<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Third Rock</title>
	<atom:link href="https://thirdrock.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://thirdrock.com/</link>
	<description>Building a Cyber Confident World</description>
	<lastBuildDate>Wed, 22 Jul 2020 18:58:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.8</generator>

<image>
	<url>https://i0.wp.com/thirdrock.com/wp-content/uploads/cropped-favicon-check.png?fit=32%2C32&#038;ssl=1</url>
	<title>Third Rock</title>
	<link>https://thirdrock.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">65153150</site>	<item>
		<title>CCPA enforcement has begun</title>
		<link>https://thirdrock.com/blog/2020/07/20/ccpa-enforcement-has-begun/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Mon, 20 Jul 2020 13:19:47 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[CCPA]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[enforcement]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9321</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/07/20/ccpa-enforcement-has-begun/">CCPA enforcement has begun</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>The California Attorney General’s office recently confirmed that July 1 remained the start of enforcement for the new California Consumer Privacy Act (CCPA). The office has already sent it’s first round of compliance letters to businesses, giving them 30 days to cure any violations before facing an investigation or lawsuit.</p>
<p>With the disruptions that occurred due to the COVID-19 pandemic in the United States, many may have thought CCPA would be pushed back to allow businesses to deal with other issues. However, with the exponential increase in cyber threats, better data protection is exactly what we need.</p>
<p>The focus of CCPA is giving consumers more control of their data. Consumers must be clearly notified when their data will be collected, have the option to opt out, request information about how their data is used and sold, and require their data to be deleted.</p>
<p>There is also a provision for consumers to bring allegations against a company if they feel their data was not properly managed. Though some small lawsuits have been filed, one of the largest to date was recently brought against Walmart by a San Francisco resident, claiming they “Failed to implement and maintain reasonable security procedures and practices”.</p>
<p>Will this set the tone for businesses to be sued by customers looking for a payout? Hard to say but no doubt there will be many more complaints and lawsuits. Is your business both complaint and protected? Our CCPA compliance <a href="https://thirdrock.com/ccpa/">packages</a> offer a range of services to meet your needs rapidly and protect your business. <a href="https://thirdrock.com/contact-us">Contact us</a> today.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/07/20/ccpa-enforcement-has-begun/">CCPA enforcement has begun</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9321</post-id>	</item>
		<item>
		<title>Taylor Hersom added to CompTIA Cybersecurity Advisory Board</title>
		<link>https://thirdrock.com/blog/2020/07/14/taylor-hersom-added-to-comptia-cybersecurity-advisory-board/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Tue, 14 Jul 2020 18:10:36 +0000</pubDate>
				<category><![CDATA[Press Release]]></category>
		<category><![CDATA[Advisory Board]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[Taylor Hersom]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9293</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/07/14/taylor-hersom-added-to-comptia-cybersecurity-advisory-board/">Taylor Hersom added to CompTIA Cybersecurity Advisory Board</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Taylor Hersom, Vice President of Business Development for <a href="http://www.cybercompass.co/">CyberCompass®</a> and head of virtual services for Third Rock, has been asked to serve on the very prestigious  <a href="https://www.comptia.org/about-us/advisory-boards/comptia-cybersecurity-advisory-board">CompTIA Cybersecurity Advisory Board (CCAB)</a>. <a href="https://www.comptia.org/">CompTIA</a> is the world&#8217;s leading tech association as well as a thought and action leader. CCAB addresses many of the most pressing cybersecurity concerns facing business and government. The board works to identify opportunities for CompTIA to develop cybersecurity initiatives that advance our nation’s cybersecurity readiness. In addition, the CCAB assesses current CompTIA activities relating to cybersecurity and recommends how to integrate those efforts with other thought leaders on the topic, while also identifying gaps in the cybersecurity ecosystem that CompTIA might consider filling. </p>
<p>Hersom will be working with thought leaders from higher education, legal and cybersecurity fields. The CCAB’s main purpose is to provide a venue where these members can discuss the most critical issues the industry faces, leading to prioritized projects and actionable results. Recently, CompTIA has been actively involved in working with  Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) to maintain critical functions throughout the COVID-19 pandemic (see full article <a href="https://www.comptia.org/newsroom/press-releases/2020/05/11/watch-it-industry-briefing-on-cisa-covid-19-response-efforts">here</a>) as well to providing thought leadership with emerging transformational technologies such as 5G. See all of their latest news and <a href="https://www.comptia.org/newsroom/press-releases">press releases</a>.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2020/07/14/taylor-hersom-added-to-comptia-cybersecurity-advisory-board/">Taylor Hersom added to CompTIA Cybersecurity Advisory Board</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9293</post-id>	</item>
		<item>
		<title>Is it time for an upgrade?</title>
		<link>https://thirdrock.com/blog/2020/06/16/is-it-time-for-an-upgrade/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Tue, 16 Jun 2020 15:30:00 +0000</pubDate>
				<category><![CDATA[Third Rock]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9180</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/06/16/is-it-time-for-an-upgrade/">Is it time for an upgrade?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>When it comes to the cybersecurity of our devices, many of us turn a blind eye because the complexity can seem overwhelming. Questions like:</p>
<ul>
<li>What operating system are you running?</li>
<li>Do you have anti-virus AND anti-malware security?</li>
<li>What’s the difference between anti-virus and anti-malware?</li>
<li>When was your last update?</li>
</ul>
<p>The list can be longer, but a few “I don’t knows” will make anyone stop wanting to try. Keeping your operating system, antivirus and antimalware up to date is your best front line defense for cybersecurity. Vast improvements have been made to make it easier and less complicated for your PC or Mac to stay well protected. Here is a simple step by step guide to check your computer status.</p>
