<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>cyber breach Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/tag/cyber-breach/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/tag/cyber-breach/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Thu, 27 Jun 2019 01:34:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>cyber breach Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/tag/cyber-breach/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>HIPAA Compliance is a Business Decision</title>
		<link>https://thirdrock.com/blog/2017/10/18/hipaa-compliance-is-a-business-decision/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Wed, 18 Oct 2017 15:10:57 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[Business Associates]]></category>
		<category><![CDATA[business decision]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[fines]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[OCR audits]]></category>
		<category><![CDATA[remediation costs]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4706</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/10/18/hipaa-compliance-is-a-business-decision/">HIPAA Compliance is a Business Decision</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" fetchpriority="high" decoding="async" class="alignright wp-image-2261 size-medium" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/poker_chips_and_dice-300x297.jpg?resize=300%2C297&#038;ssl=1" alt="" width="300" height="297" />A couple of weeks ago, I was talking with a technology vendor who is starting to move into the healthcare space. Their technology isn’t used in the creation or manipulation of patients’ protected health information (PHI), but they do store information on behalf of healthcare organizations that could <em>potentially </em>include PHI. They wanted to know, “Are we required to comply with HIPAA?” Technically – yes. On the other hand, there are hundreds of healthcare organizations and healthcare vendors who actively choose not to comply.</p>
<p>As a healthcare organization or vendor with narrow profit margins, it’s understandable that one might think of HIPAA as a deferrable expense. After all, what are the chances of an information breach? Of an OCR audit?</p>
<p>Unfortunately, the chances are significant &#8211; and growing. Consider these facts:</p>
<ul>
<li>A healthcare record is worth 100-300 times the value of a credit card record on the black market (i.e., $100-$300 per healthcare record vs. $1 per credit card account number). Consequently, cyber criminals are <em>targeting</em> healthcare organizations.</li>
<li>Healthcare organizations, in general, are very vulnerable to cyber attacks for a variety of reasons, including lack of personnel with cybersecurity expertise; years of under-investment in IT infrastructure; naivete regarding the threats; high staff churn; and poor physical facility controls.</li>
<li>The risk of an OCR audit is <em>very small</em>. The risk of a covered entity being breached is <em>very high. If breached, the risk of an OCR audit goes to 100%.</em></li>
<li>If a Covered Entity is breached and then audited, the risk of that Covered Entity’s Business Associates being audited is also very high.</li>
<li>When audited, organizations that can demonstrate they have taken all appropriate precautions will be fined at the lowest rate &#8211; or not at all. On the other hand, organizations that have actively neglected cybersecurity and HIPAA compliance will be fined at the &#8220;highest rate.&#8221; In fact, some recent fines levied by the OCR have exceeded what was previously thought to be the &#8220;maximum allowable.&#8221;</li>
<li>The fine is only a portion of the total breach remediation costs. Other costs include patient notification (approximately $4 per affected patient); credit monitoring for affected individuals (free to the patients) for 1-3 years; legal fees; class action lawsuit settlements; personnel time spent handling the remediation; and reputation loss.</li>
<li>Finally, HIPAA violations can now be prosecuted as both civil and criminal offenses.</li>
</ul>
<p>Whether and how to invest in cybersecurity training and technology and HIPAA compliance is a business decision only you can make based on your own ethics and risk tolerance. Be sure, however, to base your decision on facts. Up-to-date breach information across industries is available at the Identity Theft Resource Center (ITRC). A list of healthcare organizations fined for HIPAA violations following a breach can be found on the <a href="https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf">HHS OCR’s Breach Report list</a>. Whatever your choice, ensure that you have protected your customers’ data, protected your organization from the risk of data loss, and protected yourself by understanding and complying with all relevant laws.</p>
<h3 style="text-align: center;"><strong>Protect your Patients. Protect your Organization. Protect Yourself.™</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/10/18/hipaa-compliance-is-a-business-decision/">HIPAA Compliance is a Business Decision</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4706</post-id>	</item>
		<item>
		<title>It is Time for Us to Take Control of Our Data!</title>
		<link>https://thirdrock.com/blog/2017/09/28/it-is-time-for-us-to-take-control-of-our-data/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 28 Sep 2017 16:38:47 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[security risk analysis]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4591</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/28/it-is-time-for-us-to-take-control-of-our-data/">It is Time for Us to Take Control of Our Data!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-1415 size-full" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ARRRGH-Background-Design.-The-Word-Cloud-Concept.c655643_s.jpg?resize=267%2C200&#038;ssl=1" alt="" width="267" height="200">The EquiFax breach really has me angry.&nbsp; Mostly because I have no control over any aspect of this mess.&nbsp; EquiFax scoops up data on all of us without our consent.&nbsp; They seem unaccountable and untouchable.&nbsp;&nbsp; With a last name like mine, I’ve had many opportunities to dispute incorrect data on my credit reports, which is always time consuming and irritating.&nbsp; They make it known how unimportant you are and assume you are “guilty” unless you prove otherwise.&nbsp; They collect data on all the people in the U.S. old enough to make purchases using credit, and they don’t even bother to encrypt it!&nbsp; Worse yet they didn&#8217;t even bother to patch their systems after they had several breaches earlier this year!&nbsp; Talk about arrogant!</p>
