<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>cybersecurity Archives - Third Rock</title>
	<atom:link href="https://thirdrock.com/blog/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/blog/tag/cybersecurity/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Thu, 26 Mar 2020 19:31:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>cybersecurity Archives - Third Rock</title>
	<link>https://thirdrock.com/blog/tag/cybersecurity/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>Cyber Protection as Your Business Deals with Social Distancing</title>
		<link>https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Tue, 10 Mar 2020 12:00:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Pandemic]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8918</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/">Cyber Protection as Your Business Deals with Social Distancing</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Cyber Safety Tips for Businesses When Employees Work from Home</h2>
<p>With the threat of the Coronavirus, many companies are allowing or requiring employees to work from home. If your company deals with protected information such as healthcare, financial, consumer or personal, you should have policies and procedures in place to protect that data within your normal work environment. However, having your work force suddenly need to access this information from home may not be normal. Systems may be overloaded, sensitive information distributed in a way that you never anticipated and lines of communication disrupted. Do your policies and procedures cover such a situation, like a pandemic? Here are 6 tips to best protect your business and your clients.</p>
<h3>Train Your Employees</h3>
<p>We are not talking about the once a year standard, boring videos people half heartedly watch so they can print off a certificate proving they did it. Your employees <u>must</u> know key elements of cyber safety that they are regularly reminded of. If nothing else, make sure they know these 3 things.</p>
<ol>
<li><u>Anticipate phishing and spear phishing attacks</u>. Word will travel fast that everyone is working from home. Hackers will recognize you are vulnerable and try to take advantage of it. Tell your workforce to anticipate phishing and spear phishing attacks that will attempt to take advantage of pandemic fears. Give visual examples, have your IT on high alert searching for phishing attempts and contact employees immediately when one gets through your firewall.</li>
<li><u>Do not access sensitive information on unauthorized devices</u>. The biggest culprit: cell phones. Have policies about what devices they are allowed to use to remotely access information and make sure they know. Never store sensitive information unencrypted on a portable device.</li>
<li><u>Do not access sensitive information on unsecure networks</u>. Like working from Starbucks because they have free WiFi? That may be fine for personal use, but not when you’re accessing sensitive information. Public WiFi makes it easy for a hacker to infiltrate your computer, stealing the information you accessed.</li>
</ol>
<h3>Determine Critical Processes and Access Control</h3>
<p>This is a key component to any Pandemic plan. Who is authorized to access sensitive information, and how do you ensure they can actually access sensitive information in a highly distributed environment? Minimize your exposure by controlling access to data. Not everyone working from home needs access to sensitive information. Make sure you lock down access to only essential employees. Follow through by monitoring who is accessing data, what they are accessing and why.</p>
<h3>Multifactor Authentication</h3>
<p>For those employees who need to access sensitive information, require multifactor authentication every time they remotely access a private server. This is an easy step to implement that can have a big impact on keeping cyber criminals out.  Explain to your employees why the two-factor authentication is an important safety capability.</p>
<h3>Network Access Control</h3>
<p>While you should train your employees not to access sensitive information on unsecure networks (see tip #1), you can implement access controls that actually block a user if they do not meet a certain level of security. You should implement a Virtual Private Network (VPN) which provides higher security for your workers using their home and/or public internet that are not secure.   It’s fairly easy and inexpensive to implement. For more information on VPNs, <a href="https://www.techradar.com/vpn/best-vpn">click here</a>.</p>
<h3>Encrypt Data</h3>
<p>If information is stored locally on a device, make sure it is encrypted. Portable devices are often stolen that contain sensitive information. A simple step of encryption protects your clients’ information and protects you from hefty breach costs and fines.</p>
<h3>Provide Company Devices</h3>
<p>Laptops and cell phones should always be running the most up to date version of an operating system available (i.e. Windows 10 vs Windows 8). They should also have up to date firewall protections and antivirus software. If employees are permitted to use personal devices, it is difficult to ensure these protections stay up to date. Providing company devices that are properly configured and regularly updated help strengthen the barrier against cyber criminals.</p>