<h3><u><img data-recalc-dims="1" fetchpriority="high" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Windows-OS-information-e1592320587659-300x270.png?resize=300%2C270&#038;ssl=1" width="300" height="270" alt="" class="wp-image-9183 aligncenter size-medium" style="float: right;" />Windows Users</u></h3>
<p>The operating system of most PCs is Windows. That’s the easy part. The important question is, what version of Windows is on your computer? To find out, follow these simple steps:</p>
<ul>
<li>Hold the <strong>Windows logo </strong>key + <strong>R</strong>. A search box appears in the bottom corner of your screen.</li>
<li>Type <strong>winver</strong>in the <strong>Open</strong> box, and then select <strong>OK</strong>.</li>
<li>A new box will pop up showing you the version of windows your computer is running.</li>
</ul>
<p>I’ll give you a minute to check it out.</p>
<p>If your box shows anything other than Windows 10, you need a major upgrade.</p>
<h3><u>Mac Users</u></h3>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Mac-OS-information.png?resize=299%2C178&#038;ssl=1" width="299" height="178" alt="" class="wp-image-9185 aligncenter size-full" style="float: right;" />Macs are believed to be inherently safer than Windows because of the operating system. However, cybercriminals are not shying away from finding loopholes to attack your Mac. You still need diligence and the most up-to-date OS for best protection.</p>
<ul>
<li>From the Apple menu in the corner of your screen, choose <strong>About This Mac</strong>.</li>
<li>You&#8217;ll see the macOS name followed by its version number.</li>
</ul>
<p>What is the latest version? As of the day of this publication, macOS Catalina 10.15.5 is what you should see. You can reference Apple support for the most up to date list <a href="https://support.apple.com/en-us/HT201260">here</a>.</p>
<h3><u>How to update your Windows computer</u></h3>
<p>So you need an update. Let’s look at options.</p>
<p>For Windows 10 users, updates to the operating system are pushed through from Microsoft. Follow their directions (<a href="https://support.microsoft.com/en-us/help/12373/windows-update-faq">click here</a>) to make sure you have <strong>Microsoft Updates</strong> configured correctly to keep your PC updated automatically or at least with reminders.</p>
<p>Windows users running anything less than Windows 10 should visit Microsoft’s site (<a href="https://www.microsoft.com/en-us/windows/get-windows-10">click here</a>) to evaluate the best next step. Your out of date operating system is at very high risk for a cyber breach.</p>
<p>If your device is too old, it may not have the built in features you need to run Windows 10, meaning you will need a computer upgrade. If it is compatible, you will have to purchase the new operating system. Whatever your need, check with your IT department before you purchase. You may be able to get the upgrade from them if you use your personal computer for work purposes.</p>
<h3><u>How to update your Mac computer</u></h3>
<p>For Mac users, updates to the operating system are pushed through from the Apple. Follow their directions (<a href="https://support.apple.com/en-us/HT201541">click here</a>) to make sure you have updates configured correctly to keep your computer updated automatically or at least with reminders. If you are running an older device, at some point the company updates will not be compatible. If that is the case, you need to contact your IT point person about upgrading your computer or consider purchasing a new Mac. Your out of date computer is at very high risk for a cyber breach.</p>
<h3><u>Benefits of Updating = Cost savings for you and your company</u></h3>
<p>If you want to tap out because I just mentioned spending money, stay with me a little longer. The number one reason to have the most up to date operating system is the built in security. While nothing will be full proof, Windows and Apple are constantly learning of threats and vulnerabilities. They create patches and protections to stop cybercriminals from getting in. The catch is that they only do this for their latest product.</p>
<p>While it might cost some money upfront, you will save money too. For years, the expectation was that you needed to purchase a 3<sup>rd</sup> party software to protect your computer from being infected with viruses and malware. That is no longer the case. Both Windows 10 and macOS systems have built in antivirus and anti-malware software. When compared to 3<sup>rd</sup> party options, the difference in security level is minimal. There is a slight argument for layering your protection, but that is not a guarantee to block everything. If you want to read more about this, Windows users can click <a href="https://www.howtogeek.com/225385/what%E2%80%99s-the-best-antivirus-for-windows-10-is-windows-defender-good-enough/">here</a> and Mac users can click <a href="https://www.howtogeek.com/437846/do-you-need-an-antivirus-on-a-mac/">here</a>.</p>
<p>More importantly, a breach can cost your company dearly. In fact, 60% of small businesses go out of business within six months of falling victim to cyber crime. Cybersecurity is not about latest technology, it is about safety of your customers and company data.</p>
<h3><u>The Human Firewall is Required</u></h3>
<p>Mike Moran, with Third Rock, put it this way; “Vigilant employees are still the best defense. If you are running Office365, assume that it is only going to catch 40% of the bad things coming through, you still have to be smart enough to recognize the other 60% and not click on them.”</p>
<p>No matter how much you pay for antivirus, anti-malware and top of the line cybersecurity, you still have to be a smart user. Use best practices for passwords that are hard to crack, tips to recognize phishing attempts and smart choices when searching the internet. You can’t prevent a breach, but you can reduce your chances.  Train ALL of your employees at least once a year on cybersecurity awareness.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_with_border et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_3_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: right;">Download our Cyber Hygiene Checklist for updating your device to share with friends, family and coworkers.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_button_module_wrapper et_pb_button_0_wrapper  et_pb_module ">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://thirdrock.com/wp-content/uploads/Cyber-Hygiene-Device-cybersecurity-Checklist-2020-CyberCompass.pdf" target="_blank">Download now</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/06/16/is-it-time-for-an-upgrade/">Is it time for an upgrade?</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9180</post-id>	</item>
		<item>
		<title>A Resurgence in Pretexting scams</title>