<p>Is EquiFax just one bad apple?&nbsp; Sadly, they are not. &nbsp;Historically, industries with self-certification of compliance to data protection regulations have woefully low compliance. &nbsp;Government surveys say the healthcare industry is about 15 percent compliant!&nbsp; With respect to the credit card industry, they are better than the healthcare industry by a whopping 5 percent!&nbsp; Eighty percent of businesses fall short.&nbsp; The insurance and financial industries currently have NO regulations to protect your data!&nbsp; The “good news” is regulations are being drafted and are being implemented starting with New York state.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3133 size-medium" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Information-Security-on-Red-Key-on-white-keyboard.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200"></p>
<p>I hope EquiFax is a tipping point for the consumers in our country!&nbsp; It’s time we take control of our data and demand it is properly protected.&nbsp; Nothing seems safe when each morning news declares there is another data breach and the North Koreans launched another missile! It is alarming and discouraging.&nbsp; But I shouldn’t have to give away my hard-earned credit score to buy that shiny new toy for my man cave (I wish!) for a low price on the Internet. I shouldn’t have to worry that my most confidential data is in jeopardy because I had my annual physical! Should I buy that insurance policy to protect my family, or will the data I provide on the application fall into the hands of cybercriminals and cause significant damage to my family?</p>
<p>Going forward, I will do my homework when purchasing online by selecting reputable companies and not chasing the lowest price.&nbsp; I will ask my doctor when was the last time his practice did a security risk assessment and all staff had cyber security training?&nbsp; Does their medical system encrypt the data at all points (most don&#8217;t)?&nbsp; I will look at my financial and insurance companies with a skeptical eye and make informed decisions.&nbsp; I will also add my voice to the Equifax failure to better protect my children and their future.</p>
<p>I encourage you to take our confidential&nbsp;<a href="https://cyberquickcheck.com/">free mini-Risk Assessment</a>&nbsp;to see how compliant your organization is. Should you discover you aren&#8217;t as compliant as you had hoped, contact us at&nbsp;<a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a>. &nbsp;We&#8217;d be happy to help you improve your score and protect your patients, your practice, and yourself!</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/09/28/it-is-time-for-us-to-take-control-of-our-data/">It is Time for Us to Take Control of Our Data!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4591</post-id>	</item>
		<item>
		<title>The Equifax Data Breach – What You should do to Protect Yourself!</title>
		<link>https://thirdrock.com/blog/2017/09/21/the-equifax-data-breach-what-you-should-do-to-protect-yourself/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 21 Sep 2017 14:00:40 +0000</pubDate>
				<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Protect yourself]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4514</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/21/the-equifax-data-breach-what-you-should-do-to-protect-yourself/">The Equifax Data Breach – What You should do to Protect Yourself!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1566" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Data-breach-blue-letters-c843442_s.jpg?resize=200%2C150&#038;ssl=1" alt="" width="200" height="150" /></p>
<p>Stealing headlines from Hurricane Irma was the revelation that Equifax experienced a major data breach during the summer.  Equifax is one of the “big three” credit monitoring services and therefore the data they collect on each of us is broad and deep.  They estimate that data for 143 million people &#8211;  nearly half the population of the United States – has been stolen!</p>
<p>What does this breach mean for you?  Your financial history and ability to buy a home, new car, or even get healthcare could be at stake.  Here are recommended steps to protect you and your family.</p>
<ol>
<li><strong>Be skeptical!</strong> Equifax is looking out for itself, not you!  They will fight to survive this fiasco, spending the minimum required. Don’t give away your rights &#8211; read all documents carefully before signing. Don’t rush to sign any agreements. The aftermath of the breach will play out over months, not hours, and new information will emerge every week.</li>
<li><strong>Be cautious!</strong> This breach is so large, scammers will take advantage of it.  We learned this morning that a hacktivist created a fake EquiFax website where consumers could check to see if their information was stolen.  EquiFax actually linked to this bogus site and directed consumers to it!  (Remember item 1 &#8211; Be Skeptical!) Also be wary of offers to sign up for credit monitoring services and giving out any additional personal information!  Validate the authenticity of any such services. Research these services because many do not provide the protection you need or believe you will receive.</li>
<li><strong>Assume your data has been stolen,</strong> <em>even if Equifax says your data has not been stolen</em>! Breaches tend to grow over time because companies often under-report to minimize the bad publicity. As the company investigates the breach, they are also likely to uncover more theft that wasn’t obvious at the beginning of the investigation. For instance, on Tuesday of this week, it was publicized that EquiFax suffered additional breaches this year before this major breach.</li>
