as well.</p>
<p>So, let’s start at square one; your home computer.  If it is connected to the Internet, it is vulnerable to cyber attack. Install a reputable antivirus software package on your system and turn on automatic updates.  Thousands of new computer viruses are created daily and existing ones are continually updated in an effort to sneak past antivirus software.  Almost a million new variants per day!  It&#8217;s very important that antivirus software is continually updated to recognize the latest viruses.  If you use on-line banking or bill payment, it is <em>essential</em> to have antivirus software.  There are many good products on the market that will cost between $20 to $60 per year.  There are some decent free versions available as well.  Search on 2017 antivirus reviews and a wide range of reviews are available, most from publications.  In my opinion, most are not completely unbiased due to ad revenue issues.  I tend to rely on Av-Test, an independent lab:  <a href="https://www.av-test.org/en/antivirus/home-windows/">https://www.av-test.org/en/antivirus/home-windows/</a>.</p>
<p>I won’t recommend a product as preferences vary and it boils down to personal preference.  I will say I don’t rely on Microsoft’s Windows Defender.  There are also concerns about Kaspersky Lab, which is always rated high, but there are worries about links to the Russian intelligence agencies. Though Kaspersky denies any ties to Russian government or spy organizations, the US government is blocking purchase and use of the software in its organizations.</p>
<p>Hope this helps you personally!  Join our free monthly <a href="http://thirdrock.us3.list-manage2.com/subscribe?u=1649a45c35ac1a873bb99bdb8&amp;id=7d7bf2b255">newsletter</a> to stay up-to-date on HIPAA and cybersecurity.</p>
<p style="text-align: center;">Protect Your Patients. Protect your Practice. Protect Yourself. ™</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/09/20/protect-yourself/">Protect Yourself!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4528</post-id>	</item>
		<item>
		<title>Closing the Cybersecurity Gap</title>
		<link>https://thirdrock.com/blog/2017/07/06/closing-the-cybersecurity-gap/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Thu, 06 Jul 2017 14:00:45 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber criminals]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[hipaa]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=4022</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/07/06/closing-the-cybersecurity-gap/">Closing the Cybersecurity Gap</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" decoding="async" class="alignleft wp-image-4024" style="margin-right: 10px; margin-top: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/bridge_gap-500.jpg?resize=235%2C217&#038;ssl=1" alt="" width="235" height="217" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/bridge_gap-500.jpg?resize=300%2C277&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/bridge_gap-500.jpg?w=500&amp;ssl=1 500w" sizes="(max-width: 235px) 100vw, 235px" />As we hear more and more about breaches and ransomware in businesses and especially healthcare, it is becoming an even greater concern for healthcare business owners. <em>It is no longer&nbsp;<strong>if</strong> you will be attacked, but <strong>when</strong> and <strong>how often</strong>.</em></p>
<p><strong>The first step </strong>in closing the cybersecurity gap is to realize that<strong> you can&#8217;t do it on your own.</strong> Cybersecurity is not finding your basic &#8220;IT guy&#8221; that &#8220;can fix it&#8221;. <strong>It is about obtaining the right resource</strong> whether that is a full time hire or a managed service.</p>
<p><strong>The next thing</strong> to realize with cybersecurity is that <strong>it is not a one time fix</strong>, but is ongoing and continually changing to meet the new challenges coming out every day. This is not just adding a firewall, anti-virus, patches, etc. <strong>It is a plan</strong>, a mentality that evolves over time.</p>
<p><strong>HIPAA is actually a good start towards good cybersecurity, <em>but it is not everything.</em> </strong>We all like to complain about HIPAA, but it is actually a great guide to getting your business far more secure and ready to be secure. However, to truly close the cybersecurity gap, no static documents and processes will keep you continuously secure by themselves.</p>
<p><strong>Why worry?</strong></p>
<p><strong>One breach can close your business!</strong> Think about your business being down for days, weeks, or even longer. How long can you survive? What about a breach where patient data gets stolen and leaked!! Now you have to go through notifying the government <em>and</em> the public, HIPAA audits, and major fines.</p>
<p><strong>Keep in mind there are 4 tiers of HIPAA fines.</strong> If you have a proper HIPAA risk assessment and cybersecurity plan, those fines will be significantly reduced. If not, you could see fines of $50,000 PER PATIENT RECORD.</p>
<p><strong>Time to close that GAP!!</strong></p>
<p style="text-align: center;"><strong>Protect Your Patients. &nbsp;Protect Your&nbsp;Practice. Protect Yourself™.</strong></p>