<p>Protection doesn’t have to be complicated, but it does have to be intentional. Simple steps taken by the company and the employees can go a long way. While we want to stay physically safe through this wave of the Coronavirus, let’s make sure we stay cyber safe too.</p>
<p> Concerned if you have the right precautions and planning in place? Contact Third Rock at info@thirdrock.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/">Cyber Protection as Your Business Deals with Social Distancing</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8918</post-id>	</item>
		<item>
		<title>Travel Cyber Safe</title>
		<link>https://thirdrock.com/blog/2019/11/26/travel-cyber-safe/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Tue, 26 Nov 2019 15:21:23 +0000</pubDate>
				<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[juice jacking]]></category>
		<category><![CDATA[travel]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8689</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/11/26/travel-cyber-safe/">Travel Cyber Safe</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><!-- divi:paragraph --></p>
<p>The holidays get busy. Traveling is stressful and we aren’t always as vigilant as we should be. In today’s world of data breaches, identity theft and cybercrime, there are many things we know to be cautious about. You wouldn’t give away your credit card number or let a stranger have access to your driver’s license. But are cyber safe with your phone? We have become so dependent on our phones to store sensitive and private data. Sometimes forget that we need to protect it too.</p>
<h2><!-- /divi:paragraph --> <!-- divi:paragraph -->Let’s take a look at a scenario that could happen to any of us:</h2>
<p><!-- /divi:paragraph --></p>
<p><span style="font-size: 14px;"><em>T</em></span><em style="font-size: 14px;">he morning was a rush and you made it to the airport on time, thankfully. After getting through security, there is a little time to breath. You grab some coffee, check your phone and realize you forgot to charge it. Ugh. Your phone needs to be charged to last the whole flight and still have juice when you land. You notice a charging station near your gate. There are even cords already plugged in, so you don’t have to dig yours out of your mess of a bag. Score!</em></p>
<p><!-- /divi:paragraph --><!-- divi:paragraph --></p>
<p>You may not be as lucky as you feel. Cyber criminals are taking advantage of how dependent we are on our devices and their need to be charged. This new scam, known as “juice jacking” takes advantage of your connection to your phone.</p>
<p><strong style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">How does it work?</strong></p>
<p><span style="font-size: 14px;">Phone cords are designed for 2-way communication. Data can come in, but data also goes out. This can be seen every time you attach an iPhone to your computer and iTunes wants to download your data. Convenient when you want it, but bad when the criminals want it. Criminals download malware into the charging station or physically alter the charging station installing a cable connected to a virus laden device, and wait until you connect. They then have access to everything on your phone. What do you keep saved?</span></p>
<ul>
<li>Passwords?</li>
<li>Credit card information?</li>
<li>Communications?</li>
<li>Photos?</li>
</ul>
<p><span style="font-size: 14px;">Depending on the malware, they could download your data or install malware on your phone that will continue to monitor your usage. They might even lock you out of your phone completely. The biggest concern; you may never know. A week later you’re seeing fraudulent charges on an account and trying to figure out what happened. This is very similar to the card skimmers installed at gas stations.</span></p>
<p><strong style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">What can you do?</strong></p>
<p><span style="font-size: 14px;">Thankfully there are easy ways to avoid this scam.</span></p>
<ul>
<li>Use your own AC adapter and cord</li>
<li>Plug into a wall outlet, not a charging station</li>
<li>Use a “charge only” cord at a charging station</li>
<li>Use personal car chargers</li>
<li>Use a portable charger</li>
</ul>
<p> <strong style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">Be cyber safe this holiday season</strong></p>
<p><!-- divi:paragraph --></p>
<p>Physical security is important and easy to remember. We see our wallet; we protect our wallet. This holiday season, let’s also remember our cyber safety.<span style="font-size: 14px;"> </span></p>
<hr class="wp-block-separator" />
<p>&nbsp;</p>
<p><!-- /divi:separator --></p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/11/26/travel-cyber-safe/">Travel Cyber Safe</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8689</post-id>	</item>
		<item>
		<title>Prevention is Cheaper than Correction</title>
		<link>https://thirdrock.com/blog/2019/11/22/prevention-is-cheaper-than-correction/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Fri, 22 Nov 2019 15:00:59 +0000</pubDate>
				<category><![CDATA[In the News]]></category>
		<category><![CDATA[Risk Management]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[HIPAA Security]]></category>