<li><strong>Check the Equifax website</strong> set up to inform people if their data was stolen. The link to the site is  <a href="http://www.equifaxsecurity2017.com/">equifaxsecurity2017.com</a>.  Questions abound about whether the website provides accurate responses or not!  Remember, be skeptical!</li>
<li><strong>Keep all your records!</strong> Record all your interactions with Equifax. Ask for email confirmations after phone conversations. Save email as PDFs.  Any costs you incur, get receipts and put them in a specific location or folder.</li>
<li><strong>Check your credit report</strong> at; <a href="https://www.annualcreditreport.com/index.action">https://www.annualcreditreport.com/index.action</a>.  This is a free service and you can get one free report a year from each credit reporting service.  I recommend getting one report every 4 months from a different service so you can maintain a fairly regular status of your credit information.</li>
<li><strong>Freeze your Credit</strong> – this is your last option and prevents companies from checking your credit score in an effort to get additional credit. This is not something you should do without evaluating your circumstances.  If you are planning to purchase a new car, take out a loan, or get a new credit card, you should evaluate your options.</li>
</ol>
<p>This blog was originally intended as the second article in the new <strong>“Protect Yourself” </strong>section of our monthly newsletter.  We focus on protecting small to medium sized <em>businesses</em> but felt we needed to offer some cyber protection information to the individual <em>people</em> who read our newsletter.  I was looking forward to gradually building up our readers knowledge and skills to eventually cover this topic, but the Equifax breach is just like hurricanes Harvey, Irma and Maria – unpredictable and causing a lot of damage and pain.  I hope this helps you all and best of luck!  We are all going to need it!  And please remember and help in any way you can all those affected by these hurricanes.</p>
<p style="text-align: center;">Join our free monthly <a href="http://thirdrock.us3.list-manage2.com/subscribe?u=1649a45c35ac1a873bb99bdb8&amp;id=7d7bf2b255">newsletter</a> to stay up-to-date on HIPAA and cybersecurity.</p>
<p style="text-align: center;">Protect Your Patients. Protect your Practice. Protect Yourself. ™</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/09/21/the-equifax-data-breach-what-you-should-do-to-protect-yourself/">The Equifax Data Breach – What You should do to Protect Yourself!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4514</post-id>	</item>
		<item>
		<title>Think you can take your time when breached? Think Again!</title>
		<link>https://thirdrock.com/blog/2017/09/13/think-you-can-take-your-time-when-breached-think-again/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Wed, 13 Sep 2017 19:13:02 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[ePHI]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[PHI]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=4493</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/09/13/think-you-can-take-your-time-when-breached-think-again/">Think you can take your time when breached? Think Again!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-1055" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/money-trash.jpg?resize=200%2C271&#038;ssl=1" alt="" width="200" height="271" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/money-trash.jpg?resize=221%2C300&amp;ssl=1 221w, https://i0.wp.com/thirdrock.com/wp-content/uploads/money-trash.jpg?w=250&amp;ssl=1 250w" sizes="(max-width: 200px) 100vw, 200px" />In January of this year, the <a href="https://www.hhs.gov/ocr/index.html">HHS Office of Civil Rights</a> levied a $475,000 fine against Presence Health for taking too long to notify their patients &#8211; as well as the OCR &#8211; after discovering the breach of PHI (protected health information).&nbsp;The incident occurred in October 2013 when Presence Health, based in Illinois, discovered that hundreds of physical documents containing patient names, birth dates, medical record numbers, and surgery details for 836 patients were missing. &nbsp;They did not report the breach to the OCR until Jan, 31, 2014 — 100 days after the incident occurred.</p>
<p>This was the first HIPAA fine &#8220;<em>solely based on an unnecessary delay to breach notification</em>&#8221; (<a href="https://www.hipaajournal.com/475000-settlement-delayed-hipaa-breach-notification-8640/">HIPAAJournal</a>).</p>
<p>Now, CoPilot Provider Support Services, Inc., a business associate based in New York, is under investigation for delayed reporting of a breach of ePHI (electronic protected health information). An unauthorized person accessed and downloaded 221,178 individuals&#8217; sensitive information in October 2015, but CoPilot didn&#8217;t involve the FBI until February 2016 and didn&#8217;t issue breach notifications to patients or the media until January 2017.&nbsp;Oops! The OCR is still investigating whether CoPilot is a HIPAA-covered entity, but the NY State Attorney General levied a $130,000 fine in June for violation of state law, according to an <a href="https://ag.ny.gov/press-release/ag-schneiderman-announces-settlement-healthcare-services-company-illegally-deferred">announcement </a>from the Attorney General&#8217;s Office.</p>
<p>Healthcare entities cannot <em>afford</em> to delay breach notification. Here&#8217;s a summary of the basic notification requirements outlined in the&nbsp;<a href="https://www.hhs.gov/hipaa/for-professionals/breach-notification">Breach Notification Rule:</a></p>
<ul>
<li>A covered entity <span style="text-decoration: underline;">must</span> notify the Secretary of Health and Human Services (via their portal) if it discovers a breach of <em>unsecured</em> protected health information.