<p style="text-align: left;">If you have questions concerning establishing a cybersecurity plan or about HIPAA, including how to conduct a Security Risk Assessment or how to best remediate identified risks, please contact us:&nbsp;<a href="mailto:info@thirdrock.com">info@thirdrock.com</a>; 512.310.0020. &nbsp;We&#8217;d be happy to help!</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/07/06/closing-the-cybersecurity-gap/">Closing the Cybersecurity Gap</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4022</post-id>	</item>
		<item>
		<title>Cybersecurity: Have you hardened your systems?</title>
		<link>https://thirdrock.com/blog/2017/04/25/cyber-security-have-you-hardened-your-systems/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 25 Apr 2017 14:00:15 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[backup & recovery]]></category>
		<category><![CDATA[Business Associates]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3568</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/04/25/cyber-security-have-you-hardened-your-systems/">Cybersecurity: Have you hardened your systems?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-3577 alignleft" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Blue-Cyber-Security-key-on-grey-keyboard.jpg?resize=186%2C124&#038;ssl=1" alt="" width="186" height="124" scale="0" /></p>
<p>We perform HIPAA Risk Assessments (Security Risk Analysis) for very small practices to large healthcare organizations, plus business associates that include software, big data, and marketing companies.  We know the focus of the assessment needs to be security; therefore, we run an industry standard (NIST based) scan checking computers for HIPAA compliance.  (NIST stands for National Institute of Standards and Technology) Our findings show that the average covered entity is about 15% compliant and the Windows Operating System is about 63% compliant against the NIST test.  It&#8217;s obvious to us that cybersecurity has not been addressed.</p>
<p>If you&#8217;re a covered entity or a business associate, you might ask, &#8220;How do we improve these findings and correct these issues?&#8221;</p>
<p>It&#8217;s actually not too difficult.</p>
<ol>
<li>Make sure your software is up-to-date.  You should have &#8220;auto-update&#8221; turned on for operating systems, anti-virus software, and applications.</li>
<li>Ensure that your backups are (a) current, (b) secure, (c) off-site, and that they work. Test the backups on a daily basis to make sure they have not been encrypted by ransomware.</li>
<li>Correct the deficiencies of the Windows operating system, including setting up password policies.  Utilizing a domain is wise.</li>
<li>Hire competent IT staff or a Managed Service Provider to provide consistent service for your computers and network.  Paying for assistance only when you have a problem means no one is monitoring your network or computers on a regular basis.</li>
<li>Make sure your network has been locked down. Change firewall logins regularly, and use strong passwords.  Hide or turn off WIFI broadcasting and use strong passwords.  Do NOT allow guests onto the company network.</li>
<li>If you&#8217;re a larger covered entity, you should consider hiring a Managed Security Services Provider (MSSP).</li>
</ol>
<p> <span style="font-size: 12px;">Hope this helps you think about cyber security in a new light and to take action to Protect Your Patients, Protect Your Practice, and Protect Yourself.</span></p>
<p>If you have any questions drop us an email at <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a>.  We&#8217;re happy to help!</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/04/25/cyber-security-have-you-hardened-your-systems/">Cybersecurity: Have you hardened your systems?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3568</post-id>	</item>
		<item>
		<title>Why Physicians should never use public Wi-Fi</title>
		<link>https://thirdrock.com/blog/2017/01/10/why-physicians-should-never-use-public-wi-fi/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 10 Jan 2017 15:00:01 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[Cyber-threats]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[mobile phone hotspot]]></category>
		<category><![CDATA[virtual private network]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2781</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/01/10/why-physicians-should-never-use-public-wi-fi/">Why Physicians should never use public Wi-Fi</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2823 size-medium" style="margin-top: 10px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Free-Wi-Fi-on-tablet.jpg?resize=257%2C168&#038;ssl=1" width="257" height="168" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Free-Wi-Fi-on-tablet.jpg?resize=300%2C196&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Free-Wi-Fi-on-tablet.jpg?w=306&amp;ssl=1 306w" sizes="(max-width: 257px) 100vw, 257px" /></p>
<p>We all enjoy the convenience of being somewhere, like a coffee shop, airport, hotel room, or lobby of a building waiting, and hopping on the free WiFi to catch up on some work. Unfortunately, all healthcare workers should avoid free WiFi at all costs.  It is very important to realize that if you can access the free WiFi, so can anyone else. They can even leave devices behind that stay on the WiFi, breach other systems and transmit the data back to their &#8220;home&#8221; base.  If you share a local WiFi network, it is fairly easy for someone to access your device (laptop, tablet, phone) and copy data from your device to theirs without you ever knowing it.  It&#8217;s worth noting that criminals can infect your device with a virus or malware and later take control or steal data from your device.</p>
