<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breaches &amp; Cyber Security Archives - Advanced Benefit Consulting</title>
	<atom:link href="https://advancedbenefitconsulting.com/category/data-breaches-cyber-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://advancedbenefitconsulting.com/category/data-breaches-cyber-security/</link>
	<description>Advanced Benefit Consulting &#38; Insurance Services, Inc. A Full Service Employee Benefit and Compliance Solution for Employers</description>
	<lastBuildDate>Tue, 07 Oct 2025 03:09:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>S7 E3 &#8211; Cyber Security Updates, Featuring Matt Fields from Microsoft</title>
		<link>https://advancedbenefitconsulting.com/s7e3-cyber-security-updates-w-microsoft-matt-fields/</link>
		
		<dc:creator><![CDATA[Orange County Benefits Expert]]></dc:creator>
		<pubDate>Tue, 07 Oct 2025 13:00:34 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Data Breaches & Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Season 7]]></category>
		<category><![CDATA[Advanced Persistent Threat groups]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Matt Fields]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Security Concerns]]></category>
		<guid isPermaLink="false">https://advancedbenefitconsulting.com/?p=11981</guid>

					<description><![CDATA[<p>The post <a href="https://advancedbenefitconsulting.com/s7e3-cyber-security-updates-w-microsoft-matt-fields/">S7 E3 &#8211; Cyber Security Updates, Featuring Matt Fields from Microsoft</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><a href="https://advancedbenefitconsulting.com/s7e3-cyber- security-updates-w-microsoft-matt-fields">https://advancedbenefitconsulting.com/s7e3-cyber- security-updates-w-microsoft-matt-fields</a></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				
				
				<span class="et_pb_image_wrap "><img fetchpriority="high" decoding="async" width="1000" height="1000" src="https://advancedbenefitconsulting.com/wp-content/uploads/BER-S7-E3-cyber-security-updates.jpg" alt="Cyber Security Updates with Matt Fields" title="BER S7 E3 cyber-security-updates" srcset="https://advancedbenefitconsulting.com/wp-content/uploads/BER-S7-E3-cyber-security-updates.jpg 1000w, https://advancedbenefitconsulting.com/wp-content/uploads/BER-S7-E3-cyber-security-updates-980x980.jpg 980w, https://advancedbenefitconsulting.com/wp-content/uploads/BER-S7-E3-cyber-security-updates-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1000px, 100vw" class="wp-image-11983" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In this week’s podcast, host Dorothy Cociu is excited to bring you important cyber security updates from Matt Fields, a Principal Cyber Security Consultant from Microsoft. We discuss what consumers and businesses can do to protect themselves from cyber risks, including internal and external threats, and the importance of comprehensive and ongoing risk analyses/risk assessments. We also talk about the sophistication of today’s cyber criminals, Advanced Persistent Threat groups, many coming from China, North Korea or Russia, and of course today’s greatest Artificial Intelligence threats. Lastly, we discuss the best ways overall to manage cyber security. Join us for this very important and informative podcast!</p>
<p>&nbsp;</p></div>
			</div><div id="s5e13-show-notes" class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Show Notes</h2>
<p><a href="https://advancedbenefitconsulting.com/wp-content/uploads/Show-Notes-S7-E3.pdf" rel="attachment wp-att-11984">Show Notes S7 E3</a></p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><strong>Watch &amp; Listen to Video Podcast</strong></p></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_0 et_clickable">
				
				
				
				
				<div class="et_pb_code_inner"><iframe data-testid="embed-iframe" style="border-radius:12px" src="https://open.spotify.com/embed/episode/1OfwgAViRcrG6tUp1so3x3/video?utm_source=generator" width="624" height="351" frameBorder="0" allowfullscreen="" allow="autoplay; clipboard-write; encrypted-media; fullscreen; picture-in-picture" loading="lazy"></iframe>
</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://advancedbenefitconsulting.com/s7e3-cyber-security-updates-w-microsoft-matt-fields/">S7 E3 &#8211; Cyber Security Updates, Featuring Matt Fields from Microsoft</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>S6E8 &#8211; Cybersecurity and Cyber Awareness &#8211; Today’s Threat Environment</title>
		<link>https://advancedbenefitconsulting.com/s638-cybersecurity-and-awareness-todays-threat-environment/</link>
		
		<dc:creator><![CDATA[Healthcare Benefits Specialist]]></dc:creator>
		<pubDate>Tue, 12 Nov 2024 14:00:10 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Data Breaches & Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Season 6]]></category>
		<category><![CDATA[Adriana Mendieta]]></category>
		<category><![CDATA[Carl Griftka]]></category>
		<category><![CDATA[Cyber Insurance Solutions]]></category>
		<category><![CDATA[cyber risks]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Dorothy Cociu]]></category>
		<category><![CDATA[iSecurePrivacy]]></category>
		<category><![CDATA[Miguel Villegas]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://advancedbenefitconsulting.com/?p=11128</guid>

					<description><![CDATA[<p>The post <a href="https://advancedbenefitconsulting.com/s638-cybersecurity-and-awareness-todays-threat-environment/">S6E8 &#8211; Cybersecurity and Cyber Awareness &#8211; Today’s Threat Environment</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><a href="https://advancedbenefitconsulting.com/s638-cybersecurity-and-awareness-todays-threat-environment">https://advancedbenefitconsulting.com/s638-cybersecurity-and-awareness-todays-threat-environment</a></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_1">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1000" height="1000" src="https://advancedbenefitconsulting.com/wp-content/uploads/S6E8-cybersecurity-and-cybre-awareness.jpg" alt="podcast s6e8 Cybersecurity awareness" title="cybersecurity and cybrer awareness" srcset="https://advancedbenefitconsulting.com/wp-content/uploads/S6E8-cybersecurity-and-cybre-awareness.jpg 1000w, https://advancedbenefitconsulting.com/wp-content/uploads/S6E8-cybersecurity-and-cybre-awareness-980x980.jpg 980w, https://advancedbenefitconsulting.com/wp-content/uploads/S6E8-cybersecurity-and-cybre-awareness-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1000px, 100vw" class="wp-image-11130" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">In this week’s podcast episode, host Dorothy Cociu discusses Cybersecurity and Cyber Awareness in Today’s Threat Environment with Adriana Mendieta, Tech Coordinator, Cyber Insurance Solutions, Miguel (Mike) Villegas, Founder and President of iSecurePrivacy, LLC, and Carl Griftka, Managing Director, SL Business Informatics. We discuss why it is important for organizations to prioritize cybersecurity and data privacy, internal and external security threats, the importance of ongoing risk analyses, and the overall threat environment for businesses today and in the future. What are the best ways to manage Cybersecurity? Why is it important that everyone in the company understand cyber risks? How can your company be best protected? Join us for this highly informative podcast!</div>
			</div><div id="s5e13-show-notes" class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Show Notes</h2>
<p><a href="https://advancedbenefitconsulting.com/wp-content/uploads/Show-Notes-S6-E8.pdf">Show Notes S6E8 Cybersecurity Awareness</a></p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><strong>Watch &amp; Listen to Video Podcast</strong></p></div>
			</div><div class="et_pb_module et_pb_video et_pb_video_1">
				
				
				
				
				<div class="et_pb_video_box"><iframe loading="lazy" title="S6E8 - Cybersecurity and Cyber Awareness - Today’s Threat Environment" width="1080" height="608" src="https://www.youtube.com/embed/AdlcD28rN2Y?feature=oembed&amp;rel=0&amp;controls=1"  allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
				
			</div><div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><strong>Listen Now</strong></p></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_2">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://podcasters.spotify.com/pod/show/benefitsexecroundtable/embed/episodes/S6E8---Cybersecurity-and-Cyber-Awareness---Todays-Threat-Environment-e2qs1l1" height="102px" width="400px" frameborder="0" scrolling="no"></iframe>
</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://advancedbenefitconsulting.com/s638-cybersecurity-and-awareness-todays-threat-environment/">S6E8 &#8211; Cybersecurity and Cyber Awareness &#8211; Today’s Threat Environment</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>S5 E14 &#8211; AI Security and Privacy Protections, AI &#038; Cyber Liability, and Keeping Your Data Safe</title>
		<link>https://advancedbenefitconsulting.com/s5e14-ai-security-privacy-protection-cyber-liability-and-data-safety/</link>
		
		<dc:creator><![CDATA[Orange County Benefits Expert]]></dc:creator>
		<pubDate>Tue, 20 Feb 2024 14:00:09 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Data Breaches & Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Season 5]]></category>
		<category><![CDATA[ai]]></category>
		<category><![CDATA[ai danger]]></category>
		<category><![CDATA[ai dataprivacy]]></category>
		<category><![CDATA[ai for benefits]]></category>
		<category><![CDATA[ai security]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[chatgpt]]></category>
		<guid isPermaLink="false">https://advancedbenefitconsulting.com/?p=10295</guid>

					<description><![CDATA[<p>The post <a href="https://advancedbenefitconsulting.com/s5e14-ai-security-privacy-protection-cyber-liability-and-data-safety/">S5 E14 &#8211; AI Security and Privacy Protections, AI &amp; Cyber Liability, and Keeping Your Data Safe</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><a href="https://advancedbenefitconsulting.com/s5e14-ai-security-privacy-protection-cyber-liability-and-data-safety">https://advancedbenefitconsulting.com/s5e14-ai-security-privacy-protection-cyber-liability-and-data-safety</a></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_2">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1200" height="1200" src="https://advancedbenefitconsulting.com/wp-content/uploads/BER-S5E14-1200.jpg" alt="artificial intelligence legal considerations" title="BER S5E14 1200" srcset="https://advancedbenefitconsulting.com/wp-content/uploads/BER-S5E14-1200.jpg 1200w, https://advancedbenefitconsulting.com/wp-content/uploads/BER-S5E14-1200-980x980.jpg 980w, https://advancedbenefitconsulting.com/wp-content/uploads/BER-S5E14-1200-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" class="wp-image-10298" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_11  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><em>Part 2 in our Series on Artificial Intelligence</em></p>
<p>In this episode, host Dorothy Cociu discusses with Eric Barricklow, Adriana Mendieta and Marilyn Monahan the importance of AI Security and Privacy Protections, AI &amp; Cyber Liability, and Keeping Your Data Safe. Artificial Intelligence has left many companies wondering about what is needed to use the efficiencies of AI, but not compromise the privacy and security of the company and employees’ data. How can you do both? We will discuss the impact of workflow and production, the use of proper security and approval channels, and the dangers of using ChatGPT and other AI programs, and how those dangers can be minimized. We will also discuss the use of AI in Benefits Administration and the largest concerns related to privacy &amp; security of data when using AI from an administrative, legal, and IT perspective, as well as a discussion on policies and procedures for AI. Join us for this informative podcast!</p></div>
			</div><div id="s5e13-show-notes" class="et_pb_module et_pb_text et_pb_text_12  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Show Notes</h2>
<p>&nbsp;</p>
<p><a href="https://advancedbenefitconsulting.com/wp-content/uploads/Show-Notes-S5-E14-Presenation-Slides-Excerpts.pdf">Excerpt Presentation Slides from AI January 2024 Lunch &amp; Learn Event</a></p>
<p><a href="https://advancedbenefitconsulting.com/wp-content/uploads/Artificial-Intelligence-Terminology.pdf">Show Notes &#8211; Artificial Intelligence Terminology</a></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_4">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://podcasters.spotify.com/pod/show/benefitsexecroundtable/embed/episodes/S5-E14---AI-Security-and-Privacy-Protections--AI--Cyber-Liability--and-Keeping-Your-Data-Safe-e2g06r4" height="102px" width="400px" frameborder="0" scrolling="no"></iframe></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://advancedbenefitconsulting.com/s5e14-ai-security-privacy-protection-cyber-liability-and-data-safety/">S5 E14 &#8211; AI Security and Privacy Protections, AI &amp; Cyber Liability, and Keeping Your Data Safe</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>S4E7 &#8211; Cybersecurity; The Need Is Here to Stay + Tips for Keeping Your Data Safe</title>
		<link>https://advancedbenefitconsulting.com/s437-cybersecurity-need-is-here-to-staytips-to-keeping-data-safe/</link>
		