<ul>
<li>&nbsp;If the breach affects <span style="text-decoration: underline;">500 or more</span> individuals, the covered entity must notify HHS/OCR &#8220;without unreasonable delay and in no case later than 60 calendar days from the discovery of the breach.&#8221; (HHS.gov)</li>
<li>If a breach affects <span style="text-decoration: underline;">fewer than 500 individuals</span>, the covered entity must notify HHS/OCR&nbsp;&#8220;within 60 days of the end of the calendar year in which the breach was discovered.&#8221; It is NOT necessary to wait until the end of the calendar year.</li>
</ul>
</li>
<li>Regardless of the size of the breach, a covered entity <span style="text-decoration: underline;">must</span> notify patients &#8220;in written form by first-class mail&#8230;or by e-mail&#8221; (if an individual has agreed to email communication)&nbsp;&#8220;without unreasonable delay and in no case later than 60 days following the discovery of a breach.&#8221;</li>
<li>If a breach affects more than 500 individuals, the covered entity <span style="text-decoration: underline;">must</span> also notify the media.</li>
</ul>
<p>More detailed instructions for dealing with incomplete or out of date contact information can be found on the HHS website.</p>
<p>These incidents and resulting fines should serve as a wake-up call to the industry &#8211; take action sooner rather than later!</p>
<p style="text-align: center;">Join our free monthly&nbsp;<a href="http://thirdrock.us3.list-manage2.com/subscribe?u=1649a45c35ac1a873bb99bdb8&amp;id=7d7bf2b255">newsletter</a>&nbsp;to stay up-to-date on HIPAA and cybersecurity.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/09/13/think-you-can-take-your-time-when-breached-think-again/">Think you can take your time when breached? Think Again!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4493</post-id>	</item>
		<item>
		<title>An Ounce of Prevention &#8211; Why HIPAA Guidelines should be your standard operating procedures</title>
		<link>https://thirdrock.com/blog/2017/08/22/an-ounce-of-prevention-why-hipaa-guidelines-should-be-your-standard-operating-procedures/</link>
		
		<dc:creator><![CDATA[Blake Cole]]></dc:creator>
		<pubDate>Tue, 22 Aug 2017 15:00:40 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA guidelines]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[simple]]></category>
		<category><![CDATA[standard operating procedures]]></category>
		<category><![CDATA[training]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=4200</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/08/22/an-ounce-of-prevention-why-hipaa-guidelines-should-be-your-standard-operating-procedures/">An Ounce of Prevention &#8211; Why HIPAA Guidelines should be your standard operating procedures</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-290 size-full" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/2014/10/breach-target.jpg?resize=220%2C150&#038;ssl=1" alt="" width="220" height="150" /></p>
<p>The American Heart Association lists heart disease as the #1 cause of death in the US with nearly 800,000 deaths per year. In comparison, more than 3.1 million patients have been impacted <em>in the first half of 2017</em> by a data breach that led to the theft of protected health information (PHI). That&#8217;s right — in half the time, nearly four times as many people have been impacted by an information breach as have died from heart disease! Yet an estimated two thirds of medical practices remain at risk of being breached due to a lack of appropriate privacy and security measures as outlined in the 2013 HIPAA Omnibus Rule.</p>
<h4>Getting on a Compliance Diet</h4>
<p>This is where the old adage of “an ounce of prevention” comes into play. Diet and exercise have been drilled into us since we were young as the most important factors for preventing heart disease. The consequences of forgoing them seemed small in those days. But over time, things changed and life got busy. Various demands on our time started to pile up, and what was once routine is now a New Year&#8217;s resolution.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4213" style="margin-right: 10px; margin-top: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Keep-it-simple-white-text-on-red.jpg?resize=214%2C142&#038;ssl=1" alt="Finger Pressing a Modern Laptop Keyboard Key with Keep It Simple Sign. Finger Pushing Keep It Simple Key on Modernized Keyboard. Man Finger Pushing Keep It Simple Red Key on Modernized Keyboard. 3D." width="214" height="142" /></p>
<p>HIPAA compliance is no different. You know you should follow HIPAA guidelines, not just because it&#8217;s the law, but because protecting your patients&#8217; data is fundamental to the business and reputational integrity of your practice. But there are so many other demands on your time &#8211; OSHA, MACRA, staffing, payer negotiations, drug-resistant TB, continuing education&#8230; Acknowledging this, however, doesn’t give practitioners or administrators any more hours in the day. So how can you make HIPAA a habit, make it your team&#8217;s standard operating procedure, and still deal with everything else you have to do?</p>