		<link>https://thirdrock.com/blog/2020/05/15/a-resurgence-in-pretexting-scams/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 15 May 2020 12:35:26 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9089</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/05/15/a-resurgence-in-pretexting-scams/">A Resurgence in Pretexting scams</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4 et_pb_gutters2">
				<div class="et_pb_column et_pb_column_3_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Cybercriminals continuously modify to match the “market”: namely you, their targets. Scams cycle in popularity based on their effectiveness with current trends. With “new” remote workforce, we are experiencing a resurgence in pretexting. The lack of personal interaction is making it easier for cybercriminals to impersonate coworkers and company representatives in order to steal your money and your private information.</p>
<h3>What is it?</h3>
<p>Pretext means false motive.  Pretexting is defined as the practice of presenting oneself as someone else in order to gain private information. A scammer attempts to build a connection in one of two ways: impersonate someone you know, such as a coworker, or fabricate an identity of a worker from a trusted company. No matter the means, their end goal is to steal your private information. Unlike a hacker who goes in the back door to steal without you knowing, a good pretext scam has you willingly give them what they want.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_with_border et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;"><em>A cybercriminal contacts HR impersonating a worker. They inform HR that their bank account information has changed and they need to update the information for their direct deposit. Without proper verification, HR begins sending paychecks to a criminal.</em></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5 et_pb_gutters2">
				<div class="et_pb_column et_pb_column_1_3 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_with_border et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;"><em>An IT representative calls you saying there have been small breaches on company computers. He needs to remotely access your computer to ensure all cybersecurity protocols are in place on your company device. Since everyone is working remotely, he can’t have you bring your device in, which is normal procedure, so this is the next best option. You give him your IP address and he has access to control your computer. You see random windows beginning to pop up and realize too late he is stealing your information.</em></p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_3 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>How does this scam work?</h3>
<p>A successful pretexting scam is built on trust. The scammer represents themselves in a legitimate way, gains your trust and then asks for the information they are looking for. Believing you are talking to a real representative, you give over your information willingly. The scammer takes their time researching the target (you) which allows them to build a persona that will have the most chance of success. Some tools of successful pretexting include:</p>
<ul>
<li>Connecting with target over similar interests</li>
<li>Keep the scam simple – no complicated reasons or requests</li>
<li>Create a trusted character</li>
<li>Ask for target’s information under the guise of verification</li>
<li>Uses logical conclusions or follow through for the target</li>
</ul>
<p><a href="https://www.wrcbtv.com/story/42016879/cyber-security-expert-explains-potential-danger-of-viral-facebook-challenge"></a></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_6 et_pb_gutters2">
				<div class="et_pb_column et_pb_column_2_3 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>How is it being used?</h3>
<p>The scam is built on luring you into trusting through impersonation. Cybercriminals use just enough information to make you think they are legitimate so you willingly provide them information. The recent Facebook challenge is a great example. In support of high school seniors who are not getting a normal graduation, people were challenged to post their own graduation pictures. The Better Business Bureau warned this was an opportunity for cyber criminals to find personal information about your high school, age, and school mascot to be used against you.  Read more <a href="https://www.wrcbtv.com/story/42016879/cyber-security-expert-explains-potential-danger-of-viral-facebook-challenge">here</a></p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_with_border et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><em>An employee in the finance department received a request to transfer a large sum of money to a vendor. Thinking it was from a legitimate client, they authorized the transfer without verification. It was later discovered that the request came from a cybercriminal impersonating the client.</em></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Defend yourself and your company:</h3>
<ol>
<li>Limit the personal information you post on social media
<ul>
<li>Remember that these scams involve researching the target. The more information you willingly post, the easier it is for them to create a character that will connect with you</li>
</ul>
</li>
<li>Go to the source
<ul>
<li>If a representative from a company contacts you either in person, on the phone or via email, verify their identity directly with the company. If someone shows up at your house, find the corporate company’s phone number and call from your personal phone. It may seem rude and take longer, but you could be protecting yourself from a scam.</li>
</ul>
</li>
<li>Never give out personal information
<ul>
<li>Real company representatives will never ask you for your password, full account numbers or credit card numbers. General conversations that steer in a direction asking too many personal questions about your family and job should be a red flag. You can decline answering in a polite way while not giving away information.</li>
</ul>
</li>
<li>Protect your organization
<ul>
<li>Do not give out company information, even if the requester appears to be from within the company. Know your company’s procedures for how they communicate when there is an issue, or they need information from you.</li>
</ul>
</li>
</ol></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8 et_pb_gutters2">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_11  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: right;">Get a copy of our checklist to share with friends, family and coworkers</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_13  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_button_module_wrapper et_pb_button_1_wrapper et_pb_button_alignment_left et_pb_module ">
				<a class="et_pb_button et_pb_button_1 et_pb_bg_layout_light" href="https://thirdrock.com/wp-content/uploads/Cyber-Hygiene-Pretexting-Checklist-2020-Third-Rock.pdf">Download now</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2020/05/15/a-resurgence-in-pretexting-scams/">A Resurgence in Pretexting scams</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9089</post-id>	</item>