		<dc:creator><![CDATA[Healthcare Benefits Specialist]]></dc:creator>
		<pubDate>Tue, 18 Oct 2022 13:00:20 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Data Breaches & Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Season 4]]></category>
		<category><![CDATA[Adriana Mendieta]]></category>
		<category><![CDATA[Cyber Liability]]></category>
		<category><![CDATA[cyber liability insurance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Awareness Month]]></category>
		<category><![CDATA[cybersecurity task force]]></category>
		<category><![CDATA[Dorothy Cociu]]></category>
		<category><![CDATA[how to mitigate your risk]]></category>
		<category><![CDATA[Keeping Your Data Safe]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://advancedbenefitconsulting.com/?p=8284</guid>

					<description><![CDATA[<p>The post <a href="https://advancedbenefitconsulting.com/s437-cybersecurity-need-is-here-to-staytips-to-keeping-data-safe/">S4E7 &#8211; Cybersecurity; The Need Is Here to Stay + Tips for Keeping Your Data Safe</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_13  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><a href="https://advancedbenefitconsulting.com/s437-cybersecurity-need-is-here-to-stay+tips-to-keeping-data-safe">https://advancedbenefitconsulting.com/s437-cybersecurity-need-is-here-to-stay+tips-to-keeping-data-safe</a></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_3">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1000" height="1000" src="https://advancedbenefitconsulting.com/wp-content/uploads/S4E7-cybersecurity-podcast-part-2.jpg" alt="s4e7 cybersecurity podcast part 2" title="S4E7-cybersecurity-podcast-part-2" srcset="https://advancedbenefitconsulting.com/wp-content/uploads/S4E7-cybersecurity-podcast-part-2.jpg 1000w, https://advancedbenefitconsulting.com/wp-content/uploads/S4E7-cybersecurity-podcast-part-2-980x980.jpg 980w, https://advancedbenefitconsulting.com/wp-content/uploads/S4E7-cybersecurity-podcast-part-2-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1000px, 100vw" class="wp-image-8290" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_14  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In Part 2 of our Two-Part Series on Cybersecurity during Cybersecurity Awareness Month, Host Dorothy Cociu interviews Adriana Mendieta, Cybersecurity and Cyber Liability Coverage Expert, on the current state of the Cyber World… whether it’s harmful hacks or ransomware, everyone is at risk for a cyber attack.  Adriana shares her thoughts as a Database Manager, member of a federal government cybersecurity task force, and cyber liability agent.  We discuss the latest trends and how to mitigate your risk.  Join us for part 2 of this informative series on cybersecurity!</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_15  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Show Notes</h2>
<ul>
<li><a href="https://advancedbenefitconsulting.com/wp-content/uploads/Show-Notes-S4-E6-7.pdf" rel="attachment wp-att-8255">Show Notes &#8211; S4 E6 &amp; 7</a></li>
<li><a href="https://advancedbenefitconsulting.com/wp-content/uploads/Privacy-Training-Flyer-10-22-Final-2-locations-w-CE-1.pdf" rel="attachment wp-att-8256">Privacy Training Flyer Oct 18 &amp; Nov 2, 2022</a></li>
</ul></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_6">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://anchor.fm/benefitsexecroundtable/embed/episodes/S4E7---Cybersecurity-The-Need-Is-Here-to-Stay--Tips-for-Keeping-Your-Data-Safe-e1p9116" height="102px" width="400px" frameborder="0" scrolling="no"></iframe></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://advancedbenefitconsulting.com/s437-cybersecurity-need-is-here-to-staytips-to-keeping-data-safe/">S4E7 &#8211; Cybersecurity; The Need Is Here to Stay + Tips for Keeping Your Data Safe</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>S4E6 &#8211; Data Security Risks and Importance of Cybersecurity, Part 1</title>
		<link>https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1/</link>
		
		<dc:creator><![CDATA[Healthcare Benefits Specialist]]></dc:creator>
		<pubDate>Tue, 11 Oct 2022 13:00:01 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Data Breaches & Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Season 4]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data hack]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[email phishing]]></category>
		<category><![CDATA[HIPAA compliance]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[solutions]]></category>
		<category><![CDATA[training]]></category>
		<guid isPermaLink="false">https://advancedbenefitconsulting.com/?p=8252</guid>

					<description><![CDATA[<p>The post <a href="https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1/">S4E6 &#8211; Data Security Risks and Importance of Cybersecurity, Part 1</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_16  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><a href="https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1">https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1</a></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_4">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1000" height="1000" src="https://advancedbenefitconsulting.com/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1.jpg" alt="podcast s4e6 cybersecurity part 1" title="Podcast S4E6 Cybersecurity part 1" srcset="https://advancedbenefitconsulting.com/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1.jpg 1000w, https://advancedbenefitconsulting.com/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1-980x980.jpg 980w, https://advancedbenefitconsulting.com/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1000px, 100vw" class="wp-image-8257" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_17  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In part 1 of this two part series, host Dorothy Cociu interviews Ted Mayeshiba and Ted Flittner of Aditi Group, an IT Technology, HITECH, Electronic Security and Cybersecurity firm on the current threats in electronic security, cybersecurity and the importance of risk assessments and training employees to protect your electronic data.  We discuss the recent cyber and ransomware attacks and trends, the risks of remote employees and how to mitigate them, and overall electronic security tips.  Join us for this informative podcast during Cybersecurity Awareness Week!</p>
<p><span data-offset-key="e5j8k-0-0"> </span></p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_18  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Show Notes</h2>
<ul>
<li><a href="https://advancedbenefitconsulting.com/wp-content/uploads/Show-Notes-S4-E6-7.pdf" rel="attachment wp-att-8255">Show Notes &#8211; S4 E6 &amp; 7</a></li>
<li><a href="https://advancedbenefitconsulting.com/wp-content/uploads/Privacy-Training-Flyer-10-22-Final-2-locations-w-CE-1.pdf" rel="attachment wp-att-8256">Privacy Training Flyer Oct 18 &amp; Nov 2, 2022</a></li>
</ul></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_8">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://anchor.fm/benefitsexecroundtable/embed/episodes/S4E6---Data-Security-Risks-and-Importance-of-Cybersecurity--Part-1-e1p2a1k" height="102px" width="400px" frameborder="0" scrolling="no"></iframe></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1/">S4E6 &#8211; Data Security Risks and Importance of Cybersecurity, Part 1</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</title>
		<link>https://advancedbenefitconsulting.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/</link>
		
		<dc:creator><![CDATA[Orange County Benefits Expert]]></dc:creator>
		<pubDate>Fri, 06 May 2022 21:45:07 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Cal Broker]]></category>
		<category><![CDATA[Data Breaches & Cyber Security]]></category>
		<category><![CDATA[Feature Article]]></category>
		<category><![CDATA[Published Articles]]></category>
		<category><![CDATA[The STATEment]]></category>
		<category><![CDATA[Aditi Group]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[California Broker]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[risk assessment]]></category>
		<guid isPermaLink="false">https://advancedbenefitconsulting.com/?p=6454</guid>

					<description><![CDATA[<p>The post <a href="https://advancedbenefitconsulting.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_19  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>By:  Dorothy Cociu, RHU, REBC, GBA, RPA</h2>
<p>&nbsp;</p></div>
			</div><div class="et_pb_button_module_wrapper et_pb_button_0_wrapper et_pb_button_alignment_center et_pb_module ">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://advancedbenefitconsulting.com/wp-content/uploads/Cybersecurity-2-0-5-2022-ABC-Version.pdf">Download Article (pdf)</a>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_1_3 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_20  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Read this article in the <a href="https://www.calbrokermag.com/in-this-issue/cybersecurity-2-0/" target="_blank" rel="noopener">Cal Broker June 2022 issue</a></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_5">
				
				
				
				
				<a href="https://www.calbrokermag.com/in-this-issue/cybersecurity-2-0/" target="_blank"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="600" height="781" src="https://advancedbenefitconsulting.com/wp-content/uploads/caifornia-brokerjune-2022-cyber-security-2.jpg" alt="California Broker article Cybersecurity 2.0" title="caifornia-broker=june-2022-cyber-security-2" srcset="https://advancedbenefitconsulting.com/wp-content/uploads/caifornia-brokerjune-2022-cyber-security-2.jpg 600w, https://advancedbenefitconsulting.com/wp-content/uploads/caifornia-brokerjune-2022-cyber-security-2-480x625.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" class="wp-image-7220" /></span></a>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_21  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Read the <a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank" rel="noopener">STATEment May / June 2022 issue</a></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_6">
				
				
				
				
				<a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="400" height="517" src="https://advancedbenefitconsulting.com/wp-content/uploads/CAHU-Statement-May-June-2022_400.jpg" alt="CAHU Statement May-June 2022 issue" title="CAHU Statement May-June 2022_400" srcset="https://advancedbenefitconsulting.com/wp-content/uploads/CAHU-Statement-May-June-2022_400.jpg 400w, https://advancedbenefitconsulting.com/wp-content/uploads/CAHU-Statement-May-June-2022_400-232x300.jpg 232w" sizes="(max-width: 400px) 100vw, 400px" class="wp-image-6465" /></span></a>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_22  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Read the <a href="https://digitaleditions.walsworth.com/publication/?m=35782&#038;i=751536&#038;p=22&#038;pre=1&#038;ver=html5" target="_blank" rel="noopener">Benefit Specialist July 2022 issue</a></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_7">
				
				
				