		<category><![CDATA[risk management]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8681</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/11/22/prevention-is-cheaper-than-correction/">Prevention is Cheaper than Correction</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>The healthcare industry led the nation in regulations for information security. In an effort to protect private health information (PHI), healthcare organizations are required to protect patient data against <em>any reasonably anticipate threats or hazards</em>.  You are required to perform risk assessments, but knowing your risk is not enough. Steps must be taken to fix issues and prevent data loss. Most other industries and states are joining the bandwagon with regulations of their own. The basics are the same: do your due diligence to protect data or face the consequences.</p>
<p>&nbsp;</p>
<h2><em>The Breach</em></h2>
<p>The University of Rochester Medical Center (URMC) recently agreed to a $3,000,000 settlement with the Office of Civil Rights (OCR). URMC reported data loss in 2013 when an unencrypted flash drive was lost. They again reported a breach when a personal laptop with unencrypted ePHI was stolen from a treatment facility. The fine may seem steep when you think that only 43 patients’ data was on the stolen laptop. The bigger issue, however, was the lack of progress in breach prevention from the first to the second incident.</p>
<p><em style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">The Cost</em></p>
<p><span style="font-size: 14px;">Beyond the fine to the OCR, breaches can cost a company much more. According to the IBM Security Cost of a Data Breach Report 2019, healthcare is the industry with the highest average cost at $6.45 million, not including fines. Lost business was the largest contributing factor to this total, accounting for 36% of the total cost. Other factors include detection and reporting, notification of affected parties and post breach clean up.</span></p>
<p> <em style="color: #333333; font-family: 'Roboto Slab', Georgia, 'Times New Roman', serif; font-size: 18px;">Corrective Action</em></p>
<p><span style="font-size: 14px;">The list of requirements mandated by the OCR look very similar to the actions that are expected to prevent the breach in the first place.</span></p>
<ul>
<li>Conduct a Risk Analysis</li>
<li>Implement a Risk Management Plan</li>
<li>Implement customized Policies and Procedures</li>
<li>Train your staff</li>
<li>Create and maintain a body of compliance evidence</li>
</ul>
<h2><em>Prevention is always cheaper</em></h2>
<p><span style="font-size: 14px;">URMC is facing a guaranteed loss of $3,000,000 plus other expenses in breach clean up, notification and potential loss of business. The cost of our cyber risk management from assessment, reporting and remediation starts at $699/year for a small organization. Our automated tool, CyberCompass™, puts you in charge of your cyber risk, cybersecurity and compliance. Addressing all the requirements listed above, we also save you 70% of the typical cost, time and effort. An easy to use dashboard prioritizes your corrective actions, allowing you to work through them at your own pace. With built in regulations for most industries, start your move toward Cyber Confidence® today.</span></p>
<p> <span style="font-size: 14px;">Contact Us for more details or visit thirdrock.cybercompass.co</span></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/11/22/prevention-is-cheaper-than-correction/">Prevention is Cheaper than Correction</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8681</post-id>	</item>
		<item>
		<title>IT Responsibly: Defend your Territory</title>
		<link>https://thirdrock.com/blog/2019/10/18/it-responsibly-defend-your-territory/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Fri, 18 Oct 2019 14:00:28 +0000</pubDate>
				<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[CyberAware]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8628</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/10/18/it-responsibly-defend-your-territory/">IT Responsibly: Defend your Territory</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In the days of old, people built giant walls to defend their land. It was easy to see the invading army approach. Pull up the drawbridge, light the arrows and defend your city. Today, the walls are digital and the invaders are invisible and often robots; sneaking in the back door or under the radar, pretending to be someone we trust or attacking out of nowhere. So how do we defend our territory in a modern technology age?</p>
<p>&nbsp;</p>
<h2><strong><em>Ditch the passwords</em></strong></h2>
<p>Passwords are the first line of defense in protecting your private information. The problem with passwords though is that if you make them strong, they can be hard to remember. And if you follow the sound advice to not use the same password on any site, you may think you have to remember 30 plus long, hard to remember passwords! To this I give you 2 suggestions:</p>
<ol>
<li>Get a password manager – Don’t trust Google to save your passwords. (see previous blog) A password manager is a vault to place all those hard to remember passwords in a secure location. Read Consumer Advocate’s top ten choices in their article <a href="https://www.consumersadvocate.org/password-manager/a/best-password-manager?pd=true&amp;keyword=password%20manager%20reviews&amp;bca_campaignid=333237838&amp;bca_adgroupid=1217159630398009&amp;bca_matchtype=e&amp;bca_network=o&amp;bca_device=c&amp;msclkid=d7d70723a82d13ab59d85abdb5de1bb0&amp;utm_source=bing&amp;utm_medium=cpc&amp;utm_campaign=zh%20Password%20Manager&amp;utm_term=password%20manager%20reviews&amp;utm_content=Password%20Manager%20Reviews" target="_blank" rel="noopener noreferrer">here</a></li>