<p>Third Rock’s HIPAA solution streamlines the process of identifying security vulnerabilities and simplifies the process of addressing security gaps in your practice. When dealing with compliance, we want you to feel comfortable and confident that you are acting with the best interest of your patients and your practice. This is why the THSA has recently endorsed Third Rock for our complete, easy, and affordable approach to HIPAA compliance.</p>
<p>We are helping small, medium, and large healthcare organizations by diagnosing, prioritizing and mitigating their vulnerabilities. We also provide the written Policies &amp; Procedures and training so not only are you compliant but you now have the framework for a standard operating procedure moving forward. Should you have any questions along the way, we have a support team that is able to assist.</p>
<p>There is finally a way to take charge – Ask us today about our HIPAA compliance package!</p>
<p style="text-align: center;">Protect Your Patients. Protect your Practice. Protect Yourself. ™</p>
<p style="text-align: center;">Find out more at <a href="http://thirdrock.com/">http://thirdrock.com/</a></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/08/22/an-ounce-of-prevention-why-hipaa-guidelines-should-be-your-standard-operating-procedures/">An Ounce of Prevention &#8211; Why HIPAA Guidelines should be your standard operating procedures</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4200</post-id>	</item>
		<item>
		<title>Closing the Cybersecurity Gap</title>
		<link>https://thirdrock.com/blog/2017/07/06/closing-the-cybersecurity-gap/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Thu, 06 Jul 2017 14:00:45 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[anti-virus]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber criminals]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[hipaa]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=4022</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/07/06/closing-the-cybersecurity-gap/">Closing the Cybersecurity Gap</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-4024" style="margin-right: 10px; margin-top: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/bridge_gap-500.jpg?resize=235%2C217&#038;ssl=1" alt="" width="235" height="217" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/bridge_gap-500.jpg?resize=300%2C277&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/bridge_gap-500.jpg?w=500&amp;ssl=1 500w" sizes="(max-width: 235px) 100vw, 235px" />As we hear more and more about breaches and ransomware in businesses and especially healthcare, it is becoming an even greater concern for healthcare business owners. <em>It is no longer&nbsp;<strong>if</strong> you will be attacked, but <strong>when</strong> and <strong>how often</strong>.</em></p>
<p><strong>The first step </strong>in closing the cybersecurity gap is to realize that<strong> you can&#8217;t do it on your own.</strong> Cybersecurity is not finding your basic &#8220;IT guy&#8221; that &#8220;can fix it&#8221;. <strong>It is about obtaining the right resource</strong> whether that is a full time hire or a managed service.</p>
<p><strong>The next thing</strong> to realize with cybersecurity is that <strong>it is not a one time fix</strong>, but is ongoing and continually changing to meet the new challenges coming out every day. This is not just adding a firewall, anti-virus, patches, etc. <strong>It is a plan</strong>, a mentality that evolves over time.</p>
<p><strong>HIPAA is actually a good start towards good cybersecurity, <em>but it is not everything.</em> </strong>We all like to complain about HIPAA, but it is actually a great guide to getting your business far more secure and ready to be secure. However, to truly close the cybersecurity gap, no static documents and processes will keep you continuously secure by themselves.</p>
<p><strong>Why worry?</strong></p>
<p><strong>One breach can close your business!</strong> Think about your business being down for days, weeks, or even longer. How long can you survive? What about a breach where patient data gets stolen and leaked!! Now you have to go through notifying the government <em>and</em> the public, HIPAA audits, and major fines.</p>
<p><strong>Keep in mind there are 4 tiers of HIPAA fines.</strong> If you have a proper HIPAA risk assessment and cybersecurity plan, those fines will be significantly reduced. If not, you could see fines of $50,000 PER PATIENT RECORD.</p>
<p><strong>Time to close that GAP!!</strong></p>
<p style="text-align: center;"><strong>Protect Your Patients. &nbsp;Protect Your&nbsp;Practice. Protect Yourself™.</strong></p>
<p style="text-align: left;">If you have questions concerning establishing a cybersecurity plan or about HIPAA, including how to conduct a Security Risk Assessment or how to best remediate identified risks, please contact us:&nbsp;<a href="mailto:info@thirdrock.com">info@thirdrock.com</a>; 512.310.0020. &nbsp;We&#8217;d be happy to help!</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/07/06/closing-the-cybersecurity-gap/">Closing the Cybersecurity Gap</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4022</post-id>	</item>
		<item>
		<title>Buckle Up, It&#8217;s Going to be a Wild Cyber Ride!</title>