				
				<a href="https://digitaleditions.walsworth.com/publication/?m=35782&#038;i=751536&#038;p=22&#038;pre=1&#038;ver=html5" target="_blank"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="600" height="788" src="https://advancedbenefitconsulting.com/wp-content/uploads/americas-benefit-specialist-july-2022-600.jpg" alt="America&#039;s Benefit Specialist July 2022 with ABC" title="americas-benefit-specialist-july-2022-600" srcset="https://advancedbenefitconsulting.com/wp-content/uploads/americas-benefit-specialist-july-2022-600.jpg 600w, https://advancedbenefitconsulting.com/wp-content/uploads/americas-benefit-specialist-july-2022-600-480x630.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" class="wp-image-7814" /></span></a>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_23  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>It’s been about a year since we were all on pins and needles about cyber-attacks and the news that Colonial Pipeline, JBS Foods and many others had been breached and their data held for ransom, which resulted in gas shortages and price hikes in the East and meat and food shortages everywhere, followed by the 4<sup>th</sup> of July weekend, 2021 cyber-attack against the software company Kaseya, which targeted many small companies in up to 17 countries, including the US, United Kingdom, South Africa, Canada, Argentina, Mexico, Kenya and Germany.  Cybersecurity experts believe the REvil gang, which is a major Russian-speaking ransomware syndicate, was behind the attack, targeting the software company by using its network-management package as a means to spread the ransomware broadly through cloud-service providers.  Luckily, the software company was able to shut it down quickly, but not before significant damage was done. </p>
<p>When I wrote my last article on this topic, “Cyber Attacks Hit Home…. The Next National Emergency?</p>
<p>Valuable Cybersecurity Tools to Keep You Safe,” published in <strong><u>The Statement</u>, July/August, 2021  </strong>page 5, at: <a href="https://camsdev.net/CAHU/Magazine/July-August-2021/index.html">https://camsdev.net/CAHU/Magazine/July-August-2021/index.html</a> and <strong><u>California Broker</u>, August, 2021 </strong><a href="https://www.calbrokermag.com/in-this-issue/cyber-attacks-hit-home-the-next-national-emergency/">https://www.calbrokermag.com/in-this-issue/cyber-attacks-hit-home-the-next-national-emergency/</a><span>, </span> I detailed how these attacks happened and gave some advice on how to keep your organization safe, as did many others, yet since then, we are still seeing the same issues popping up in the news on a far-too-regular basis… Breaches, hacks, cyber-attacks,  ransomware…<em>Why does this keep happening?</em>  Because for many people, unless and until it happens to them, they put off doing what they know they need to do… <em>because it can’t happen to them, right?</em>  <strong>WRONG!</strong>  <em>It can, and it’s not a matter of “if” – it’s usually a matter of “when” it happens to you.  Your company… Your data… in the hands of someone that shouldn’t have access to it… And then it’s too late.  Your business is literally shut down.  Your systems are basically dead.  You’re scrambling to either restore from backups, pay the ransom, notify the authorities and the victims, and in all cases, you’re retracing your work, putting in hundreds of man hours (or thousands), or paying millions of dollars in crypto or other currencies, all to get your hands on what is already yours – your data!</em>  </p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_24  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>How many times do you have to read about this stuff… hear about it on the news…  listen to people who had it happen to them, before you actually do something to prevent it from happening to you?  What’s the number?  Ten?  Thirty?  One Hundred?  More?</p>
<p>Let’s do a little review first on what has happened since early 2021….  Just in summary:</p>
<ul>
<li>Colonial Pipeline &#8211; $4.4 million paid (but 64 bitcoin (approximately $2.3 million, was recovered by the US Government from a virtual wallet – the only known recovery to date of significance) – resulted in severe gas shortages, long lines and extremely high prices all over the East Coast.</li>
<li>JBS Foods, reportedly paid $11 million from the Memorial Weekend, 2021 attack, which caused sever meat shortages in an already pinched supply chain during the pandemic.</li>
<li>Kaseya Software hack occurred affecting customers in approximately 17 countries.</li>
<li>Microsoft Exchange Server Breach in early 2021, giving attackers full access to user emails and passwords on affected servers, <a href="https://en.wikipedia.org/wiki/Superuser">administrator privileges</a>on the server, and access to connected devices on the same network. As of March, 2021, it was estimated that 250,000 servers fell victim to the attacks, including servers belonging to around 30,000 organizations in the United States, 7,000 servers in the United Kingdom, as well as the <a href="https://en.wikipedia.org/wiki/European_Banking_Authority">European Banking Authority</a>, the <a href="https://en.wikipedia.org/wiki/Storting">Norwegian Parliament</a>, and Chile&#8217;s Commission for the Financial Market (CMF).</li>
</ul>
<p>Healthcare and insurance providers have of course been a huge target for cyber-attacks.  We’ve heard of Anthem to Primera Blue Cross, Mass General, Cottage Health, UMass, Scripts and more, all falling victims to cyber criminals.  It’s commonly felt that healthcare and medical information is susceptible to cyber-attacks because of the amount of highly sensitive data that they possess.  Of course, the medical and insurance industries are subject to privacy and security laws such as HIPAA Security and HITECH, so there is a standard for protecting information.  But as I said in my last article on this, there is no single federal law regulating cybersecurity or information security.  We have a hodgepodge of state laws and minor federal laws, but no single protection source, as they do in the European Union and other nations.</p>
<p>Lately, it seems, mobile banking is among the latest victims, including Bank of America and Wells Fargo customers being scammed from outsiders using the mobile banking app Zelle to steal money from their accounts; and worse yet, the customers themselves allowed it to happen, because they thought they were talking to their banks, and instead of stopping it, they basically allowed the Zelle hackers to take money directly from their accounts.</p>
<p>Another very scary security scenario, in my opinion, is everyone’s use of QR Codes.  They’ve become all the rage to use… but they are also susceptible to hacking, which I will discuss further later in this article.</p>
<p>And let’s not forget Mobile Ticketing and the requirement of season ticket holders and individual game purchasers to download their team’s league app, without thinking twice about it and not questioning the permissions they are granting, which can be a security nightmare.</p>
<p>So, for anyone reading this, it’s not over.  That storm I talked about last summer and fall in my article referenced above has not passed.  If we thought we were in the eye of that storm then, I hate to be the bearer of bad news, but it’s more than a season of continuing storms with no clear skies ahead as far as the trend for more cyber-attacks and ransomware, <em>because most of us are allowing the bad guys to keep doing it!</em></p>
<p>As long as we still have that Weakest Link I discussed in the previous article &#8211; Human Beings- we will always have risks, and we need to learn how to manage those risks, now and in the long-run.  Until we do, we will continue to hear news reports on breaches and ransomware, and companies will continue to be at risk.</p>
<p>I will provide you with some more detail on these recent breaches, hacks, scams and current risks you should be aware of below.</p>
<p><strong>Microsoft Breach by Lapsus$ Hacker Group, March 2022</strong></p>
<p>Just this past March, Microsoft announced it was breached by Lapsus$ Hacker Group…  News reports said that a screenshot was taken indicating that Bing, Cortana and other projects had been compromised in this breach.</p>
<p>As I often do, I looked to my HIPAA Security/HITECH and IT Services and Security partners, Aditi Group, to offer some insight from an IT or technical perspective as to what happened, if there is anything Microsoft users need to be worried about, or things they need to do to protect themselves.  I was able to gain some additional insight to share with you in my conversations with Ted Flittner and Ted Mayeshiba, principals of Aditi Group.</p>
<p>“This group has also just successfully attacked T-Mobile and a growing list of big-name companies,” stated Ted Flittner.  “What happened with Microsoft is that hackers allegedly stole portions of source code for the search service Bing, and the navigation for Bing Maps and Cortana (Microsoft’s answer to Siri).  Microsoft’s public statement is that obtaining portions of source code <em>does not</em> put the general public at risk.”</p>
<p>Flittner continued: “In truth, knowing the code can increase risk by allowing hackers to scrutinize it and find weaknesses that Microsoft hasn’t found or fixed.  Since these services (Bing, Maps, Cortana) don’t require user login info, there probably is not a risk.”</p>
<p><strong>Block (Formerly Square) Breach, April, 2022</strong></p>
<p>More recently, Block (formerly Square) acknowledged that its Cash App had been breached by a former employee in December, 2021.  It’s reported that over 8 million customers were affected.  The breach included customer names, brokerage account numbers, portfolio information and stock trading activity.  They are claiming that no other personally identifiable information or account credentials were leaked in the incident.  What is the danger of this sort of breach?  Again, I went to my tech experts.</p>
<p>“This a straightforward case of a former employee still able to log into Cash App’s system and download user reports,” stated Flittner.  “These are the same reports the employee was authorized to view while still working there.  Even if no personally identifiable info was accessed, the data that was downloaded is PRIVATE info that people only want to share with their tax accountant or investment advisor.  That sort of info helps criminals pick which people to target in phishing scams.  Think Frank Abagnale Jr, the real-life person played by Leonardo De Caprio in “Catch me if you can.”  Frank just needed some info about people to pretend to be them…and scam money.”</p>
<p><strong>T-Mobile Breach</strong></p>
<p>I also discussed the recent T-Mobile attack by Lapsus$, since it was the same hacker group as the Microsoft hack, with Ted Flittner, and asked him to let us know what happened and how it happened.</p>
<p>“The T-Mobile attack by Lapsus$ did not breach customer data directly.  T-Mobile has had its share of that, including a breach of 47 million customers’ personal data in 2021.  This Lapsus$ attack involved BUYING T-Mobile employee VPN (virtual private network) login info.  These were purchased on the dark web with the goal of escalating and accessing T-Mobile’s account management system and ultimately allowing hackers to “SIM swap.”  That’s when you tell the phone company that the phone number is now tied to a different SIM card.  This lets someone hijack your cell phone.  And if your cell phone is used for account verification – text messages for example, the hacker now can bypass multifactor authentication.”</p>
<p>Flittner continued: “Though hackers didn’t get far enough this time, it highlights the problem of phone numbers being hacked.  And why we recommend using multifactor authentication with a hardware key – like Yubico.”</p>
<p><strong>Are Banking Apps Safe?  </strong></p>
<p>The world of banking has evolved to the now “must have” banking apps on your mobile devices.  Banks need to draw new customers, and many of them are young and tech-savy.  They’ve literally grown up on the technology some of us are still trying to adapt to in our everyday lives.</p>
<p>Zelle is used by many banks in the USA today for easy transferring and sending money.  These banks include Bank of America, Capitol One, Wells Fargo, US Bank, JP Morgan Chase and PNC bank.  Of course, Apple also offers their Apple Bank mobile app, and there are many more.  But are they safe?</p>
<p>I briefly described earlier the recent scams using Zelle that cost customers of Bank of America and Wells Fargo hundreds to thousands of dollars as scammers spoofed the banks’ phone numbers and the customers were sent text messages, followed by a phone call, which informed them of an attempt to transfer funds.  As a “preventive measure” the scammers gave instructions to the customers which instead sent their funds off to the scammers.  The banks are not actually obligated to replace the money in their accounts if their customers authorized the money to be transferred, which in these instances happened.</p>
<p>So how do we keep our money safe if we’re using banking apps on our mobile devices?  To assist me with this question, I once again went to Aditi Group, to give you more information from the tech side.</p>
<p>“These banking scams are really using age old tactics: pretending to be someone they’re not,” stated Ted Flittner.  “The callers use false Caller ID for the phone call and text messages to innocent bank customers.   They SAY they’re from Wells Fargo or BoA or another of the most common banks.  Some people have been fooled into divulging their account credentials ‘to avoid attempted fraud.’ And in the process they ALLOW the fraud.”</p>
<p>Flittner continued: “This is not a failure by the application.  This is a failure to understand how a fraud investigation really works.  The financial institution doesn’t ask for your login credentials.  But when you call them, they ask you to verify who you are – name, birthdate, address, last 4 numbers of your of social security number.  We all need to be sure WHO we’re talking to on the other end of the line.  Is it the BANK or a SCAMMER?  We recommend always calling them back.  Check the number they give you and see if it matches the phone number on the back or your credit card or the bank.  It not, call the phone number you KNOW for your bank and ask about it.”  That is something that we’ve encouraged people to do for several years.</p>
<p>“Banking Apps are as safe as using web browser normally,” continued Flittner.  “Potential security problems include logging into apps when others can see you, or working on public wifi, where hackers may have obtained access to your phone or computer.  Other problems are the general ones that apply whether it’s a mobile app or web browser on a computer, like using weak passwords or leaving your password around for others to find.  And with phones, leaving them unattended without a strong password to keep others from doing bad things while you’re not looking.”</p>
<p><strong>The Risks of Using QR Codes</strong></p>