		<item>
		<title>Cyber Safety for working at home</title>
		<link>https://thirdrock.com/blog/2020/04/23/cyber-safety-for-working-at-home/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Thu, 23 Apr 2020 18:20:32 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9042</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/04/23/cyber-safety-for-working-at-home/">Cyber Safety for working at home</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_14  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_12  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Our work environments have been turned upside down. We are all in a place of creating new work routines. Having left the cyber safety net of a central office designed to protect company cybersecurity, IT departments are juggling a dispersed workforce while maintaining cybersecurity standards that protect private data.</p>
<p>Before COVID-19 forced a remote workforce, anywhere from 60 – 90% of breaches were caused by human error. We are seeing cyber criminals take advantage of extra vulnerabilities created with employees working from home. Cybersecurity is no longer just an IT thing. Protecting your company and their private data has never been closer to home, literally. Mistakes that could hurt the company start on your own network, which could also affect your personal security. Your business, IT department and your family are relying on your vigilance to be cyber safe.</p>
<h2></h2>
<h2>Cyber safety habits to put into practice</h2>
<ol>
<li><strong> </strong><strong>Separate work and personal devices<br /> </strong>If your company provides you a device, use it only for work purposes. Have a separate device for family and personal use. If separate devices are not a possibility, create separate profiles with different security settings. Use your work profile only for work purposes. If you have children who need to use the same computer, create separate profiles with parental controls that limit their ability to access and/or download content that could infect your computer.</li>
</ol>
<ol start="2">
<li><strong> </strong><strong>Lockdown your device<br /> </strong>You may feel that your device is physically safe in your home office, but you still need to protect data safety. Set a unique password for your device and lock it every time you walk away. If you are using one device for multiple profiles, have a private, unique password for your work profile that no one in your household can access. This is good practice for after quarantine as well.</li>
</ol>
<ol start="3">
<li><strong> </strong><strong>Be wary of add-ons and downloads<br /> </strong>There are many add-ons and extensions that promise to make your work run faster, smoother and better. Be cautious of downloading these onto your device. Many contain malware that give hackers access to the data on your computer. If you then link to your company network, they could gain access there as well. A good cyber safety practice is to research on trusted sites before downloading a new program or add-on.</li>
</ol>
<ol start="4">
<li><strong> </strong><strong>Use company approved sharing sites<br /> </strong>With your entire team working remotely, there is a greater need to communicate digitally. It may be more comfortable to use data sharing platforms you are used to, they may not be the most secure. Only send private data through company approved sharing sites.</li>
</ol>
<h2></h2>
<h2>Know signs of a breach</h2>
<p>Preventative measures are important to cyber safety, but breaches are still possible. It’s important to know what signs to look for in the event of a breach.</p>
<ol>
<li><strong> </strong><strong>Increase in unwanted pop-ups<br /> </strong>Pop-ups are a widely seen by-product of malware. If advertisements or system pop-ups begin appearing outside of any program, you may have been infected.</li>
</ol>
<ol start="2">
<li><strong> </strong><strong>Processing slows down<br /> </strong>Is it taking longer than usual for your computer to boot up or for programs to load? Viruses and malware run in the background, slowing down the programs you are attempting to run.</li>
</ol>
<ol start="3">
<li><strong> </strong><strong>New programs appear<br /> </strong>Computers do not add content on their own. If a new program, app or internet add-on appears on your computer, you may have a virus that inserted content onto your computer.</li>
</ol>
<h2></h2>
<h2>How do you handle a potential breach?</h2>
<ol>
<li><strong> </strong><strong>Report it!<br /> </strong>Inform your IT department of what you are experiencing. Send screen shots of error messages, pop-ups and other unwanted content. Be specific about when it started happening and what is going on.</li>
</ol>
<ol start="2">
<li><strong> </strong><strong>Don’t click<br /> </strong>Never click on suspicious content, even to try and close pop-up windows. Malware is the gateway for a virus. Clicking on the content can give them access to the data they are looking for.</li>
</ol>
<ol start="3">
<li><strong> </strong><strong>Scan with anti-virus software<br /> </strong>Company devices should be equipped with anti-virus software. If your company does not provide a device, get with your IT department about them providing access to anti-virus software. While it should do scans in the background, if you notice any of the above issues, tell it to run a full system diagnosis.</li>
</ol>
<ol start="4">
<li><strong> </strong><strong>Don’t access private data<br /> </strong>Until your issue has been resolved, do not attempt to access the company network or open any private data. If a hacker is monitoring your computer through malware, you run the risk of giving them access to that information.</li>
</ol>
<p>While human error will never be eliminated, we can all take steps to increase our awareness and cyber safety to lower our risk.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_2_3 et_pb_column_15  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_13  et_pb_text_align_center et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Want a reference to share with family, friends and coworkers? Download our checklist to make your most secure home office environment.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_16  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_button_module_wrapper et_pb_button_2_wrapper  et_pb_module ">
				<a class="et_pb_button et_pb_button_2 et_pb_bg_layout_light" href="https://thirdrock.com/wp-content/uploads/Third-Rock-Home-Office-Cybersecurity-Checklist-2020.pdf" target="_blank">Download your checklist</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2020/04/23/cyber-safety-for-working-at-home/">Cyber Safety for working at home</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9042</post-id>	</item>
		<item>
		<title>Third Rock welcomes Taylor Hersom in dual roles</title>
		<link>https://thirdrock.com/blog/2020/04/16/third-rock-welcomes-taylor-herson-in-dual-roles/</link>
		