<li>Use passphrases – Instead of hard to remember letter, number and character combinations, use a full phrase as your password. Pick something you can remember and add modifications to in order to have a unique phrase for different sites. For example, “BobandSusan’sbankaccount!”</li>
</ol>
<p>&nbsp;</p>
<h2><strong><em>Multi-factor Authentication</em></strong></h2>
<p>Requiring 2 forms of verification is becoming a popular and simple way to secure data. Here’s an example one of my money accounts uses. I’m asked for the email, username, or phone number associated with my account. Once entered, I am then asked for a code that will be emailed or texted. This is very easy for me as a user. I don’t have another password to remember, the messages come through quickly and I can access my account. While it’s easy for me, it’s harder for a hacker. Someone would have to be able to access my phone or email to be able to access the original account.</p>
<p>&nbsp;</p>
<h2><strong><em>Recognize Imposters</em></strong></h2>
<p>A popular way for hackers to gain access to your data is called spoofing. They send an email from what appears to be a legitimate company claiming something to try and get you to give over your information. Your account has been compromised: type in your password. You’ve won a gift card: type in your password. You have been locked out: type in your password. We’ve seen suspicious activity: type in your password. You get the idea. Hackers use the logo of a trusted company to put you at ease, but when you click on the link it sends you to a spam site that is gathering your data, not resolving an issue. Here are things to look for:</p>
<ul>
<li>Is this normal behavior for the company in question? If not, don’t trust the link.</li>
<li>Check the email address against valid emails you have received from the company</li>
<li>Look at the link. If you click to a sign in page, check the website address. If you aren’t on the company’s main sign in page, do not put in any information.</li>
<li>When in doubt, go to your account. If you want to check activity, type in the website address you know and sign in that way. Most companies will post the notifications inside your account so you can verify.</li>
</ul></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/10/18/it-responsibly-defend-your-territory/">IT Responsibly: Defend your Territory</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8628</post-id>	</item>
		<item>
		<title>IT Responsibly: Check your settings</title>
		<link>https://thirdrock.com/blog/2019/10/11/it-responsibly-check-your-settings/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Fri, 11 Oct 2019 13:41:58 +0000</pubDate>
				<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[CyberAware]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[NCSAM]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8530</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/10/11/it-responsibly-check-your-settings/">IT Responsibly: Check your settings</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Have you recently purchased a new device? Smart phone, laptop, tablet or even a smart watch? Maybe you just downloaded the latest update to your computer or smart phone. Do you know what it did? Too many times we take for granted the base features technology and updates provide without checking that the privacy settings. Always check the settings represent what is best for you, not what is best for the company.</p>
<h2><strong>Location, Location, Location</strong></h2>
<p>Location services are very helpful. Let’s face it, who pulls out a paper map anymore when your navigation can tell you exactly how to get somewhere? However, your location does not need to be tracked at all times, so you should check the settings on all of your devices. Most apps have the option to only track while in use. When in doubt, it’s better to turn off location tracking until you find you need it. Phones are not the only devices that track location. Be sure to check settings on your laptop, tablets and smart watches.</p>
<p style="padding-left: 30px;"><em>“Checking in” on social media? Publicly announcing your location on a social media platform could potentially be dangerous. You are letting would be thieves and criminals know you are away from home, or informing an unwanted person how to find you.</em></p>
<p>&nbsp;</p>
<h2><strong>Just Click “No”</strong></h2>
<p>Having your passwords saved is extremely convenient, especially if you follow the rule to have different passwords for every site. Google/Chrome wants to automatically save all of these passwords for you which seems very nice of them. The issue is this is not actually secure, especially if you use public WiFi. A hacker could easily write a script to steal the saved data on your computer.</p>
<p style="padding-left: 30px;"><em>Do you do a lot of online shopping? When your browser asks to save your credit card information, be sure to choose “never”. If a hacker can get your passwords, they can also steal your credit card information.</em></p>
<p>&nbsp;</p>
<h2><strong>Public WiFi</strong></h2>
<p>Do you deal with sensitive data for work, bank online or simply enjoy online shopping? Accessing private accounts with private data on public WiFi puts you at extreme risk. It only takes one person with the know-how and malicious intent on the same WiFi to remotely access the information on your computer. Save sensitive work for private networks.</p>