<p>QR Codes are all the rage… If you don’t have one and you’re trying to advertise something, you feel like if you don’t have one, you’ll be left behind and lose out to your competitors… And now it’s not just advertising… QR codes can be found everywhere now…   The problem is, they too can be compromised.  Thieves and bad actors have begun placing their own QR codes over the originals and sending your phones to unsafe sites where again, bad things can happen.  Keep in mind, a QR code uses the phone’s camera… therefore it needs access to your camera, and will often ask for (and people automatically give) permission to view all of your files and photos on your device.  <em>Wait, what?  All of your photos and all of your files?</em>  Are your company files in dropbox, which you can access from your phone?  Are your emails from your customers, or their private information such as their names, phone numbers, account numbers, maybe credit card number in those files on your phone?  If so, do you want every entity that you scan a QR code for to have all of that information?  If not, you might want to think twice about using QR codes without scrutinizing them.</p>
<p>Again, I went back to my tech experts to provide some more detail from the technology side.</p>
<p>“Look before you leap,” stated Flittner.  “Does the QR code look legit or is it like sticker graffiti on a traffic light pole?  If it looks like someone pasted a sticker on the original, stop.”  It sounds simple, but many people just don’t stop to take that second look, and that is a real problem.</p>
<p>“If you do scan the code, look at the website address (URL) that it shows before agreeing to load the page. Only use the QR code read apps or camera apps that let you choose to visit the website or not, instead of having it load automatically,” continued Flittner.  “Once it loads, look at the website to be more certain it’s real before you enter any personal data, credit card or sensitive info.”</p>
<p><strong>Mobile Ticketing Apps</strong></p>
<p>Whether you’re a concert-goer or a sports fan, or anything in-between, it’s likely your event is now using Mobile Ticketing only.  The problem with mobile ticketing apps is that they can be unsafe because people don’t always look at the permissions they are granting to the app when using, and automatically clicking yes to accept the terms without looking further or questioning the app’s intentions.</p>
<p>My company has season tickets for the Anaheim Ducks (NHL) and the LA Rams (NFL), and both have mobile ticketing… But me being me, and being worried about the dangers of mobile apps, always asks the team if I can get paper tickets.  Yes, it’s old-fashioned, but much safter.  Sometimes if you ask there is no charge to getting paper tickets.  Sometimes you have to pay a paper ticket fee, but to me, it’s worth it.  Why?  What’s so scary about these apps?</p>
<p>I’ve seen these apps asking <em>for permission to access your files, your photos, and get this, your <strong>network access</strong></em> in these apps.  So, before you start clicking ok for all of these permissions you’re granting them, you need to slow down and figure out how to see all of the permission requests and how to say no to what they do not need and what you do not want to give them access to.  If you’re not sure, contact an IT or security expert.</p>
<p>Another option is to have a second phone; one for business and one for things like mobile ticketing apps.  For the latter, don’t store anything on the second phone.  Use it only for those concerts or sporting events.  (But yes, that can be expensive to have 2 phones – see if a very limited plan can be used for the latter).</p>
<p><strong>Crypto Currency</strong></p>
<p>Crypto currency is the latest rage… Everyone wants it, even buildings now display their names, but no one is regulating it.  In January, 2022, it was reported that $30 Million was stolen in the Crypto.com breach.  ($18 million in bitcoin and $15 million in Ethereum, as well as other cryptocurrencies).   I asked Aditi Group if they could tell us more about crypto currency and the dangers of using it, and if people are buying it and trading with it, is there anything that can be done to protect them?</p>
<p>“There are probably THOUSANDS of crypto currency offerings now,” stated Flittner.  “It takes very little to create one and make it public.  And without regulation and with investor frenzy over potential profits to be made, it’s easy to get caught up in emotion and skip due diligence<em>.  Simply from an investment perspective, crypto investing is gambling.  It can pay off for you or wipe your savings.  </em></p>
<p>“From a security perspective, it requires smart and strong password management.  The main path of breach is someone getting your login and password to your crypto wallet.   Guard those passwords.  Make them as strong as possible,” warned Flittner.</p>
<p>“Crypto.com, which is a crypto trading platform, was breached by hackers and discovered this January. Hackers were able to bypass the 2-factor authentication for user accounts and 483 accounts were accessed and $30 M in bitcoin and etherium (crypto coin) was stolen.  Cryto.com reimbursed the user accounts and stopped other attempted transfers.  They have since announced stronger ‘multi-factor’ authentication coming this year,” stated Flittner.</p>
<p>“Part of the risk with crypto is once it’s stolen, you may have no recourse,” continued Flittner.  “Crypto.com is rolling out a new Worldwide Account Protection Program that can insure your account up to $250,000 – if you meet certain conditions.” So if you’re thinking of investing in crypto currency, be sure you do your homework and put in the necessary security protocols before you invest.</p>
<p><strong>How Do We Protect Ourselves and Our Companies?</strong></p>
<p>So how do we protect ourselves from these common threats?  As a privacy &amp; security consultant and trainer, my first instruction is always to DO A RISK ASSESSMENT.  You need to figure out where your risks are before you can mitigate those risks.  You need to know where you are before you can move forward with a security plan.</p>
<p>“This is all about being aware of danger before it strikes,” stated Flittner.  “And preparing to reduce risk and recover faster if it does.”</p>
<p><strong><em>The Need for Risk Assessments – An Ongoing Security Tool</em></strong></p>
<p>Every article I write about this topic and every training I do includes my preaching to you all about the need to do Risk Assessments.  This means you must look at every device, every tool, every router, your network, and everything else to determine where the risks are, and figure out how to mitigate those risks.</p>
<p>According to Ted Flittner, “In basic terms, this is a comprehensive review of you or your business to consider what risks you may face (stolen computer, ransomware attack, even physical break-in), what inherent vulnerabilities you have (staff bringing their own computers, work at home, out of date software), the likelihood of each type of problem actually happening, and the impact if they do.  Then we decide which items are really critical to address, less serious, and on down.  Sometimes we conclude that chances are LOW that a problem happens, but the IMPACT would be catastrophic, so we take steps to avoid or easily recover (think Life Insurance).”</p>
<p>Flittner continued: “The result should be ACTION to address the dangers.  HIPAA and HITECH require it for businesses that fall under HIPAA.  And it’s often mentioned by the federal investigators as missing or lacking in HIPAA violations.”</p>
<p>Identifying technical vulnerabilities to include in their risk analysis, according to OCR in their March 17, 2022 Newsletter, “OCR Cybersecurity Newsletter: Defending Against Common Cyber Attacks,” (which I’ll mention again below and include the link to view it), include the following: </p>
<ul>
<li>subscribing to Cybersecurity and Infrastructure Security Agency (CISA) alerts (<a href="https://us-cert.cisa.gov/ncas/alerts">https://us-cert.cisa.gov/ncas/alerts</a><span>) </span>and bulletins; (<a href="https://us-cert.cisa.gov/ncas/bulletins">https://us-cert.cisa.gov/ncas/bulletins</a><span>)</span></li>
<li>subscribing to alerts from the HHS Health Sector Cybersecurity Coordination Center (HC3);<sup>   </sup>(<a href="https://www.hhs.gov/about/agencies/asa/ocio/hc3/contact/index.html">https://www.hhs.gov/about/agencies/asa/ocio/hc3/contact/index.html</a><span>)</span></li>
<li>participating in an information sharing and analysis center (ISAC) or information sharing and analysis organization (ISAO);</li>
<li>implementing a vulnerability management program that includes using a vulnerability scanner to detect vulnerabilities such as obsolete software and missing patches; and</li>
<li>periodically conducting penetration tests to identify weaknesses that could be exploited by an attacker.</li>
</ul>
<p>&nbsp;</p>
<p>Regulated entities, according to OCR, should not rely on only one of the above techniques, but rather should consider a combination of approaches to properly identify technical vulnerabilities within their enterprise.  Once identified, assessed, and prioritized, appropriate measures need to be implemented to mitigate these vulnerabilities (<em>e.g.,</em> apply patches, harden systems, retire equipment).</p>
<p>How often should a Risk Assessment be done?  According to Ted Flittner: “We recommend a yearly review or when major changes happen with the business.”</p>
<p>Who should be involved in a Risk Assessment?  Is it just IT?  “Risks involve the whole team,” stated Flittner.  “Key supporters of Risk Assessments should include executives, especially financial leadership.  But really, everyone should be involved in some way.”</p>
<p>What are some of the areas in an organization that need to be looked at in a risk assessment?  Again, I went to Aditi Group for their comments.  “Everywhere that sensitive info moves throughout your business,” replied Flittner. “This could just be one department like Human Resources, or it could affect everyone.”</p>
<p>What sort of questions, tasks, need to be included in a Risk Assessment?  Ted Mayeshiba of Aditi Group responded as follows: “Physical inventory &#8211; what devices hold sensitive data (PHI in HIPAA terminology).  Important questions include:  ‘Where does the data reside?  What’s in ‘the cloud’ with 3<sup>rd</sup> party companies?  Who should access the sensitive info?  And how do you control access?  Is there a BA agreement in place?  Does the 3rd party company have access to the data?’    All of these should be considered and discussed within your organization.”</p>
<p>We always recommend that a Risk Assessment be done by an independent third party.  Why?  “Three main reasons: first it’s not the main job of employees, so it rarely gets priority; second, outside eyes tend to notice problems that people who see the process every day can miss (can’t see the forest through the trees in front of them); and third, employees sometimes are reticent to admit to weaknesses in the process,” stated Flittner.</p>
<p>I asked Ted Flittner what message he would share with every business owner, large or small, related to Risk Assessments and their importance in protecting their data?  Ted replied: “Know before it’s too late.  Be Prepared.  As a former Boy Scout, I learned to live by the motto long ago.   Security is always evolving and where you didn’t think you have risk in the past may be totally different today.  And the cost of problems like data breaches and ransomware are much higher than the cost of prevention.”</p>
<p><strong><em>Weak Cybersecurity Practices</em></strong></p>
<p>It is well known that a regulated entity that has weak cybersecurity practices makes itself an attractive soft target for hackers and cyber criminals.  Weak authentication requirements are frequent targets of successful cyber-attacks (over 80% of breaches due to hacking involved compromised or brute-forced credentials, according to OCR).  (Verizon. <em>2020 Data Breach Investigations Report</em>. (2020, p. 19). Retrieved from <a href="https://enterprise.verizon.com/resources/reports/2020/2020-data-breach-investigations-report.pdf">https://enterprise.verizon.com/resources/reports/2020/2020-data-breach-investigations-report.pdf</a><span>).</span></p>
<p>Weak password rules and single factor authentication are among the practices that can contribute to successful attacks.  Once inside an organization, if the entity has weak access controls, this can further contribute to an attacker’s ability to compromise systems by accessing privileged accounts, moving to multiple computer systems, deploying malicious software, and exfiltrating sensitive data.</p>
<p>HIPAA rules state that regulated entities are required to verify that persons or entities seeking access to ePHI are who they claim to be by implementing authentication processes. (<em>See</em> 45 CFR 164.312(d): Standard: Person or Entity Authentication) A regulated entity’s risk analysis should guide its implementation of appropriate authentication solutions to reduce the risk of unauthorized access to ePHI.  For example, authenticating users that access a regulated entity’s systems remotely (<em>e.g</em>., working from home) may present a higher level of risk to a regulated entity’s ePHI than users logging into their desktop computer at work.  To appropriately reduce the higher level of risk of remote access, a regulated entity may consider implementing stronger authentication solutions, such as multi-factor authentication.</p>
<p>According to OCR’s March 17<sup>th</sup> newsletter, implementing access controls that restrict access to ePHI to only those requiring such access is also a requirement of the HIPAA Security Rule.  (<em>See</em> 45 CFR 164.312(a)(1): Standard: Access Control.) Here, too, the risk analysis should guide the implementation of appropriate access controls.  For example, a regulated entity may determine that because its privileged accounts (<em>e.g.,</em> administrator, root) have access that supersedes other access controls (<em>e.g.,</em> role- or user-based access) – and thus can access ePHI, the privileged accounts present a higher risk of unauthorized access to ePHI than non-privileged accounts.  Not only could privileged accounts supersede access restrictions, they could also delete ePHI or even alter or delete hardware or software configurations, rendering devices inoperable.  To reduce the risk of unauthorized access to privileged accounts, the regulated entity could decide that a privileged access management (PAM) system is reasonable and appropriate to implement.  A PAM system is a solution to secure, manage, control, and audit access to and use of privileged accounts and/or functions for an organization’s infrastructure.  A PAM solution gives organizations control and insight into how its privileged accounts are used within its environment and thus can help detect and prevent the misuse of privileged accounts.</p>