		<dc:creator><![CDATA[Kathleen Hadaway]]></dc:creator>
		<pubDate>Thu, 16 Apr 2020 18:14:41 +0000</pubDate>
				<category><![CDATA[Press Release]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9032</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/04/16/third-rock-welcomes-taylor-herson-in-dual-roles/">Third Rock welcomes Taylor Hersom in dual roles</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[

<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_11">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_17  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_14  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: left;"><img data-recalc-dims="1" loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Taylor-bw.png?resize=276%2C300&#038;ssl=1" width="276" height="300" alt="" class="wp-image-9028 aligncenter size-medium" style="float: right;" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Taylor-bw.png?resize=276%2C300&amp;ssl=1 276w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Taylor-bw.png?w=416&amp;ssl=1 416w" sizes="(max-width: 276px) 100vw, 276px" />Round Rock, TX, April 15, 2020 – Third Rock, a cybersecurity and compliance firm, and creator of CyberCompass® cyber risk management software, is excited to announce the addition of Taylor Hersom to its team to serve in a dual capacity. Mr. Hersom will be heading up CyberCompass® distribution channel development. His specific goal will be to help operationalize channel partners in translating cyber risks to better market their cybersecurity solutions, stated Robert Felps, CEO of Third Rock and CyberCompass® LLC.</p>
<p>Mr. Hersom&#8217;s previous experience was with Deloitte risk management practice. He recently served in helping lead business development for a cybersecurity firm that promoted CyberCompass®. His background provides a unique set of skills in translating how cyber risk management can drive the optimization of cybersecurity and compliance solutions. Mr. Hersom has been using CyberCompass® for over a year with his previous customers. &#8220;Most cyber risk management tools focus on technology, so that leaves companies with a false sense of security and lack of insights into their cyber risk. I have worked with several software applications, and I haven&#8217;t seen anything with the potential and power of CyberCompass® to deliver a complete 360-degree integration across people, processes, technology, and vendors,&#8221; said Hersom.</p>
<p>&#8220;We are excited to add Taylor to our team, especially during this time when businesses need our help in getting higher levels of cybersecurity and compliance quickly,&#8221; stated Felps. &#8220;Taylor brings a depth of knowledge and unique insight to rapidly improve our automation and usability in  assessing cyber risk, managing remediation, and ultimately improving their cyber protection.&#8221;</p>
<p>Hersom has also been tapped to lead Third Rock&#8217;s virtual services growing practice. Third Rock developed CyberCompass® software to provide faster, more complete cybersecurity and compliance at an affordable price. Given the impact on businesses with COVID-19, Third Rock clients are seeking to have virtual Chief Information Security Officer and virtual Chief Compliance Officer expertise as they quickly transition their businesses and improve cybersecurity with a dispersed workforce. &#8220;Having Taylor lead our virtual practice within Third Rock allows him to be involved with understanding client needs as they change and translating those needs to CyberCompass® enhancements,&#8221; stated Felps.</p>
<h4>About Third Rock</h4>
<p>Third Rock is a cyber risk and compliance management professional services firm. Based in Round Rock, Texas, Third Rock services include risk assessments, remediation, and rapid incident response in less 65% less time than other firms. Third Rock built a turnkey, simplified, best in class cyber risk management, cybersecurity and compliance software CyberCompass®.</p>
<h4>About CyberCompass® LLC</h4>
<p>CyberCompass® cloud-based software empowers and enables businesses to manage and monitor their cyber risk at a holistic level. It is the only cyber risk management and compliance software with one assessment to meet multi standards for both cybersecurity and government privacy regulation such as HIPAA, CCPA, and GDPR. The platform includes tools and guidance for hardening an organization&#8217;s IT systems, refining their operational processes, engaging employees with cyber training, and managing vendor compliance. Excess Line Association of New York (ELANY) offers a complimentary subscription to CyberCompass™ for active members to become compliant. CyberCompass®, LLC was recently established as it’s own legal entity.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>