		<link>https://thirdrock.com/blog/2017/05/25/buckle-up-its-going-to-be-a-wild-cyber-ride/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Thu, 25 May 2017 14:00:17 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3848</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/05/25/buckle-up-its-going-to-be-a-wild-cyber-ride/">Buckle Up, It&#8217;s Going to be a Wild Cyber Ride!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignright wp-image-3846 size-full" style="margin-top: 5px; margin-left: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/couple-hanging-on-to-rollercoaster.jpg?resize=153%2C200&#038;ssl=1" alt="" width="153" height="200" /><strong>Breathing a sigh of relief</strong> that the WannaCry ransomware attack didn’t hit your organization?  Thinking you’ve dodged that bullet?  Well, think again!  If trends are any indication, and they typically are, I think it’s going to get a lot bumpier.  Below are some incidents that lead me to this conclusion.  So, buckle up and hold on tight!</p>
<p><strong>January 2015</strong> – <strong>Largest Single Healthcare Breach</strong> &#8211; Anthem Insurance breach affecting over 80 million people.  Investigations point to state sponsored cyber-theft by China.  Anthem is a major insurer of U.S. Government employees.</p>
<p><strong>February 2016</strong> &#8211; <strong>Ransomware Attacks Hospital</strong> &#8211; Hollywood Presbyterian Medical Center hit by ransomware and all their computers were disabled. Patients were transferred to other hospitals and staff had to revert to paper to continue providing care to the remaining patients.   A series of hospitals were then successfully targeted.  Ransomware use has soared since.</p>
<p><strong>October 2016</strong> &#8211; <strong>Successful Attack of Internet Infrastructure</strong> &#8211; Distributed Denial of Service (DDOS) attack on Dyn, an internet infrastructure company severely disrupted the East Coast shutting down PayPal, Twitter, Netflix, and many other companies. <strong>First Major Cyber Attack using IoT Devices</strong> &#8211; Hundreds of thousands of IoT (Internet of Things) devices like webcams, thermostats, video reorders, etc. were redirected to message the Dyn facility and overload it.</p>
<p><strong>April 2017</strong> &#8211; <strong>NSA Hacking Tools Released</strong> &#8211; Shadow Brokers leak NSA&#8217;s hacking arsenal providing cyber criminals more sophisticated and effective ways to access IT systems and steal data.</p>
<p><strong>May 2017</strong> – <strong>Global Ransomware Attack</strong> &#8211; WannaCry ransomware unleashed a global assault not seen before, that spread across 200 countries in just a few short days. An estimated 300,000 systems infected worldwide and in England, 48 hospitals were crippled from the attack.  WannaCry also infected a range of medical devices that shook manufacturers like Siemens and Bayer. WannaCry leveraged vulnerabilities identified from the NSA leaks. The finger is being pointed at North Korea.</p>
<p><strong><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3851" style="margin-top: 5px; margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/cartoon-fortune-teller.jpg?resize=200%2C182&#038;ssl=1" alt="" width="200" height="182" />What does this list of cyber incidents foreshadow for the future?</strong>  Well, the hackers are more sophisticated and capable, being able to breach strong defenses and shut down infrastructure.  They can hack sophisticated systems or &#8220;simple&#8221; IoT devices to gain their goals.  Clearly, ransomware is the weapon of choice and will be for the foreseeable future.  It puts cash in their pockets faster, with less effort.  Our list of vulnerabilities seems to be multiplying and we are up against a wide range of threats; lone-wolf hackers, organized crime, and nation-state actors, all of which can cripple your business or even destroy it.  It feels like IT terrorism!</p>
<p><strong>What can you do to protect your organization?</strong>  Partner with a reputable organization who can identify your vulnerabilities and bring transparency to your IT security.  Help put processes in place to maintain and strengthen security without overburdening your organization.</p>
<p>Contact <a href="http://thirdrock.com/contact-us/">Third Rock</a> for additional information at:  <a href="mailto:info@thirdrock.com">info@thirdrock.com</a>.  We can help!</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/05/25/buckle-up-its-going-to-be-a-wild-cyber-ride/">Buckle Up, It&#8217;s Going to be a Wild Cyber Ride!</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3848</post-id>	</item>
		<item>
		<title>Best Defense Against Ransomware is a Good Backup</title>
		<link>https://thirdrock.com/blog/2017/05/16/best-defense-against-ransomware-is-a-good-backup/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Tue, 16 May 2017 07:00:00 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Disaster Recovery (BCDR)]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[backup & recovery]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3764</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/05/16/best-defense-against-ransomware-is-a-good-backup/">Best Defense Against Ransomware is a Good Backup</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3765" style="margin-right: 10px; margin-top: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/wannacry_05-300x227.png?resize=275%2C208&#038;ssl=1" alt="" width="275" height="208" /></p>
<p>By now, most have heard or been affected by the WannaCry ransomware that has spread to over 150 countries at last count.</p>
<p>The WannaCry ransomware started taking over users&#8217; files on Friday, demanding $300 to restore access.</p>