<p>Regulated entities should periodically examine the strength and effectiveness of their cybersecurity practices and increase or add security controls to reduce risk as appropriate.  Regulated entities are required to periodically review and modify implemented security measures to ensure such measures continue to protect ePHI. (<em>See</em> 45 CFR 164.306(e): Maintenance.) Further, regulated entities are required to conduct periodic technical and non-technical evaluations of implemented security safeguards in response to environmental or operational changes affecting the security of ePHI to ensure continued protection of ePHI and compliance with the Security Rule. (See 45 CFR 164.308(a)(8): Standard: Evaluation.) Examples of environmental or operational changes could include: the implementation of new technology, identification of new threats to ePHI, and organizational changes such as a merger or acquisition.  But even if you’re not a HIPAA Covered Entity, these practices should apply to any organization due to the many other state and federal privacy and security rules, and as a matter or overall good business practice to keep your organization’s data safe.</p>
<p><strong>New Federal Guidance on Defending Against Common Cyber-Attacks</strong></p>
<p>In the past few months, both the IRS and HHS’s Office of Civil Rights have issued guidance and newsletters for HIPAA Covered Entities on keeping you safe against common cyber threats.  I’ll try to highlight some of the most important tips.  I would suggest you read the HHS Office for Civil Rights In Action March 17, 2022 Newsletter, “OCR Cybersecurity Newsletter: Defending Against Common Cyber Attacks,” which I mentioned above.  It can be found at:  <a href="https://www.hhs.gov/hipaa/for-professionals/security/guidance/cybersecurity-newsletter-first-quarter-2022/index.html">https://www.hhs.gov/hipaa/for-professionals/security/guidance/cybersecurity-newsletter-first-quarter-2022/index.html</a>.  In addition, the IRS published several releases in February, 2022, to protect tax payers from scams and fraudulent activity (<a href="https://www.irs.gov/newsroom/irs-warning-scammers-work-year-round-stay-vigilant">https://www.irs.gov/newsroom/irs-warning-scammers-work-year-round-stay-vigilant</a>), , as well as announcing a transition away from the use of third-party verification involving facial recognition (<a href="https://www.irs.gov/newsroom/irs-announces-transition-away-from-use-of-third-party-verification-involving-facial-recognition">https://www.irs.gov/newsroom/irs-announces-transition-away-from-use-of-third-party-verification-involving-facial-recognition</a>).  I will attempt to summarize some of the more important items discussed in these publications and provide additional commentary.  I also want to point out that since we don’t have a single national entity regulating all forms of electronic and cybersecurity, even if you’re not a covered entity under HIPAA rules, the HIPAA Security and HITECH rules are very effective in protecting your organization from all types of electronic and cybersecurity threats.  Simply, it’s all we have, for the most part, so use those rules to your advantage.</p>
<p><strong><em>Phishing, Spear Phishing and Whaling</em></strong></p>
<p>As discussed in my last article, one of the most common attack vectors is Phishing.  This is a type of cyber-attack that is used to trick individuals into divulging sensitive information via electronic communications, such as by email, or by impersonating a trustworthy source.  According to HHS, a recent report noted that 42% of ransomware attacks in Q2 of 2021 involved phishing.</p>
<p>If you’re subject to HIPAA Security and HITECH (meaning you are a HIPAA Covered Entity, such as a sponsor of a health plan, an insurance company or a provider of health care services) your workforce members should understand that they have an important role in protecting the ePHI of their organization from cyber-attacks, according to OCR.  Part of that role involves being able to detect and take appropriate actions if someone in your organization encounters a suspicious email.  The problem is, if they are not trained to detect suspicious emails, they will go unnoticed, and bad things generally tend to happen as a result.  These regulated entities should train their workforce (there is that word again… train…) to recognize phishing attacks and implement a protocol on what to do when such attack or suspected attack occurs.  Do you have such protocols in place in your organization?  Do your employees know who they are supposed to report suspicious emails to in your organization?  Is anyone assigned to be that person or department?</p>
<p>Ted Mayeshiba of Aditi Group had these words to share.  “In the latest Office of Civil Rights Newsletter, the government has tipped their hand as to the raising of the threshold of ‘reasonable efforts’ for evaluating companies `’best efforts’ defending against common cyber-attacks.  There is a new and repeated reference to ‘penetration attacks’ as a best practice which should be adopted by companies.”</p>
<p>Ted Mayeshiba continued: “Penetration testing is usually a third party outside attack on your company’s network by ‘friendly’ forces that test weaknesses in your network.  This is really nothing new, this is done by Fortune 500 firms.  It is the first time that we’ve witnessed this idea put forth in a regular OCR Cybersecurity Newsletter.  Of particular interest was the reference to tie cybersecurity training programs with a follow up with friendly ‘phishing’, ‘spear phishing’ and ‘whaling’ attacks to test the effectiveness of the training.  As attacks become more frequent and target even ‘small’ firms, it is becoming increasingly urgent to tighten cybersecurity for all firms.”</p>
<p>According to Mayeshiba, “‘phishing’ is a type of social engineering attack commonly used to steal user data including login credentials or other financial data.  It commonly occurs when an attacker, masquerading as a trusted entity, dupes a victim into revealing sensitive information by opening an email, link or text message.  ‘spear phishing’ is similar to phishing, but the attack includes specific information unique to the individual being attacked, thereby increasing the likelihood of the victim opening the email, link or text message.”</p>
<p>Another term not mentioned in the OCR Newsletter is ‘whaling’.  Mayeshiba defines this as “similar to phishing, but the attack is specific to executives (C-suite) or to others where the bad actor masquerades as the executive to coerce a trusted employee to divulge sensitive information.”</p>
<p>According to the HIPAA Security Rule, regulated entities are required to implement awareness and training programs to all its workforce members, and such programs should be an ongoing and evolving process, so that it changes as new threats develop.  Your management personnel should also be participating in training… I’ve seen far too often that they want their employees to be trained, but the executives fail to go through it themselves, and then when they are targeted, which they often are, because they have access to a generally a higher amount of ePHI in phishing email attacks, they don’t follow protocols, and they often are the reason for such schemes resulting in bad things happening.</p>
<p>The key to an effective security training program is repetition and periodic security reminders.  In fact The Security Rule includes an addressable provision for such reminders.  Are you doing this within your organization?</p>
<p>OCR suggests in their newsletter that covered entities should, for example, send simulated phishing emails to your workforce members to gauge the effectiveness of their security awareness and training program and offer additional, targeted training where necessary.  An educated workforce can be an effective first line of defense and an integral part of a regulated entity’s strategy to defend, mitigate, and prevent cyber-attacks.</p>
<p>In my opinion, the worst type of training you can provide is a canned, “check-the-box” training consisting of a few simple presentation slides.  It’s best to think of interesting, innovative ways to engage your workforce to understand the risks and prevent cyber-attacks.</p>
<p>OCR suggests that regulated entities can mitigate the risk of phishing attacks by implementing anti-phishing technologies.  This could mean examining and verifying that received emails do not originate from known malicious sites.  If an email is suspected of being a threat, it can be blocked and appropriate personnel can be notified to step in and deal with the threat head-on.  Other approaches, according to OCR, can involve scanning web links or attachments included in the emails for potential threats and removing them if a threat is detected.  Newer techniques can leverage machine learning or behavioral analysis to detect potential threats and block them as appropriate.</p>
<p>The key is developing and implementing “policies and procedures to protect ePHI from improper alteration or destruction.”  It’s important to note that the Security Rule requires regulated entities to assess and reduce risks and vulnerabilities to the availability of ePHI, as well as confidentiality and integrity.</p>
<p>Anti-phishing technologies can impede or deny the introduction of malware that may attempt to improperly alter, destroy, or block authorized access to ePHI (for example, ransomware), and thus can be a helpful tool to preserve the integrity and availability of ePHI, according to OCR.</p>
<p>It is always advisable to combine an educated, engaged workforce with technical solutions in order to achieve the best opportunity to reduce or prevent phishing attacks.</p>
<p><strong><em>Exploiting Known Vulnerabilities</em></strong></p>
<p>I think most of you know and understand that hackers can penetrate an entity’s network and gain access to ePHI or other sensitive data by exploiting known vulnerabilities, where it is publicly known to exist.  The National Institute of Standards and Technology (NIST) maintains the National Vulnerability Database (NVD), which provides information about known vulnerabilities.  Exploitable vulnerabilities can exist in many parts of your information technology infrastructure, such as on your server, your desktop, mobile device operating systems, applications, databases, your web software, your router, your firewalls, and other device firmware.  Often known vulnerabilities can be mitigated by applying vendor patches or upgrading to a newer version.  If a patch or upgrade isn’t available from the vendor, they may suggest actions you can take to mitigate a newly discovered vulnerability.  These could include modifications of configuration files or disabling affected services.</p>
<p>It’s important to remember that older applications or devices may no longer be supported with patches for new vulnerabilities, so you will need to take appropriate action if a newly discovered vulnerability affects older applications or devices.  If an obsolete and unsupported system cannot be upgraded or replaced, then additional safeguards must be implemented or existing safeguards enhanced to mitigate the known vulnerabilities until an upgrade or replacement can occur.  This may involve increasing access restrictions, removing or restricting the old device from network access, or disabling unnecessary features or services.</p>
<p>The bottom line is, you need to do a risk analysis to determine these potential risks and vulnerabilities.  Not once, but often and on an ongoing basis.</p>
<p><strong>Read, Sink In, Repeat – The Need for Continued Training</strong></p>
<p>Although I discussed this in detail in my first article, I do want to touch on it again… It’s imperative that employers take the time to train their employees on the electronic risks that are out there, because if you don’t, it only takes one wrong click on an emailed link to download malware, worms or other things that can bring your systems to a screeching halt.  As Ted Flittner stated in that article, “Know company policies and why it matters to follow them.   The key topic these days is email diligence.  Don’t click on email links or download files that you don’t really know.  Slow down and take time to scrutinize.  Teach people how to recognize fakes and legitimate messages,” he stated.  “And train people on how to react if malware, ransom, or phishing attempts succeed.  Who should they call and what should they do next?  That seems to be one of the glaring missing pieces in most employers’ privacy policies.”</p>
<p>Bottom line, train now and train often.  You can never train enough.  Things change, and so should your training.  Keep up to date and keep up with the latest threats.</p>
<p><strong>Same Message, Different Result?</strong></p>
<p>Although to some extent I am sharing with you the same message as my prior article from 2021, I’m hoping for, someday soon, a different result.  We don’t need to keep repeating the same mistakes and putting off for tomorrow something that should have been done yesterday.  The only way to have a different result, a better result, with less hacks, less cyber-attacks, is to do what you know you need to do<em>.  Do a risk assessment</em>.  See where you are and where you want to be and develop policies and procedures to help you meet your goals.  And don’t forget to train your employees regularly and often, keeping up to date with the latest threats.  I’d like to think that perhaps someday soon I won’t have to keep writing these articles every year….  So  let’s work on a different result, please!</p>
<p><strong><em>Authors Note</em></strong>:  I’d like to thank Ted Flittner and Ted Mayeshiba of Aditi Group for their assistance with this article.  I can be reached at Advanced Benefit Consulting, <a href="mailto:dmcociu@advancedbenefitconsulting.com">dmcociu@advancedbenefitconsulting.com</a>, or by phone at 714 693-9754 x 3.  Ted Flittner and Ted Mayeshiba can be reached at AditiGroup.com, or by email at <a href="mailto:ted.flittner@aditigroup.com">ted.flittner@aditigroup.com</a> or <a href="mailto:ted.mayeshiba@aditigroup.com">ted.mayeshiba@aditigroup.com</a>. Advanced Benefit Consulting &amp; Aditi Group offer privacy &amp; security training, consultation and implementation system assistance, as well as Risk Assessment services on an ongoing basis.</p>
<p><strong><em>Dorothy Cociu is the President of Advanced Benefit Consulting, Anaheim, CA, and the current Vice President, Communications, of the California Agents &amp; Health Insurance Professionals (CAHIP) 2021-2022.  </em></strong></p>
<p><strong><em>References &amp; Sources:</em></strong></p>
<p>HHS Office of Civil Rights March 17, 2022 Newsletter, “OCR Cybersecurity Newsletter: Defending Against Common Cyber Attacks.”</p>
<p>IRS publications February, 2022:  (<a href="https://www.irs.gov/newsroom/irs-warning-scammers-work-year-round-stay-vigilant">https://www.irs.gov/newsroom/irs-warning-scammers-work-year-round-stay-vigilant</a>) and (<a href="https://www.irs.gov/newsroom/irs-announces-transition-away-from-use-of-third-party-verification-involving-facial-recognition">https://www.irs.gov/newsroom/irs-announces-transition-away-from-use-of-third-party-verification-involving-facial-recognition</a>).</p>
<p>Plus sources referenced above in the article.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://advancedbenefitconsulting.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>S3E13 &#8211; The Importance of a Business Electronic Risk Assessment in Today’s Cyber World</title>
		<link>https://advancedbenefitconsulting.com/s3e13-importance-of-business-electronic-risk-assement-in-todays-cyber-world/</link>
		