<p>The post <a href="https://thirdrock.com/blog/2020/04/16/third-rock-welcomes-taylor-herson-in-dual-roles/">Third Rock welcomes Taylor Hersom in dual roles</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9032</post-id>	</item>
		<item>
		<title>Cyber Protection as Your Business Deals with Social Distancing</title>
		<link>https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Tue, 10 Mar 2020 12:00:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Policies & Procedures]]></category>
		<category><![CDATA[Third Rock]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Pandemic]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8918</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/">Cyber Protection as Your Business Deals with Social Distancing</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_12">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_18  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_15  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Cyber Safety Tips for Businesses When Employees Work from Home</h2>
<p>With the threat of the Coronavirus, many companies are allowing or requiring employees to work from home. If your company deals with protected information such as healthcare, financial, consumer or personal, you should have policies and procedures in place to protect that data within your normal work environment. However, having your work force suddenly need to access this information from home may not be normal. Systems may be overloaded, sensitive information distributed in a way that you never anticipated and lines of communication disrupted. Do your policies and procedures cover such a situation, like a pandemic? Here are 6 tips to best protect your business and your clients.</p>
<h3>Train Your Employees</h3>
<p>We are not talking about the once a year standard, boring videos people half heartedly watch so they can print off a certificate proving they did it. Your employees <u>must</u> know key elements of cyber safety that they are regularly reminded of. If nothing else, make sure they know these 3 things.</p>
<ol>
<li><u>Anticipate phishing and spear phishing attacks</u>. Word will travel fast that everyone is working from home. Hackers will recognize you are vulnerable and try to take advantage of it. Tell your workforce to anticipate phishing and spear phishing attacks that will attempt to take advantage of pandemic fears. Give visual examples, have your IT on high alert searching for phishing attempts and contact employees immediately when one gets through your firewall.</li>
<li><u>Do not access sensitive information on unauthorized devices</u>. The biggest culprit: cell phones. Have policies about what devices they are allowed to use to remotely access information and make sure they know. Never store sensitive information unencrypted on a portable device.</li>
<li><u>Do not access sensitive information on unsecure networks</u>. Like working from Starbucks because they have free WiFi? That may be fine for personal use, but not when you’re accessing sensitive information. Public WiFi makes it easy for a hacker to infiltrate your computer, stealing the information you accessed.</li>
</ol>
<h3>Determine Critical Processes and Access Control</h3>
<p>This is a key component to any Pandemic plan. Who is authorized to access sensitive information, and how do you ensure they can actually access sensitive information in a highly distributed environment? Minimize your exposure by controlling access to data. Not everyone working from home needs access to sensitive information. Make sure you lock down access to only essential employees. Follow through by monitoring who is accessing data, what they are accessing and why.</p>
<h3>Multifactor Authentication</h3>
<p>For those employees who need to access sensitive information, require multifactor authentication every time they remotely access a private server. This is an easy step to implement that can have a big impact on keeping cyber criminals out.  Explain to your employees why the two-factor authentication is an important safety capability.</p>
<h3>Network Access Control</h3>
<p>While you should train your employees not to access sensitive information on unsecure networks (see tip #1), you can implement access controls that actually block a user if they do not meet a certain level of security. You should implement a Virtual Private Network (VPN) which provides higher security for your workers using their home and/or public internet that are not secure.   It’s fairly easy and inexpensive to implement. For more information on VPNs, <a href="https://www.techradar.com/vpn/best-vpn">click here</a>.</p>
<h3>Encrypt Data</h3>
<p>If information is stored locally on a device, make sure it is encrypted. Portable devices are often stolen that contain sensitive information. A simple step of encryption protects your clients’ information and protects you from hefty breach costs and fines.</p>
<h3>Provide Company Devices</h3>
<p>Laptops and cell phones should always be running the most up to date version of an operating system available (i.e. Windows 10 vs Windows 8). They should also have up to date firewall protections and antivirus software. If employees are permitted to use personal devices, it is difficult to ensure these protections stay up to date. Providing company devices that are properly configured and regularly updated help strengthen the barrier against cyber criminals.</p>
<p>Protection doesn’t have to be complicated, but it does have to be intentional. Simple steps taken by the company and the employees can go a long way. While we want to stay physically safe through this wave of the Coronavirus, let’s make sure we stay cyber safe too.</p>
<p> Concerned if you have the right precautions and planning in place? Contact Third Rock at info@thirdrock.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://thirdrock.com/blog/2020/03/10/cyber-protection-as-your-business-deals-with-social-distancing/">Cyber Protection as Your Business Deals with Social Distancing</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8918</post-id>	</item>
		<item>
		<title>Third Rock moves to new office</title>
		<link>https://thirdrock.com/blog/2020/02/24/third-rock-moves-to-new-office/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Mon, 24 Feb 2020 19:58:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Third Rock]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9369</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/02/24/third-rock-moves-to-new-office/">Third Rock moves to new office</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_13">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_19  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_16  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Since 1995, Third Rock has been creating solutions to help businesses navigate the confusing world of cybersecurity and compliance. We took our combined knowledge and years of experience to build a better way to manage cyber risk.</p>
<p>As our business continues to grow, Third Rock is on the move. In order to better serve our local clients, Third Rock is upgrading its office space. With more room for conferencing, we are ready to help your business work toward cyber resilience. <a href="https://thirdrock.com/contact-us">Contact us</a> to set up a time to talk about starting your journey toward Cyber Confidence.</p>
<p>&nbsp;</p>
<p>595 Round Rock West Dr Suite 401, Round Rock, Tx 78681</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/02/24/third-rock-moves-to-new-office/">Third Rock moves to new office</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9369</post-id>	</item>
		<item>
		<title>EXEMPT is not a FREE PASS with 23 CRR 500 NY DFS</title>
		<link>https://thirdrock.com/blog/2020/01/31/exempt-is-not-a-free-pass-with-23-crr-500-ny-dfs/</link>
		