<p>Hundreds of thousands of computers have been affected so far. Computer giant Microsoft said the attack should serve as a wake-up call.</p>
<p>The first line of defense in this is always having a <strong><em>properly maintained firewall</em></strong> both on your network and on each individual computer system. However, as we all know, your network can and will be breached at some point, whether or not it is due to WannaCry or some other ransomware or virus; it will happen.</p>
<p><strong>What is the best defense against ransomware and other malware?</strong></p>
<p><em><strong>A good backup!</strong></em></p>
<p>It sounds simple, but amazingly most either are not doing backups or not verifying that the backup works. I worked with an organization that had been backing up for several years, but had never tested restoring the files. Well, they got hit with a bad virus, and it was determined that restoring the previous day&#8217;s backup would be the best way to recover. Unfortunately, the backup was corrupted and would not work. We went back to previous days and weeks, and <em>none</em> of their backups were good.</p>
<p>Having a backup is not good for anything if you can&#8217;t actually recover the data when you need it.</p>
<ol>
<li> To get started, <em><strong>investigate business level backup systems</strong></em> that will work in your environment. It truly is a case by case basis on which backup system is right for your organization; depending on size, speed, hours, etc.</li>
<li><strong><em>Schedule restore tests</em></strong> on a regular basis to make sure that you have a valid backup that you can recover from in the case of an attack.</li>
<li><strong><em>Maintain the backup system</em></strong> to ensure that it is considered &#8220;mission critical&#8221; as it is the last line of defense for your entire business.</li>
</ol>
<p><strong>Bottom line:  Stay ahead of ransomware by maintaining complete, working backups!</strong></p>
<p>For questions about how to evaluate and improve your own backup practices or for a comprehensive Security Risk Assessment, contact us at info@ThirdRock.com.</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/05/16/best-defense-against-ransomware-is-a-good-backup/">Best Defense Against Ransomware is a Good Backup</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3764</post-id>	</item>
		<item>
		<title>The greatest threat comes from within</title>
		<link>https://thirdrock.com/blog/2017/04/18/the-greatest-threat-comes-from-within/</link>
		
		<dc:creator><![CDATA[Clint Eschberger]]></dc:creator>
		<pubDate>Tue, 18 Apr 2017 14:00:58 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber-crime]]></category>
		<category><![CDATA[hipaa]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3548</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/04/18/the-greatest-threat-comes-from-within/">The greatest threat comes from within</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><a href="https://i0.wp.com/thirdrock.com/wp-content/uploads/hacker_pc.jpg?ssl=1"><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-3550" style="margin-right: 10px; margin-top: 8px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/hacker_pc.jpg?resize=250%2C166&#038;ssl=1" width="250" height="166" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/hacker_pc.jpg?resize=300%2C199&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/hacker_pc.jpg?resize=768%2C511&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/hacker_pc.jpg?resize=1024%2C681&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/hacker_pc.jpg?w=1029&amp;ssl=1 1029w" sizes="(max-width: 250px) 100vw, 250px" /></a>Sometimes it is easy to forget that the greatest threat is from within. In today’s focus on cyber-security world, we tend to focus on keeping people out of our network as a primary method to keep our sensitive data, such as ePHI, safe. While that is incredibly important, we should make sure not to overlook the threat posed by those we do grant access. How much of a threat is it? Well, roughly half of all attacks originate from inside the company &#8211; and <em>not all are with malicious intent</em>.</p>
<p>Part of the problem is we leave the door open, so to speak. While we are spending time and effort to keep people from the <em>outside</em> out, we are leaving the door open for people on the <em>inside</em> to take what they want.</p>
<p>Think about this…</p>
<p>An employee with access to ePHI decides they want to work over night or on the weekend. That is pretty admirable, in itself. However, that employee decides to send the data via Gmail or another cloud/web based tool to make it available on his/her home computer. Now you have a serious problem. As most of you probably know, the cloud has a habit of being hacked and compromised by targeted attacks.</p>
<p>Now imagine an employee who wants to intentionally steal information! They have abundant options to smuggle information out. In addition to cloud/web apps, they can use USB drives, smart phones with cameras, etc.</p>
<p>While you can’t possibly stop everything, there are simple things that can be done to ensure that your data is safe, from both external threats and internal threats. There is generally zero reason for employees to have access to Gmail, Yahoo, Facebook, Pastebin, etc. from within your organization. And outside of a very few exceptions, there should be no ability to use USB drives. The great thing is that all these channels can be blocked fairly easily and with little cost.</p>