<p><span style="font-size: 12px;"> </span></p>
<p>There are several things you can do to prevent a breach &#8230;</p>
<ol style="padding-left: 1em;">
<li style="text-indent: -1em;">Don&#8217;t connect to free WiFi networks.</li>
<li style="text-indent: -1em;">Use your mobile phone hotspot or wait until you&#8217;re on a known secure network.</li>
<li style="text-indent: -1em;">If you do use free WiFi or connect remotely to your EMR or other applications use a VPN (virtual private network).</li>
<li style="text-indent: -1em;">Make sure you have a properly configured firewall on your device and select &#8220;public&#8221; network when you connect.</li>
<li style="text-indent: -1em;">Encrypt the data on your device.</li>
<li style="text-indent: -1em;">Did I say, &#8220;Don&#8217;t use free WiFi networks.&#8221;?</li>
<li style="text-indent: -1em;">Don&#8217;t download, access, or store PHI on mobile devices.</li>
</ol>
<p>Their are various ways to address the above list, contact your tech expert for assistance and make it a high priority.</p>
<p>Take away:  Make cyber security a top priority for 2017, take a step each week to improve your cyber security.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/01/10/why-physicians-should-never-use-public-wi-fi/">Why Physicians should never use public Wi-Fi</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2781</post-id>	</item>
		<item>
		<title>Focus on Technology: HIPAA Quick Fixes</title>
		<link>https://thirdrock.com/blog/2016/09/27/hipaa-technology-quick-fix/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Tue, 27 Sep 2016 14:00:37 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Compliance Technology]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Focus on Technology]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[automatic updates]]></category>
		<category><![CDATA[Quick fix]]></category>
		<category><![CDATA[strong passwords]]></category>
		<category><![CDATA[training]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=2300</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2016/09/27/hipaa-technology-quick-fix/">Focus on Technology: HIPAA Quick Fixes</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" width="300" height="200" class="alignleft wp-image-2349 size-medium" style="margin-bottom: 20px; margin-right: 10px;" alt="Keep IT Simple" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?resize=300%2C200&#038;ssl=1" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/c1268836_m.jpg?w=600&amp;ssl=1 600w" sizes="(max-width: 300px) 100vw, 300px" /></a>While meeting all the HIPAA requirements for your technology (computer, network, etc.) requires some planning, there are some quick fixes that can greatly reduce the odds of your organization being breached while at the same time starting you on your path to compliance.</p>
<p>Below are some common issues that we see at all sizes of organizations. How you go about correcting some of them is determined by the size and resources of your organization.</p>
<div style="clear: both;"></div>
<h4>Quick Fix #1</h4>
<p><strong>Issue: The operating system (i.e. Windows) on your organization&#8217;s computers / laptops is out of date. </strong></p>
<p><strong>Details:</strong> Hackers are constantly finding new ways into your computers. If you do not keep your computer up to date, it leaves these vulnerabilities open for attack.</p>
<p><strong>Fix:</strong> For smaller organizations you will need to manually check each of your computers to make sure automatic updates are turned on and updating. Alternatively there are centralized patch management systems that can help, if you are running on a Windows domain.</p>
<h4>Quick Fix #2</h4>
<p><strong>Issue: Weak password! Simple passwords DO NOT WORK!</strong></p>
<p><strong>Details:</strong> Hackers can download a tool off of the internet to crack passwords fairly easily. The weaker the password the more likely the hacker will be able to breach your computer and network.</p>
<p><strong>Fix:</strong> Require that all users have unique accounts and passwords that are a minimum of 12 characters with a mix of UPPERCASE, lowercase, numbers, and at least one special character (i.e. !@#$%^&amp;*). You should also have your users change their password every 90 days max. If you have a Windows domain you can enforce this with a domain policy.</p>
<h4>Quick Fix #3</h4>
<p><strong>Issue: Outdated Antivirus</strong></p>
<p><strong>Details:</strong> Similar to #1, if your antivirus is out of date, your computers and networks are vulnerable to the latest virus&#8217;, malware, and ransomware.</p>
<p><strong>Fix:</strong> Check all of your computer&#8217;s antivirus software to ensure that it still has an active subscription, is running, and is being updated. Most major antivirus companies have business versions of their product that allow you to centrally manage the antivirus and reduce the likelihood of something happening.</p>
<h4>Quick Fix #4</h4>
<p><strong>Issue: Lack of trained staff</strong></p>
<p><strong>Details:</strong> Staff that has not been trained to watch out for malware in emails or on the web is generally the most likely way for your organization to become a victim of malware or ransomware.</p>