		<dc:creator><![CDATA[Robert Felps]]></dc:creator>
		<pubDate>Fri, 31 Jan 2020 15:00:00 +0000</pubDate>
				<category><![CDATA[Risk Assessment]]></category>
		<category><![CDATA[Risk Management]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=8754</guid>

					<description><![CDATA[<p>Exempt. When we hear that word, we think about being “off the hook” or that we have immunity. We feel free of meeting the same expectation as someone else. &#160;We’ve [&#8230;]</p>
<p>The post <a href="https://thirdrock.com/blog/2020/01/31/exempt-is-not-a-free-pass-with-23-crr-500-ny-dfs/">EXEMPT is not a FREE PASS with 23 CRR 500 NY DFS</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p class="has-normal-font-size">Exempt. When we hear that word, we think about being
“off the hook” or that we have immunity. We feel free of meeting the same expectation
as someone else. &nbsp;We’ve escaped fulfilling
requirements.</p>



<p class="has-normal-font-size">Not so fast! If you’re an insurance broker with clients in New York,
the NY Department of Financial Services (NYDFS) 23 NYCRR 500 cybersecurity
regulations still apply to your company.&nbsp;
Exempt means most brokers, bankers and all other financial service
organizations need to complete a risk assessment and attest to them before <strong>April
15, 2020</strong> to avoid fines and penalties.</p>



<h3 class="wp-block-heading"><strong>I’m a small, exempt, business. Why is compliance important?</strong></h3>



<p class="has-normal-font-size">Often times, small to medium sized companies get the raw end of the
deal when it comes to compliance. Higher expectations usually mean more money
and more personnel, which is easier said than done.</p>



<p class="has-normal-font-size">NYDFS recognizes how cybercrime is wreaking havoc on the financial
industry.&nbsp; They want even the smallest
companies to have basic security in place to best protect their clients and
themselves. Why? Cyber criminals know small and medium sized companies tend to
have lower security in place, making them a perfect target. In fact, according
to Verizon’s Data Breach Report, 43% of cyber-attacks targeted small
businesses.&nbsp; NYDFS is leading the nation
in getting the industry more cybersecure at all levels.</p>



<div class="wp-block-image"><figure class="alignleft size-medium"><img loading="lazy" decoding="async" width="286" height="300" src="//i1.wp.com/thirdrock.com/wp-content/uploads/blog-pullout-286x300.png" alt="Reserved: NYDFS regulation 500.19(a)(1) – You are entitled to this exemption when a Covered Entity has fewer than 10 employees, including independent contractors.  This is a limited exemption and you must still design and implement a cybersecurity program that meets some but not all the regulatory requirements.  This includes submitting an annual Certification of Compliance.


" class="wp-image-8761" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/blog-pullout.png?resize=286%2C300&amp;ssl=1 286w, https://i0.wp.com/thirdrock.com/wp-content/uploads/blog-pullout.png?w=366&amp;ssl=1 366w" sizes="(max-width: 286px) 100vw, 286px" /></figure></div>



<p></p>



<p></p>



<h3 class="wp-block-heading"><strong>IT manages our cyber risk, right?</strong></h3>



<p class="has-normal-font-size">This is where the false sense of security
is with many insurance brokers and organizations. Most IT departments or Manage
Service Providers (MSPs) are focused on technology and data access.&nbsp; They don’t know if you are conducting cyber
security awareness training for your employees or if you have accurate security
measures in place for vendors.</p>



<p class="has-normal-font-size">NYDFS wants businesses to move to a holistic and vigilant approach by
building a cyber resilient culture that goes beyond technology.&nbsp; To outpace the cyber criminals, you must
create a culture of cybersecurity within your company that covers your people,
processes, technology and vendors.</p>



<p class="has-normal-font-size">Not sure of your next step?&nbsp; Here
is a break down and what you need to do before April 15, 2020:</p>



<p></p>



<p></p>



<p></p>



<p></p>



<h3 class="wp-block-heading"><strong>Compliance starts with knowing your risk across your organization</strong></h3>



<p class="has-normal-font-size">All financial services, regardless of size, must do the following to design and implement a cybersecurity program to meet regulations.  </p>



<p class="has-normal-font-size">1 &#8211; <span style="font-size: inherit;">Conduct a proper risk assessment that covers </span><strong style="font-size: inherit;">14 topics around people, processes, technology and vendors.</strong></p>



<div class="wp-block-image"><figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" src="https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?fit=1024%2C488&amp;ssl=1" alt="" class="wp-image-8762" width="823" height="392" srcset="https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?w=1889&amp;ssl=1 1889w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=300%2C143&amp;ssl=1 300w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=1024%2C488&amp;ssl=1 1024w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=768%2C366&amp;ssl=1 768w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=1536%2C732&amp;ssl=1 1536w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=1080%2C515&amp;ssl=1 1080w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=1280%2C610&amp;ssl=1 1280w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=980%2C467&amp;ssl=1 980w, https://i0.wp.com/thirdrock.com/wp-content/uploads/Assessment-cart.png?resize=480%2C229&amp;ssl=1 480w" sizes="(max-width: 823px) 100vw, 823px" /></figure></div>



<p class="has-normal-font-size">2 &#8211; Make sure you have policies, procedures, and documentation that covers the 14 areas. </p>



<p class="has-normal-font-size">3 &#8211; NYDFS requires documentation for several plans: <em>(Make sure you check with your IT and/or IT provider you have to make sure these plans are available regarding cyber breach!)</em></p>



<figure class="wp-block-table is-style-stripes"><table><tbody><tr><td><strong>Risk Management Plan   </strong></td><td><em>Outlines what you are doing to   prevent cybercrime, improve cybersecurity and information protection and reduce cyber risk</em>   </td></tr><tr><td><strong>Incident Response Plan </strong>  </td><td><em>Details action to respond to an incident across your organization</em>   </td></tr><tr><td><strong>Business Continuity/Disaster Recovery Plan   </strong></td><td><em>Details actions to minimize and recover from a breach   across your organization</em>   </td></tr><tr><td><strong>Breach Notification Plan </strong>  </td><td><em>Defines who you need to notify, when to notify and how to notify to avoid penalties and limit liabilities</em>   </td></tr></tbody></table></figure>