<p>Employees will complain about losing access to popular social websites, but it will be much easier to explain these constraints to your employees than to explain a breach to the government, your patients, and the Board.</p>
<p>Ask your IT service provider if they&#8217;ve taken steps to minimize information &#8220;leakage&#8221; by internal system users. If they aren&#8217;t sure or have questions about what you mean, contact Third Rock to schedule a risk assessment.</p>
<p style="text-align: center;">info@ThirdRock.com | 512-310-0020</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/04/18/the-greatest-threat-comes-from-within/">The greatest threat comes from within</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3548</post-id>	</item>
		<item>
		<title>HIMSS17 – Are medical devices the weak link in cyber security?</title>
		<link>https://thirdrock.com/blog/2017/03/09/himss17-are-medical-devices-the-weak-link-in-cyber-security/</link>
		
		<dc:creator><![CDATA[Julie Rennecker, PhD, BSN]]></dc:creator>
		<pubDate>Thu, 09 Mar 2017 15:00:42 +0000</pubDate>
				<category><![CDATA[Compliance & Security]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[IoT devices]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">http://thirdrock.com/?p=3049</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2017/03/09/himss17-are-medical-devices-the-weak-link-in-cyber-security/">HIMSS17 – Are medical devices the weak link in cyber security?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>According to a post on <a href="http://www.hipaajournal.com/87pc-healthcare-organizations-adopt-internet-of-things-technology-2019-8712/">HIPAA Journal</a>, 60% of healthcare organizations have already introduced networked medical devices into their technical infrastructure. Networked medical devices are the healthcare version of the “internet of things” (IoT) – smart devices that communicate with applications, such as the EHR, and with one another without human intervention. The problem – many medical devices aren’t cyber-secure!  89% of the organizations reporting the use of networked medical devices <em>also reported having experienced a security breach as a result.</em></p>
<p>The FDA is focusing more attention on the cyber security of medical devices, but no single security standard yet exists. Even medical devices with security features incorporated in their design have a wide variance of capabilities, leaving gaps that can be compromised. There is a growing appreciation, however, that installed medical devices exist in a complex ecosystem of people, processes, and technologies. Therefore, the security issues related to these devices cannot be addressed by the device manufacturers alone – healthcare facilities need to identify and evaluate all the “things” connected to their networks.</p>
<p>In his presentation at HIMSS17, <a href="https://www.linkedin.com/in/brianfinchesq/">Brian Finch, JD, Partner and Co-Chair of the Cybersecurity and Global Security Practice Groups at Pillsbury Winthrop Shaw Pittman</a>, noted that “there is a gross lack of awareness of the number and diversity of ‘things’ connected to a covered entity’s network.” And he went on to say that “the OCR is really whacking those that have not done a risk assessment and those risk assessments that don’t address ‘internet of things issues’.”</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignleft wp-image-2625" style="margin-right: 10px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Internet-of-Things-green-highway-sign.jpg?resize=149%2C90&#038;ssl=1" width="149" height="90" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Internet-of-Things-green-highway-sign.jpg?resize=300%2C180&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Internet-of-Things-green-highway-sign.jpg?w=333&amp;ssl=1 333w" sizes="(max-width: 149px) 100vw, 149px" /></p>
<p>A <a href="http://www.healthcareitnews.com/news/87-percent-health-organizations-plan-adopt-iot-technology-2019-study-shows">widely-publicized study</a> by Hewlett Packard subsidiary Aruba Networks reported that in just two years, 87% of healthcare organizations will have adopted Internet of Things technology. Will your organization be one of them? Do you know where your Things are? Did you assess the security of your Things in your Risk Assessment?</p>
<p><strong>Bottom line:</strong>  Smart, networked medical devices are a rapidly growing component of healthcare information systems, but they are often the weak link in an organization’s security infrastructure. The first step in addressing the security challenges is identifying the vulnerabilities and associated risk through a comprehensive risk assessment.</p>
<p>If you&#8217;d like more information on HIPAA compliance, risk assessments, or reducing the liabilities for your practice, contact us at: <a href="mailto:compliance@thirdrock.com">compliance@thirdrock.com</a></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2017/03/09/himss17-are-medical-devices-the-weak-link-in-cyber-security/">HIMSS17 – Are medical devices the weak link in cyber security?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3049</post-id>	</item>
	</channel>
</rss>