<p style="padding-left: 30px;"><em>If you are a business owner, be sure to have separate WiFi networks for guests, non-sensitive  data and sensitive data. Limit access to the network for sensitive data to those who need access.</em></p>
<p style="padding-left: 30px;"><span style="color: #0000ff;"><em>PRO TIP: Consider using one computer to “surf” the web and one computer to ONLY access sensitive data web sites such as banking, financial services, stock trading, healthcare and insurance.</em></span></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/10/11/it-responsibly-check-your-settings/">IT Responsibly: Check your settings</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8530</post-id>	</item>
		<item>
		<title>Security starts with knowing your weaknesses</title>
		<link>https://thirdrock.com/blog/2019/03/26/security-starts-with-knowing-your-weaknesses/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Tue, 26 Mar 2019 14:00:58 +0000</pubDate>
				<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[phishing scam]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5914</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2019/03/26/security-starts-with-knowing-your-weaknesses/">Security starts with knowing your weaknesses</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>One of the biggest challenges in data and information security is knowing your threat level. IBM security recently released their 2018 X-Force Threat Intelligence Index. They monitor daily security events in 130 countries throughout the year for a comprehensive understanding of trends in cyber threats.</p>
<p>One of the most prominent ways organizations were found to be inadvertently open to attacks was due to improper configuration of cloud services. Misconfigured cloud servers accounted for 43% of more than 2.7 billion compromised records. This is an increase of 20% over recorded incidents in 2017.  According to the survey, “misconfiguration is now the single-biggest risk to cloud security, with 62% of surveyed IT and security professionals noting it as a problem”. While most of these breaches appear to be the result of inadvertent actions, it is possible for an insider to maliciously expose data and hide it as an accident.</p>
<p>No matter the style of attack, financial gain is almost always the motivation. Over the past few years, ransomware became a popular choice for cyber criminals. In 2018, however, we actually see a decrease in the use of ransomware by 45%. Why? Because cryptojacking is proving far more lucrative for criminals, thus increased in use by 450%! Without the need of any hardware of their own, a cyber criminal can install a cryptocurrency miner virtually undetected. Once installed, not only is the criminal gaining valuable coin at the owner’s expense, but they are also opening the door for other kinds of breaches.</p>
<p><img data-recalc-dims="1" fetchpriority="high" decoding="async" class="aligncenter size-medium wp-image-5909" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/chart-e1553564411692-300x115.png?resize=410%2C157&#038;ssl=1" alt="" width="410" height="157" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/chart-e1553564411692.png?resize=300%2C115&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/chart-e1553564411692.png?resize=768%2C294&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/chart-e1553564411692.png?w=777&amp;ssl=1 777w" sizes="(max-width: 410px) 100vw, 410px" /></p>
<p>The number of recorded vulnerabilities has exponentially increased in the last 3 years. This is due to the “ever-expanding attack surface as new players such as IoT devices, and other smart technologies enter the fray.” The attack surface references the span by which an organization has entry points for a cyber criminal to infiltrate. Finance and Insurance registered as the highest targeted industry, due to their access to Personal Identifiable Information (PII) links directly to bank account and credit card data that can be monetized quickly. Professional services, such as legal, CPAs and consulting, is the third most targeted industry with the second highest likelihood of a breach. Valuable customer data combined with limited security budgets and staff makes it “as vulnerable as it is lucrative”.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5910" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/chart2-e1553564465916-300x205.png?resize=404%2C276&#038;ssl=1" alt="" width="404" height="276" scale="0" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/chart2-e1553564465916.png?resize=300%2C205&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/chart2-e1553564465916.png?resize=768%2C524&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/chart2-e1553564465916.png?w=844&amp;ssl=1 844w" sizes="(max-width: 404px) 100vw, 404px" /></p>
<p>With all of this seemingly troubling news, you may be asking: what can we do to protect ourselves? As IBM states, we must “make security an integral part of culture and overall structure”. This is done by changing your threat landscape to reduce your risk of exposure. And that starts with knowing your risks. Our Cyber Quick Check is the first step to understanding your risk, and takes less than 5 minutes. Based on your Cyber score, discover the recommended next steps. With dedicated action and your part and the use of our automated cyber risk management system, CyberCompass™, we can increase your protection to 80% in only 90 days. The threats are real, but protection is available. Don’t wait in the dark any longer. Protect yourself and your business from threats today.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2019/03/26/security-starts-with-knowing-your-weaknesses/">Security starts with knowing your weaknesses</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5914</post-id>	</item>