		<dc:creator><![CDATA[Healthcare Benefits Specialist]]></dc:creator>
		<pubDate>Tue, 08 Feb 2022 14:00:24 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Data Breaches & Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Season 3]]></category>
		<category><![CDATA[Aditi Group]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[electronic data]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[IT consulting]]></category>
		<category><![CDATA[IT service]]></category>
		<category><![CDATA[Los Angeles]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[risk assessment. business continuity]]></category>
		<guid isPermaLink="false">https://advancedbenefitconsulting.com/?p=6045</guid>

					<description><![CDATA[<p>The post <a href="https://advancedbenefitconsulting.com/s3e13-importance-of-business-electronic-risk-assement-in-todays-cyber-world/">S3E13 &#8211; The Importance of a Business Electronic Risk Assessment in Today’s Cyber World</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_25  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><a href="https://advancedbenefitconsulting.com/s3e13-importance-of-business-electronic-risk-assement-in-todays-cyber-world">https://advancedbenefitconsulting.com/s3e13-importance-of-business-electronic-risk-assement-in-todays-cyber-world</a></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_8">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="800" src="https://advancedbenefitconsulting.com/wp-content/uploads/BER-BER-S3E13-Risk-Assessments-800.jpg" alt="risk assessments for electronic data security - season 3 episode 13" title="S3E13 Risk Assessments" srcset="https://advancedbenefitconsulting.com/wp-content/uploads/BER-BER-S3E13-Risk-Assessments-800.jpg 800w, https://advancedbenefitconsulting.com/wp-content/uploads/BER-BER-S3E13-Risk-Assessments-800-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-6048" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_26  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Host Dorothy Cociu interviews Ted Flittner and Ted Mayeshiba, principals of Aditi Group, an IT services and consulting firm, on the importance of a Business Electronic Risk Assessment in today’s cyber world. We examine the applications of HIPAA and other privacy laws, plus the day-to-day business needs across all industries, in protecting business data against breaches, cyber-attacks, and ransomware, and the importance of business continuity amidst all of these risks. This podcast is a must for COOs, CEOs, Risk Managers, IT Professionals and many others invested in protecting their organization’s data. Learn the importance of conducting regular risk assessments and how to start the process.</p></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_10">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://anchor.fm/benefitsexecroundtable/embed/episodes/S3E13---The-Importance-of-a-Business-Electronic-Risk-Assessment-in-Todays-Cyber-World-e1eo0n5" height="102px" width="400px" frameborder="0" scrolling="no"></iframe></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_27  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Show Notes</h3>
<p><em><strong>Security Risk Assessment Tool (SRA Tool)</strong></em><br />Aditi Group mentioned this onine resource from the Federal goverment  This Risk Assessment Tool is small software program that is offered for free and is intended to help guide groups that want to conduct their own risk assessment.   Office of the National Coordinator for Health Information Technology (ONC) and HHS Office for Civil Rights (OCR) created this to help guide small and medium sized organizations through required risk assessment, per HIPAA.</p>
<p><a href="http://www.healthit.gov/topic/privacy-security-and-hipaa/security-risk-assessment-tool">http://www.healthit.gov/topic/privacy-security-and-hipaa/security-risk-assessment-tool</a></p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://advancedbenefitconsulting.com/s3e13-importance-of-business-electronic-risk-assement-in-todays-cyber-world/">S3E13 &#8211; The Importance of a Business Electronic Risk Assessment in Today’s Cyber World</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>S3E2 &#8211; Cybersecurity Part 2</title>
		<link>https://advancedbenefitconsulting.com/s3e2-cybersecurity-part-2/</link>
		