<h3 class="wp-block-heading"><strong>Lacking resources, time and expertise to get NYDFS 500
compliant by April 15, 2020?</strong></h3>



<p class="has-normal-font-size">We understand that compliance can feel overwhelming. It seems
expensive, difficult, and almost unattainable.&nbsp;
The deadline looks like a huge mountain you have to climb.&nbsp; At Third Rock, we offer <a href="https://thirdrock.com/nydfs/">CyberCompass®,</a> a self-guided
automation tool to make your compliance journey easier and affordable while
still meeting the deadline. &nbsp;</p>



<p class="has-normal-font-size">CyberCompass® is automated, cloud-based compliance
software with built-in expertise that translates NYDFS government requirements
into layman’s terms. It does most of the heavy lifting for your risk
assessment, analysis, remediation and compliance documentation- including
updated policies and procedures and all the required plans. There is no
software to download or install and it can be accessed anywhere. <a href="https://youtu.be/0STdfcFqjLg">Click here</a> for a quick video about how CyberCompass® works with NYDFS
compliance. &nbsp;<strong>Note: If you are an ELANY
member, check out this CyberCompass</strong><strong>®</strong><strong> offer to </strong><a href="https://elany.org/CyberSecurityCompliance.aspx"><strong>ELANY members!</strong></a><strong></strong></p>



<p class="has-normal-font-size">Need assistance and want a compliance coach? Third Rock offers
affordable expertise to help you get to the deadline.

Don’t let cyber uncertainty keep you from
protecting your business and your clients. <a href="mailto:info@thirdrock.com?subject=Tell%20me%20more%20about%20CyberCompass™">Contact us today</a> and see how we can prepare you for the NYDFS
deadline and to best protect your clients and business.



</p>
<p>The post <a href="https://thirdrock.com/blog/2020/01/31/exempt-is-not-a-free-pass-with-23-crr-500-ny-dfs/">EXEMPT is not a FREE PASS with 23 CRR 500 NY DFS</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8754</post-id>	</item>
		<item>
		<title>Announcing CyberCompass, LLC</title>
		<link>https://thirdrock.com/blog/2020/01/01/announcing-cybercompass-llc-2/</link>
		
		<dc:creator><![CDATA[Cathy Diehl]]></dc:creator>
		<pubDate>Wed, 01 Jan 2020 16:45:00 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[CyberCompass]]></category>
		<guid isPermaLink="false">https://thirdrock.com/?p=9326</guid>

					<description><![CDATA[<p>The post <a href="https://thirdrock.com/blog/2020/01/01/announcing-cybercompass-llc-2/">Announcing CyberCompass, LLC</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_14">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_20  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_17  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Since 1995, Third Rock has been leading in improving privacy compliance and cybersecurity affordably. Starting with HIPAA compliance and seeing how healthcare was strapped with only spreadsheets as their only tool, Third Rock developed automation tools with built-in expertise to move their clients to faster and more complete cyber risk management.</p>
<p>“Healthcare organizations are highly-targeted by cyber threats yet have the lowest utilization of risk management software to help manage their risks.” stated Robert Felps, Third Rock CEO.    </p>
<p> <a href="https://cybercompass.co">CyberCompass®</a> cloud-based platform was born as a solution to automate the workflow and provide the navigation needed for businesses to protect themselves today and stay current as the cyber landscape and privacy laws evolve. Third Rock quickly saw that its solution was adopted by Texas Medical Liability Trust, the largest insurer of physicians in the country, Texas Health Services Authorization with its SecureTexas certification, and Texas Medical Association.</p>
<p>With the enactment of privacy laws and the expansion of the tool into other industries, CyberCompass has gone through significant and more user-friendly enhancements to save companies up to 70% of work hours.  The most powerful enhancement is the capability to do multiple regulations with one streamline assessment.  Excess Line Association of New York is currently offering CyberCompass as a free membership benefit so insurance brokers can meet New York Department of Finance 500 cybersecurity compliance certification. CyberCompass includes the following privacy and cybersecurity regulations: CCPA, CIS-20 GDPR, HIPAA, NAIC 668, NYDFS 500, NIST 171 800, and numerous state regulations.</p>
<p>Seeing the increased demand for the software and its ability to simplify cyber risk management, streamline privacy compliance and improve cybersecurity holistically, CyberCompass, LLC becomes effective on January 1, 2020. Spinning off as a separate entity, CyberCompass as well as its other tools such as CyberQuickCheck, will have greater flexibility to establish various distribution opportunities through resellers, value added resellers, strategic alliances, and partnerships. </p>
<p>“With CyberCompass as a separate legal entity, we have simplified the ability for our partners so we can develop more focused leadership and meet changing market demand faster,” stated Felps.</p>
<p>Do you have clients in need of holistic risk management across people, processes, technology and vendors? Learn more about <a href="https://cybercompass.co/partners/">partnering</a> with CyberCompass today to provide the most affordable and complete solution.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://thirdrock.com/blog/2020/01/01/announcing-cybercompass-llc-2/">Announcing CyberCompass, LLC</a> appeared first on <a href="https://thirdrock.com">Third Rock</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9326</post-id>	</item>
	</channel>
</rss>