<p><strong>Fix:</strong> Ensure the staff is properly trained in HIPAA. There are plenty of online training courses that are neither expensive nor time consuming. While the return on investment may be hidden, it is huge.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2016/09/27/hipaa-technology-quick-fix/">Focus on Technology: HIPAA Quick Fixes</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2300</post-id>	</item>
		<item>
		<title>Using Caution with Email Attachments</title>
		<link>https://thirdrock.com/blog/2016/07/12/using-caution-with-email-attachments/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Tue, 12 Jul 2016 13:45:50 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[tech tips]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1844</guid>

					<description><![CDATA[<p>Email is a way of life in most business and is often one of those tools we take for granted. We all feel the pain when it is down as [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2016/07/12/using-caution-with-email-attachments/">Using Caution with Email Attachments</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1275228_m.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-2422 size-medium" style="margin-bottom: 10px; margin-left: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/c1275228_m-300x233.jpg?resize=300%2C233&#038;ssl=1" width="300" height="233" /></a></p>
<p>Email is a way of life in most business and is often one of those tools we take for granted. We all feel the pain when it is down as for many it is a key part of their job. It&#8217;s also an extremely powerful tool that allows us to not only send and receive messages and meeting request, but also attachments. This is where email becomes dangerous to both you and your organization. Most organizations take some level of effort to protect the computer and network from these potentially dangerous attachments with varying levels of success. However there are practical steps that you can take to help ensure that a dangerous email attachment does not infect your organization.</p>
<h3>Why can email attachments be dangerous?</h3>
<p>Some of the characteristics that make email attachments convenient and popular are also the ones that make them a common tool for attackers:</p>
<ul>
<li>Attachments can pose a threat when it is an executable and/or script.</li>
<li>Attachments can come in the form of a virus which infects your computer and potentially automatically forwards itself to everyone in your address book, quickly infecting your entire organization as well as others in your address book. This could include ransomware, data theft, etc.</li>
<li>Attachments could be used to data mine your emails for personal or business information that can be used to harm you or your organization.</li>
</ul>
<p><strong>What steps can you take to protect yourself and others in your address book?</strong></p>
<ul>
<li>Be wary of unsolicited attachments, even from people you know &#8211; Just because an email message looks like it came from your mom, grandma, or boss doesn&#8217;t mean that it did. Many viruses can &#8220;spoof&#8221; the return address, making it look like the message came from someone else. If you can, check with the person who supposedly sent the message to make sure it&#8217;s legitimate before opening any attachments. This includes email messages that appear to be from your ISP or software vendor and claim to include patches or anti-virus software. ISPs and software vendors do not send patches or software via email.</li>
<li>Keep software up to date &#8211; Install software patches so that attackers can&#8217;t take advantage of known problems or vulnerabilities (see Understanding Patches for more information). Many operating systems offer automatic updates. If this option is available, you should enable it.</li>
<li>Trust your instincts &#8211; If an email or email attachment seems suspicious, don&#8217;t open it, even if your anti-virus software indicates that the message is clean. Attackers are constantly releasing new viruses, and the anti-virus software might not have the signature. At the very least, contact the person who supposedly sent the message to make sure it&#8217;s legitimate before you open the attachment. However, especially in the case of forwards, even messages sent by a legitimate sender might contain a virus. If something about the email or the attachment makes you uncomfortable, there may be a good reason. Don&#8217;t let your curiosity put your computer at risk.</li>
<li>Turn off the option to automatically download attachments &#8211; To simplify the process of reading email, many email programs offer the feature to automatically download attachments. Check your settings to see if your software offers the option, and make sure to disable it.</li>
<li>Save and scan any attachments before opening them &#8211; If you have to open an attachment before you can verify the source, take the following steps:</li>
</ul>
<ol>
<li>Be sure the signatures in your anti-virus software are up to date.</li>
<li>Save the file to your computer or a disk.</li>
<li>Manually scan the file using your anti-virus software.</li>
<li>If the file is clean and doesn&#8217;t seem suspicious, go ahead and open it.</li>
</ol>
<p>The post <a href="https://thirdrock.com/blog/2016/07/12/using-caution-with-email-attachments/">Using Caution with Email Attachments</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1844</post-id>	</item>
		<item>
		<title>Coffee Makers and World Mayhem!</title>