		<dc:creator><![CDATA[Healthcare Benefits Specialist]]></dc:creator>
		<pubDate>Tue, 21 Sep 2021 13:00:00 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Data Breaches & Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Season 3]]></category>
		<category><![CDATA[Aditi Group]]></category>
		<category><![CDATA[Bruce Benton]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[electronic hacking]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[HIPAA Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Public Affairs of the California Association of Health Underwriters]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[risk analysis]]></category>
		<category><![CDATA[Ted Flittner]]></category>
		<category><![CDATA[Ted Mayshiba]]></category>
		<category><![CDATA[travel]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[weakest link]]></category>
		<guid isPermaLink="false">https://advancedbenefitconsulting.com/?p=5502</guid>

					<description><![CDATA[<p>The post <a href="https://advancedbenefitconsulting.com/s3e2-cybersecurity-part-2/">S3E2 &#8211; Cybersecurity Part 2</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_28  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><a href="https://advancedbenefitconsulting.com/s3e2-cybersecurity-part-2">https://advancedbenefitconsulting.com/s3e2-cybersecurity-part-2</a></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_9">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="800" src="https://advancedbenefitconsulting.com/wp-content/uploads/benefits-roundtable-podcast-S3E1-Cybersecurity-part2.jpg" alt="Benefits Executive Roundtable podcast S3E1 Cyberseurity part 2" title="benefits-roundtable-podcast-S3E1-Cybersecurity-part2" srcset="https://advancedbenefitconsulting.com/wp-content/uploads/benefits-roundtable-podcast-S3E1-Cybersecurity-part2.jpg 800w, https://advancedbenefitconsulting.com/wp-content/uploads/benefits-roundtable-podcast-S3E1-Cybersecurity-part2-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-5505" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_29  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">In Part 2 of this 2-Part Podcast, Host Dorothy Cociu continues her discussions with Ted Mayeshiba and Ted Flittner, Principals of Aditi Group, an IT Security/HIPAA Security/Cybersecurity firm, and Bruce Benton, a life and health and P&#038;C agent, and Vice President, Public Affairs of the California Association of Health Underwriters on how to be better protected against Cyber Attacks.  We discuss how to stay safe while traveling, working from home risks, potential new cybersecurity regulations, the importance of proper training, and we look at Cyber Liability Insurance and why it’s so important today.  </div>
			</div><div class="et_pb_module et_pb_code et_pb_code_11">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://anchor.fm/benefitsexecroundtable/embed/episodes/S3E2---Cybersecurity-Part-2-e17bq2b" height="102px" width="400px" frameborder="0" scrolling="no"></iframe></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://advancedbenefitconsulting.com/s3e2-cybersecurity-part-2/">S3E2 &#8211; Cybersecurity Part 2</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>S3E1 &#8211; Cybersecurity Part 1</title>
		<link>https://advancedbenefitconsulting.com/s3e1-cybersecurity-part-1/</link>
		
		<dc:creator><![CDATA[Healthcare Benefits Specialist]]></dc:creator>
		<pubDate>Tue, 14 Sep 2021 13:00:32 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Data Breaches & Cyber Security]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Season 3]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Aditi Group]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[electronic hacking]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[HIPAA Security]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Public Affairs of the California Association of Health Underwriters]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[risk analysis]]></category>
		<category><![CDATA[Ted Flittner]]></category>
		<category><![CDATA[Ted Mayshiba]]></category>
		<category><![CDATA[travel]]></category>
		<category><![CDATA[VPN]]></category>
		<category><![CDATA[weakest link]]></category>
		<guid isPermaLink="false">https://advancedbenefitconsulting.com/?p=5652</guid>

					<description><![CDATA[<p>The post <a href="https://advancedbenefitconsulting.com/s3e1-cybersecurity-part-1/">S3E1 &#8211; Cybersecurity Part 1</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_30  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><a href="https://advancedbenefitconsulting.com/s3e1-cybersecurity-part-1">https://advancedbenefitconsulting.com/s3e1-cybersecurity-part-1</a></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_10">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="800" src="https://advancedbenefitconsulting.com/wp-content/uploads/benefits-roundtable-podcast-S3E1-Cybersecurity-part1.jpg" alt="Benefits Executive Roundtable podcast S3E1 Cyberseurity part 1" title="benefits-roundtable-podcast-S3E1-Cybersecurity-part1" srcset="https://advancedbenefitconsulting.com/wp-content/uploads/benefits-roundtable-podcast-S3E1-Cybersecurity-part1.jpg 800w, https://advancedbenefitconsulting.com/wp-content/uploads/benefits-roundtable-podcast-S3E1-Cybersecurity-part1-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-5497" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_31  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">In Part 1 of this 2-Part Podcast, host Dorothy Cociu interviews Ted Mayeshiba and Ted Flittner, Principals of Aditi Group, an IT Security / HIPAA Security / Cybersecurity firm about the importance of Cybersecurity and how employers can protect themselves. Bruce Benton, a life and health and P&#038;C agent, and Vice President, Public Affairs of the California Association of Health Underwriters is also on-hand. In Part 1, we discuss the growing trend of electronic hacking and cyber attacks that have affected nearly every type of industry, and more specifically, on recent cyber attacks that have had a serious impact on consumers and our infrastructure, and we talk about what companies can do to stay safe and try to avoid these types of attacks. We discuss what happened in some of the cases that hit the news, and we talk about what companies can do to stay safe and try to avoid these types of attacks. We will focus heavily on the “weakest link” – your own employees, and how to protect your company’s critical data.</div>
			</div><div class="et_pb_module et_pb_code et_pb_code_12">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://anchor.fm/benefitsexecroundtable/embed/episodes/S3E1---Cybersecurity-Part-1-e17agnu" height="102px" width="400px" frameborder="0" scrolling="no"></iframe></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://advancedbenefitconsulting.com/s3e1-cybersecurity-part-1/">S3E1 &#8211; Cybersecurity Part 1</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Attacks Hit Home &#8211; The Next National Emergency?  Valuable Cybersecurity Tools to Keep You Safe</title>
		<link>https://advancedbenefitconsulting.com/cyber-attacks-hit-home-the-next-national-emergency-and-valuable-cybersecurity-tools-to-keep-you-safe/</link>
		
		<dc:creator><![CDATA[Orange County Benefits Expert]]></dc:creator>
		<pubDate>Tue, 13 Jul 2021 14:51:42 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Cal Broker]]></category>
		<category><![CDATA[Data Breaches & Cyber Security]]></category>
		<category><![CDATA[Feature Article]]></category>
		<category><![CDATA[Published Articles]]></category>
		<category><![CDATA[The STATEment]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[national security]]></category>
		<guid isPermaLink="false">https://advancedbenefitconsulting.com/?p=3998</guid>

					<description><![CDATA[<p>By:&#160; Dorothy Cociu, President, Advanced Benefit Consulting &#38; Insurance Services, Inc.CAHU Vice President, Communications Read Article in August issue of California Broker Read Article in Jul-Aug issue of The STATEment Read in Oct issue of America&#8217;s Benefit Specialist Most of us are still licking our wounds from COVID-19.&#160; For the past nearly 18 months, we’ve [&#8230;]</p>
<p>The post <a href="https://advancedbenefitconsulting.com/cyber-attacks-hit-home-the-next-national-emergency-and-valuable-cybersecurity-tools-to-keep-you-safe/">Cyber Attacks Hit Home &#8211; The Next National Emergency?  Valuable Cybersecurity Tools to Keep You Safe</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">By:&nbsp; Dorothy Cociu, President, Advanced Benefit Consulting &amp; Insurance Services, Inc.<br>CAHU Vice President, Communications</h3>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<p class="has-text-align-center"><a href="https://www.calbrokermag.com/in-this-issue/cyber-attacks-hit-home-the-next-national-emergency/" target="_blank" rel="noreferrer noopener nofollow">Read Article in August issue of California Broker</a></p>



<div class="wp-block-image"><figure class="aligncenter size-full"><a href="https://www.calbrokermag.com/in-this-issue/cyber-attacks-hit-home-the-next-national-emergency/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" width="600" height="760" src="https://advancedbenefitconsulting.com/wp-content/uploads/Cal-Broker-Cover-August-2021-600.jpg" alt="Cal Broker August 2021 published article" class="wp-image-5568" srcset="https://advancedbenefitconsulting.com/wp-content/uploads/Cal-Broker-Cover-August-2021-600.jpg 600w, https://advancedbenefitconsulting.com/wp-content/uploads/Cal-Broker-Cover-August-2021-600-480x608.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" /></a></figure></div>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<p class="has-text-align-center"><a href="https://camsdev.net/CAHU/Magazine/July-August-2021/" target="_blank" rel="noreferrer noopener nofollow">Read Article in Jul-Aug issue of The STATEment</a></p>



<div class="wp-block-image"><figure class="aligncenter size-full"><a href="https://camsdev.net/CAHU/Magazine/July-August-2021/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" width="600" height="776" src="https://advancedbenefitconsulting.com/wp-content/uploads/CAHU-Statement-July-August-2021.jpg" alt="CAHU The STATEment July-August 2021 Cybersecurity article" class="wp-image-4002" srcset="https://advancedbenefitconsulting.com/wp-content/uploads/CAHU-Statement-July-August-2021.jpg 600w, https://advancedbenefitconsulting.com/wp-content/uploads/CAHU-Statement-July-August-2021-480x621.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" /></a></figure></div>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow">
<p class="has-text-align-center"><a href="https://www.omagdigital.com/publication/?m=35261&amp;i=723016&amp;p=10&amp;ver=html5" target="_blank" rel="noreferrer noopener">Read in Oct issue of America&#8217;s Benefit Specialist</a></p>



<div class="wp-block-image"><figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="600" height="788" src="https://advancedbenefitconsulting.com/wp-content/uploads/cyber-attacks-article-Americas-Benefit-Specialist-1021-600.jpg" alt="America's Benefit Specialist" class="wp-image-5704" srcset="https://advancedbenefitconsulting.com/wp-content/uploads/cyber-attacks-article-Americas-Benefit-Specialist-1021-600.jpg 600w, https://advancedbenefitconsulting.com/wp-content/uploads/cyber-attacks-article-Americas-Benefit-Specialist-1021-600-480x630.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" /></figure></div>
</div>
</div>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow"></div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow"></div>
</div>



<p>Most of us are still licking our wounds from COVID-19.&nbsp; For the past nearly 18 months, we’ve all lost so much.&nbsp; From illness and death of family members and loved ones to the loss of income, food insecurity and massive amounts of stress, to dealing with zoom learning for kids, and doing our jobs from home, we’ve been hurting.&nbsp; Most of us were looking forward to the predicted 2021 improvements, with vaccines available now for all who want them, infections down, and travel beginning to see a new life.&nbsp; By June 15, 2021, California opened up its economy, and we had hope.&nbsp; Yes, our income may still be lower than pre-pandemic levels and some may still be struggling, but for the first time in so many months, we saw a glimmer of optimism and confidence that the future could be bright again.&nbsp;</p>



<p>However, just as we were beginning to smile more, feel comfortable going out to eat at our favorite restaurants with family and friends, and for many, hugging our parents for the first time in over a year, another cloud has begun hanging over our heads.&nbsp; And at times, the cloud turned to pouring rain and then bolts of lightning…&nbsp; A new national emergency seems to be claiming our freedoms and our hopes and dreams.&nbsp; This time, the emergency isn’t about a virus.&nbsp; It isn’t about quarantine or loneliness.&nbsp; It’s about blatant attacks on our infrastructure, our pipelines, our airports, our healthcare, our food supply, our power plants, and our business operations.&nbsp; This enemy isn’t a single germ or microorganism or pathogen.&nbsp; It’s a seemingly widespread and growing network of hackers and cyber criminals who exploit our weaknesses to infiltrate our networks and databases, quite often for profit.&nbsp; In some cases, it’s just simply about knowing they can, and rattling our nerves.&nbsp; But often, in cases like Colonial Pipeline, JBS Foods and many others, it’s about holding data hostage, and demanding cash payment or bitcoin in amounts of tens of millions of dollars, just so that companies can get their systems back up and running.&nbsp; And what has the Federal Government often recommended when someone is hit with ramsomware?&nbsp; Quite often, agencies such as the FBI has said simply, “Pay it.”&nbsp;</p>