		<item>
		<title>The Current State of Privacy and Cybersecurity in Texas Healthcare Organizations</title>
		<link>https://thirdrock.com/blog/2018/10/11/the-current-state-of-privacy-and-cybersecurity-in-texas-healthcare-organizations/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Thu, 11 Oct 2018 15:00:21 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[HIPAA Privacy]]></category>
		<category><![CDATA[Patient Information Privacy]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5855</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/10/11/the-current-state-of-privacy-and-cybersecurity-in-texas-healthcare-organizations/">The Current State of Privacy and Cybersecurity in Texas Healthcare Organizations</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-full wp-image-5856" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/IHIT_Avatar18-200.jpg?resize=200%2C200&#038;ssl=1" alt="" width="200" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/IHIT_Avatar18-200.jpg?w=200&amp;ssl=1 200w, https://i0.wp.com/thirdrock.com/wp-content/uploads/IHIT_Avatar18-200.jpg?resize=150%2C150&amp;ssl=1 150w" sizes="(max-width: 200px) 100vw, 200px" /></p>
<p>&nbsp;</p>
<p>Health IT has come a long way since the HITECH Act was introduced almost 10 years ago. Technology availability and accessibility has also increased dramatically in that time frame. While better connectivity has revolutionized healthcare, it has also opened the door to cyber risks.</p>
<p>Testimony before the Texas Health Services Authority Board at the Texas State Capitol on Friday, October 4 reinforced recent headlines that cybersecurity is a persistent problem; one that will require greater resources at all levels of healthcare and healthcare governance. Representatives from the Texas Attorney General’s Office, the Texas Medical Board, Texas Medical Liability Trust, University of Texas, and Cynergistek<a href="#_ftn1" name="_ftnref1">[1]</a>, along with Third Rock CEO, Robert Felps, took turns presenting data and observations on the “current state of cybersecurity and privacy in Texas healthcare” from their professional perspectives. Though some gains have been made in recent years, key points across the presentations made clear that Texas healthcare organizations – and the supporting governing bodies – still have work to do to safeguard patient data.  Here are the key takeaways:</p>
<p>&nbsp;</p>
<ol>
<li><strong>Available data indicate that Texas healthcare organizations remain extremely vulnerable to cyber threats. </strong></li>
</ol>
<ul>
<li>In 2017, TMLT received reports of 600 data privacy and security incidents, or breaches. There have only been 103 incidents so far in 2018 (Jan-Sept), but that’s still an average of 11.4 incidents/month.</li>
<li>Mac MacMillan, CEO of Cynergistek, reported that his firm is notified of at least one security incident a day by one of their 1500 hospital clients, which includes 70 academic medical centers.</li>
</ul>
<p>&nbsp;</p>
<ol start="2">
<li><strong>Both formal and informal reports indicate that healthcare organizations have an incomplete approach to cybersecurity and HIPAA compliance.</strong></li>
</ol>
<ul>
<li>In 2016, the OCR Random Audit Program evaluated 63 Covered Entities. Of the audited organizations, 13 had not attempted to perform a Security Risk Assessment (SRA). Of the 50 organizations that had completed an SRA, <u>none</u> satisfied the OCR’s requirements.</li>
<li>MacMillan also reported that fewer than half of Cynergistek&#8217;s client organizations meet the NIST requirements for cybersecurity; a situation he attributed to a lack of both human and financial resources.</li>
</ul>
<p>&nbsp;</p>
<ol start="3">
<li><strong>Too many healthcare organizations are financially unprepared for a cyber event. </strong></li>
</ol>
<ul>
<li>70% of healthcare organizations report having <em><u>no cyber insurance</u><strong>.</strong></em></li>
<li>The combination of legal fees, penalties, increased administrative costs, and loss of business resulting from an information security incident can potentially put a healthcare organization out of business.</li>
</ul>
<p><strong> </strong></p>
<ol start="4">
<li><strong>There is a significant shortage of adequately-trained cybersecurity personnel. </strong></li>
</ol>
<ul>
<li>According to MacMillan, there are currently about 780,000 cybersecurity employees and approximately 350,000+ cybersecurity job vacancies. By 2021, labor experts are predicting 3.5 <em>million</em> cybersecurity job vacancies.</li>
<li>When he visits a client hospital and asks &#8220;Who&#8217;s taking care of ‘x’ cybersecurity technology?&#8221; he is often referred to an IT employee with no cybersecurity experience.</li>
</ul>
<p>&nbsp;</p>
<ol start="5">
<li><strong>Enforcement responsibility for healthcare data privacy and security is distributed across multiple state agencies, resulting in incomplete data and inconsistent enforcement.</strong></li>
</ol>
<ul>