		<link>https://thirdrock.com/blog/2015/11/17/coffee-makers-and-world-mayhem/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 17 Nov 2015 15:00:46 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[coffee makers]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[digital coffee machines]]></category>
		<category><![CDATA[internet of things]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=1149</guid>

					<description><![CDATA[<p>We’ve all heard or read about cyber breaches and viruses taking down clouds of computers or stealing millions of customer records.  But have you ever thought about a virus shutting [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2015/11/17/coffee-makers-and-world-mayhem/">Coffee Makers and World Mayhem!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="background: white;"><span style="font-size: 11.0pt; font-family: 'Calibri',sans-serif; color: black;">We’ve all heard or read about cyber breaches and viruses taking down clouds of computers or stealing millions of customer records.  But have you ever thought about a virus shutting off your coffee maker.  You might ask, “Why would a criminal want to turn off my coffee maker?”  Well, you’re not thinking like a criminal or an aggressive nation.  Instead of thinking about it on a personal basis, “Why did these scums crash my computer and cause me to lose all my data!”, think about the pandemonium they can cause by hitting millions of people simultaneously with a frustrating event.</span></p>
<p style="background: white;"><span style="font-size: 11.0pt; font-family: 'Calibri',sans-serif; color: black;">Back to coffee makers.  Let’s assume the Internet of Things is here for coffee makers and most of the coffee makers in the (modern) world (70% of them) are connected.  A nation wants to cause the American economy to have a hick-up.  They release a time-bomb virus on all coffee makers.  On Valentine’s Day, the virus shutdowns all coffee makers in the U.S.  Every “addicted” person awakes, goes to make a cup of coffee and nothing happens.  Well, fine, some pull out the old coffee maker from under the cabinet and stumble through making their addiction juice.  But, most head out to buy a cup.  However, the virus has shutdown industrial coffee makers too.  Now, this is getting ugly and fast.  People, think, fine, I’ll head to the office and make coffee.  Upon arriving at work they head straight to the break room and find a line of torqued up coffee addicts.  The machine doesn’t seem to be working, no power.  Hmmm, my coffee maker didn’t work either.  Now, the cats out of the bag and everyone realizes all of the coffee makers are “down”.  But, not sure why.</span></p>
<p><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/p240925_s.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" class=" wp-image-1150" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/p240925_s.jpg?resize=113%2C170&#038;ssl=1" alt="Close up of woman touching head in pain" width="113" height="170" /></a></p>
<p style="background: white;"><span style="font-size: 11.0pt; font-family: 'Calibri',sans-serif; color: black;">Production for the day isn’t good.  Many workers, the coffee drinkers are edgy, the other workers are wondering what appliance is next and millions of man hours are wasted.  Everyone, thinks, “Someone” will fix the problem and tomorrow will be better.  But, there is no simple, quick fix.  Plus, half of the nation screwed up, forgot to buy flowers and chocolates because they were to self-consumed with not having their daily coffee.  If only a 10% reduction in Valentines Day spending, that&#8217;s $1.9 Billion.  The second day is worse, production is lower, but people decide to take matters into their own hand and buy new coffee makers.  The problem is, the virus hits those coffee makers immediately and they become useless counter weights.  This goes on for several days at full force and lingers on for several weeks.  </span></p>
<p style="background: white;"><span style="font-size: 11.0pt; font-family: 'Calibri',sans-serif; color: black;">So, the criminals or nation has been successful in disrupting American productivity.  SCORE!!!  Now it’s time to get serious and do some real damage, the proof of concept was very successful, and the side benefit was good too.  The criminals bought large amounts of coffee maker stocks, which rose over the following weeks and months.  To add insult to injury they made millions off the demand they generated and disrupted American productivity.  They are the envied Kings of the dark net world.</span></p>
<p style="background: white;"><span style="font-size: 11.0pt; font-family: 'Calibri',sans-serif; color: black;">Now, the game is on, the next guys will be working hard to do it bigger and better soon.  Be wary of your need for convenience or desire to live like the Jetson’s.  The Internet of Things is here and bringing massive changes to the world, but like most changes there are side effects and some are worse than others.</span></p>
<p style="background: white;"><span style="font-size: 11.0pt; font-family: 'Calibri',sans-serif; color: black;">Next up: Mass Hysteria -The Hacking of A-u-t-m-o-b-i-l-e-s!  (You thought coffee makers pose a problem!)</span></p>
<p>The post <a href="https://thirdrock.com/blog/2015/11/17/coffee-makers-and-world-mayhem/">Coffee Makers and World Mayhem!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1149</post-id>	</item>
	</channel>
</rss>