<li>At the state level, responsibility for enforcing HIPAA and HB300 falls to the Texas Medical Board, Texas Board of Nursing, Dept of Health Services (DHS), Office of the Attorney General and others.</li>
<li>Agencies report aggregate numbers to the Office of the Attorney General of complaints received and of incidents resulting in disciplinary action. However, specific cases are only referred to the Attorney General’s Office when the Agency believes an incident warrants civil or criminal penalties that only the AG’s office can impose.</li>
</ul>
<p>&nbsp;</p>
<ol start="6">
<li><strong>Information security incidents negatively impact patients – both directly and indirectly.</strong></li>
</ol>
<ul>
<li>Healthcare records are worth substantially more on the black market than credit card or even social security numbers, making healthcare records a prime target for cyber criminals.</li>
<li>A security incident resulting in identity theft can take years, and thousands of dollars, for an affected patient to correct.</li>
<li>A ransomware attack can bring care delivery to a standstill, freezing infusion pumps and other medical devices, putting patients at risk.</li>
</ul>
<p>&nbsp;</p>
<h4 style="text-align: center;">Are you cyber confident?  Can you afford no action?  Third Rock makes it simple and affordable.</h4>
<p style="text-align: center;"><strong>Protect your patients, protect your practice, protect yourself</strong></p>
<p><a href="#_ftnref1" name="_ftn1">[1]</a> A cyber security consulting firm, <a href="https://cynergistek.com/">https://cynergistek.com/</a></p>
<p><a href="#_ftnref2" name="_ftn2">[2]</a> Texas Medical Liability Trust, the largest medical provider in the state, <a href="https://tmlt.org/tmlt">https://tmlt.org/tmlt</a></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2018/10/11/the-current-state-of-privacy-and-cybersecurity-in-texas-healthcare-organizations/">The Current State of Privacy and Cybersecurity in Texas Healthcare Organizations</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5855</post-id>	</item>
		<item>
		<title>Meet Hayden</title>
		<link>https://thirdrock.com/blog/2018/08/24/meet-hayden/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Fri, 24 Aug 2018 16:00:11 +0000</pubDate>
				<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[HIPAA Privacy]]></category>
		<category><![CDATA[patient health information]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5815</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/08/24/meet-hayden/">Meet Hayden</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>&nbsp;</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5816" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?resize=300%2C200&#038;ssl=1" alt="" width="300" height="200" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?resize=300%2C200&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?resize=1024%2C683&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?w=2160&amp;ssl=1 2160w, https://i0.wp.com/thirdrock.com/wp-content/uploads/3M4A7835-copy.jpg?w=3240&amp;ssl=1 3240w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p><span style="margin: 0px; line-height: 107%; font-family: 'Calibri',sans-serif; font-size: 11pt;"><span style="color: #000000;">Meet Hayden. He was born at 7:23 am on May 3. He started breathing too soon and swallowed liquid which caused him to struggle to breath.  Within an hour of being born, he was taken to the NICU. For 2 days he received amazing care from the doctors and nurses. He was discharged, happy and healthy, ready to take on the world. His future is bright and open to all possibilities.  Or is it? While the hospital protected his body, are they protecting his personal information? Can someone steal his identity, potentially jeopardizing his future? Children are a common target of identity theft because there is a false belief they are too young to have any “valuable” credentials.  What are you doing to make sure the Hayden&#8217;s in your hospital are protected? Be cyber confident so your patients (and their parents) can be confident in you.</span></span></p>
<p style="text-align: center;"><strong>Protect your Patients. Protect your Organization. Protect Yourself.</strong>™</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/08/24/meet-hayden/">Meet Hayden</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5815</post-id>	</item>
		<item>
		<title>Are you Safe?</title>
		<link>https://thirdrock.com/blog/2018/08/17/are-you-safe/</link>
		
		<dc:creator><![CDATA[Ed Jones, PMP, CHSP]]></dc:creator>
		<pubDate>Fri, 17 Aug 2018 15:07:28 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Protect Yourself]]></category>
		<category><![CDATA[cyber safety]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[personal safety]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5811</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/08/17/are-you-safe/">Are you Safe?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><img data-recalc-dims="1" loading="lazy" decoding="async" class="aligncenter size-medium wp-image-5813" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?resize=300%2C172&#038;ssl=1" alt="" width="300" height="172" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?resize=300%2C172&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/safety2.png?w=609&amp;ssl=1 609w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>Safety. Such an important word with so many different connotations. We ask safety questions constantly. Is my family safe? Will my house be safe? Is this a safe neighborhood? Are our schools safe? Many technologies are designed to specifically pacify our desire to feel safe.  We can track our child&#8217;s cellphone. We buy alarms for our homes and doorbells with cameras. Schools install cameras and specially locking doors to protect the children.  But one area most people neglect, is cyber safety. Why?  Because it is such an abstract issue.  I check the locks on my doors each night before I go to bed.  I can <em>see and confirm</em> they are locked. None of my physical senses will tell me if my PC is being hacked, until it’s too late and the ransomware notice covers the screen.  As an executive, are you doing what it takes to keep your clients safe? Is their information secure within your care? Do you even know where to start looking? Take this short quiz to see if you are on the right path. We can help you answer &#8220;Yes&#8221; to all of your security questions.</p>
<p style="text-align: center;"><strong>Protect your Patients. Protect your Organization. Protect Yourself.</strong>™</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/08/17/are-you-safe/">Are you Safe?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5811</post-id>	</item>
		<item>
		<title>BYOD – Do You Know What’s on Your Network?</title>
		<link>https://thirdrock.com/blog/2018/05/20/byod-do-you-know-whats-on-your-network/</link>
		
		<dc:creator><![CDATA[Mike Moran]]></dc:creator>
		<pubDate>Sun, 20 May 2018 19:18:45 +0000</pubDate>
				<category><![CDATA[Focus on Security]]></category>
		<category><![CDATA[Bring Your Own Device]]></category>
		<category><![CDATA[BYOD]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[network discovery scan]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=5623</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2018/05/20/byod-do-you-know-whats-on-your-network/">BYOD – Do You Know What’s on Your Network?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><img data-recalc-dims="1" loading="lazy" decoding="async" class="wp-image-5632 size-medium alignleft" style="margin-top: 10px; margin-right: 10px; margin-bottom: 5px;" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/ISS_10348_01642.jpg?resize=300%2C200&#038;ssl=1" alt="BYOD | Bring Your Own Device | Cyber Risk Management" width="300" height="200" /></p>
<p>Is your company allowing employees to <em><strong>bring their own devices</strong></em> and use them to log onto the corporate network? If so, do you know what is happening on your network as well as how many devices are on your network?</p>
<p>Recently, I ran a network discovery at a company and found some interesting things. First, I ran the discovery during the &#8220;off hours,&#8221; meaning there should have been no one in the facility and only the automation and security systems operating.  Instead, the scan showed 70 computers, instruments, and printers running on the network.</p>
<p>Next, I ran the same scan during business hours ― full production and full staff &#8211; resulting in 120 devices being found on the network.  What were the additional devices?  Some of the devices were corporate workstations which get turned off overnight, and the remainder of the ‘new’ devices were <strong><em>personal cell phones.</em></strong></p>
<p>Now, depending on how your networks are configured, that might not be a problem. In a properly segmented network, company-owned devices would have their own segment, and employees&#8217; personal cell phones, laptops, and tablets would be on one or more additional segments. In this case, however, the staff members&#8217; devices were also on the production network, introducing significant risk for the organization. Phones are susceptible to all the same types of malware and viruses as computers. Yet, phones and tablets are much less likely to be running anti-anything (e.g., anti-virus, -malware, or -spyware).</p>
<p>Additionally, a lot of cell phones support tethering, which would allow the user to exfiltrate data via the cell phone to another computer, server, or cloud repository without the company being able to detect it.  This would be done by connecting the device to the internal network and then tethering the device to the external network.  Once connected, data can flow both directions, e.g.: Good data (company confidential data) going out and Bad data (viruses, malware, spyware) coming in.  Or worse yet, someone else could establish a presence, which would allow them to attack other companies while disguised as your company or establish a server from which they transmit spam and porn from your network.</p>
<p>The lesson to learn is that things are never as easy or as secure as you think they are. Be diligent about policies, processes, and knowing <em><strong>what</strong></em> should be flowing <em><strong>where</strong></em> on your network.</p>
<p>If you have concerns about your cyber security and would like to improve your cyber confidence and compliance, please contact us at:  <a href="mailto:info@thirdrock.com">info@thirdrock.com</a></p>
<h3 style="text-align: center;"><strong>Building a Cyber Confident</strong>℠<strong> World</strong></h3></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2018/05/20/byod-do-you-know-whats-on-your-network/">BYOD – Do You Know What’s on Your Network?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5623</post-id>	</item>
	</channel>
</rss>