<p>The only good thing that these recent nationally reported attacks have done is raise awareness, which I am grateful for.&nbsp; The question is, <em>what will it take for people to take this seriously?</em>&nbsp; East coast residents saw the results first-hand with the closure of gas stations, and when they could finally find gas, there were miles-long lines waiting for the limited supply, and high prices (although sadly, those prices were often still less than what we pay daily in California for gas for our vehicles).&nbsp; We’ve all felt it in the raising of food prices, particularly meat prices, in our grocery stores, and in the inability to get the goods and services we need when we need them.&nbsp; As if last year’s toilet paper shortage wasn’t bad enough… I’m not sure if our nerves can handle food and gas shortages for long periods of time…</p>



<p>This storm has not passed.&nbsp; In fact, the clouds are darkening and gaining strength; at times it feels as though we’re in the eye of the storm, and at other times, just on the outskirts.&nbsp; No matter where you are, you can still feel the rainfall, the humidity, the ferocious winds.&nbsp; With limited laws and no national, combined effort to combat it, the storm will rage on, until we all take control and stop it ourselves.</p>



<p><strong>The Weakest Link</strong></p>



<p>The problem is, in the simplest of terms, that systems can only be as secure as their weakest link.&nbsp; In most cases, the weakest link is <em><u>us</u></em>… Yes, the most common denominator is human beings.&nbsp; Humans are, as we all know, <em>human.&nbsp; </em>We make mistakes, and we sometimes have short-term memories.&nbsp; If not constantly reminded of something, we forget. Or at times, we just ignore, because it’s easier.&nbsp; In many cases, we simply aren’t properly trained to protect one of our most valuable company assets… <em>our data</em>.&nbsp;</p>



<p>In many instances, it has taken only a single individual, perhaps someone highly respected who cares greatly about their job and the company they work for, to take down an organization, although perhaps unknowingly.&nbsp; It may only take one misstep to throw the organization into turmoil, and subject it to a cyber attacker who is demanding millions of dollars…. Can it be avoided?&nbsp; Yes, but at what cost?</p>



<p>Generally, the cost is doing a proper risk assessment, understanding your risks, and doing something to mitigate those risks.&nbsp; The cost is ramping up your network and database security, and the cost is taking the time, energy and effort to do one thing… Properly train your employees.&nbsp; In most cases, many of the largest breaches in the United States and across the world may have been avoided, if only the organization had spent some time, energy and financial resources protecting themselves with these steps.</p>



<p><strong>Federal &amp; State Laws &amp; Regulations Overview</strong></p>



<p>Unlike other nations, such as the European Union, the United States has no single federal law regulating cybersecurity or information security.&nbsp; Although several states have cybersecurity and data breach laws, one of the few federal laws we have is HITECH, which came out of the American Recovery &amp; Reinvestment Act in 2009, which ramped up HIPAA Security, and protects the electronic medical information of an individual. In addition to HIPAA Medical Records Privacy &amp; Security and HITECH, we have the federal law of GLBA (Gramm-Leach Bliley Act), which protects financial information within banks, financial institutions, mortgage companies, insurance companies, and by extension, agents.&nbsp; We also have little known federal Computer Fraud and Abuse Act (CFAA) for prosecuting cybercrime, Sarbanes-Oxley (applies to public companies), and the Federal Trade Commission (FTC),which, since 2002, has assumed a leading&nbsp;role&nbsp;in policing corporate&nbsp;cybersecurity&nbsp;practices. In that time, it has brought more than 60 cases against companies for unfair or deceptive practices that endanger the personal data of consumers. Also on the federal side, we have the Children’s Online Privacy Protections Act (COPPA) and the FDA regulations for the use of electronic records in clinical investigations and a few other little known federal privacy protections.&nbsp; But, there is no single regulation or oversight.&nbsp; There is a hodge-podge of laws, and often the government agencies don’t work together to fight cyber crime as other nations have.&nbsp;</p>



<p>Here in California, we have even more privacy laws in effect, including the Confidentiality of Medical Information Act, Confidentiality of Social Security Numbers, a Data Breach Notification Law, a Customer Records law, and of course the California Consumer Privacy Act (CCPA), to name a few.&nbsp;</p>



<p>Even though some of these laws, including HITECH, require electronic security, is that enough?&nbsp; <em>Sadly, recent history has proven it is not. </em>&nbsp;Even with these federal and state requirements, we continue to see hospital after hospital, medical group after medical group, and individual medical practitioners fail to fully implement the security measures required by federal and state laws.&nbsp; We see multiple businesses in all industries subjected to ransomware, and their email, their data files and more are held for ransom.&nbsp; Nearly every week, we are hearing in the news of another cyberattack that has slowed down meat production, fuel for automobiles and aircraft, and more.</p>



<p>I’ve been preaching (and teaching, in seminars, webinars, on podcasts, writing articles, etc.) HIPAA Privacy &amp; Security protections since 2002, just prior to the effective date of HIPAA Medical Records Privacy, which went into effect in 2003 or 2004, along with HIPAA Security in 2005.&nbsp; When I wrote my HIPAA Manual in 2000 and updated it beginning 2002 and for many years after with all of the Privacy &amp; Security applications, I did my best to teach people how to protect their companies, mostly in terms of physical and administrative security… From teaching them to lock paper records down, double-protect SSNs and mental health information, to assist them with creating written policies and procedures and create their internal processes, and of course I did privacy training all over the country…&nbsp; HIPAA Security in 2005 brought to it the electronic component, so again, I did the rounds and wrote about it, taught seminars, helped employers and providers with implementation.&nbsp; It wasn’t until HITECH in 2009, however, that it was taken somewhat seriously, when HHS and OCR started treating business associates the same as covered entities, and when penalties and enforcement ramped up, that we began to understand the importance of protecting our data. &nbsp;It was in 2009 that even I, who had been doing privacy &amp; security training for 7 years at that point, knew I was out of my league, and had to find technology partners to assist with the complexities of HITECH, because, after all, it’s all about IT functions and technology.&nbsp; Yes, it was taken more seriously, but not seriously enough.&nbsp; And today, it’s not just about medical records.&nbsp; It’s about our internal systems, our personal and business financial information, people stealing identities, and now, it’s about having our data ripped from our systems and held in the hands of an invisible enemy.&nbsp; Even with these federal and state requirements, we continue to see data hacked and often, companies just pay up, because they knew the risks, but failed to take the necessary steps.&nbsp; To many, it was an understanding that it could happen, but an unwillingness to do the work, invest the funds, and implement strong company-wide policies to secure data.&nbsp; To some of those, they felt it was worth the risk.&nbsp; Pay now or pay later- and choosing to put off what could have helped them avoid the dangers of today’s cyber-crimes.&nbsp; Some of those are indeed paying later.&nbsp; Much more than they may have wanted or imagined, because the wide-spread thought process is, <em>it can’t happen to me</em>.&nbsp; We’re starting to realize now that <em>it can</em>.&nbsp;</p>



<p>In 2021, the “new normal” is being reminded almost daily about the current storm, the new national emergency (in my words, not the official government’s words), and that is cybercrime.&nbsp; We need strong cybersecurity measures to combat that emergency.&nbsp; The question is, are you willing to do what it takes to protect yourselves and your company’s data?</p>



<p><strong>The First Steps Toward Data Protection</strong></p>



<p>Now that this new national emergency is among us, what are we going to do to stop it, or at least slow it down, get a handle on it, and try to eventually end it?&nbsp;</p>



<p>First, take a step back and evaluate where you are.&nbsp; When was the last time you did a complete risk analysis – a true risk assessment &#8211; for your organization, including physical, technical and administrative security?&nbsp; Have you ever?&nbsp; Have you evaluated your systems, done mock trials to find weaknesses?&nbsp; Or have you turned your back on it, thinking ‘we’ll get to it someday.’?&nbsp; Well, folks, some day is here, and you need to take action now, or you could be the next victim of cybercrimes.&nbsp;</p>



<p><strong><em>Some Real-World Actions To Keep You Safe</em></strong></p>



<p>To share additional perspectives rather than mine, I brought in some reputable industry experts to assist me in this article; Ted Mayeshiba (Ted M.) and Ted Flittner (Ted F.), principals of Aditi Group, a Technology and IT Services and Consulting firm (and in full disclosure, my company’s technology partners), and Zach Ayta, Director of Partnerships and Sidd Gavirneni, CEO and Co-Founder of Zeguro, a Cybersecurity consulting and Cybersecurity Insurance company.&nbsp;</p>



<p><strong>Recent Ransomware Attacks in the News (Colonial Pipeline &amp; JBS)</strong></p>



<p>My first question to them was this…Recent large ramsomware attacks like Colonial Pipeline and JBS Foods have shown us that hackers are exploiting security weaknesses and holding the data of many companies hostage, and often demanding millions of dollars to unlock their own data, which in turn, has shut down supplies for critical goods and services.&nbsp;&nbsp;&nbsp; Can you explain to us, in layman’s terms, just what we mean when we say ransomware is a form on malware targeting systems?&nbsp; What exactly do these malicious actors do in these situations?</p>



<p>“Ransomware is simply encryption software loaded onto your machine or network, which is NOT of your choosing,” stated Ted Mayeshiba (Ted M.).&nbsp; “It was loaded onto your machine by a bad actor.&nbsp; The bad actor then encrypts all of the data on your system so you can’t read it.&nbsp; Their request to you is if you ever want to read or use any of your files again, pay them and they will give you instructions to decrypt the files.”&nbsp;</p>



<p>Sidd Gavirneni of Zeguro was asked the same question, and responded as follows:&nbsp; “<a href="https://www.zeguro.com/blog/ransomware-what-smbs-should-know">Ransomware</a> has become increasingly prominent in recent years and has<a href="https://www.zeguro.com/blog/ransomware-on-the-rise-during-the-pandemic-what-to-know"> grown significantly during the COVID-19 pandemic</a>, with new ransomware samples<a href="https://www.prnewswire.com/in/news-releases/covid-19-pandemic-sparks-72-ransomware-growth-mobile-vulnerabilities-grow-50--817268901.html"> growing by 72%</a> in the first six months of 2020. This type of malware encrypts data in an information system and demands payment in exchange for regaining access. The payment is commonly demanded in cryptocurrencies due to their untraceable nature. Though the malicious actors claim that they will unencrypt data after the ransom is paid, there is no guarantee that users will receive the decryption key, and according to the<a href="https://www.cisecurity.org/blog/ransomware-facts-threats-and-countermeasures/"> Center for Internet Security</a> (CIS), one ransomware variant deletes files even if the ransom has been paid.”</p>



<p>I do want to point out that, as you may have heard in the news, that U.S. authorities have recovered millions of dollars in digital currency that was paid to the hackers who were responsible for the east coast fuel pipeline attack, the Colonial Pipeline.&nbsp; According to the Wall Street Journal (updated June 7, 2021, by Dustin Volz, Sadie Gurman and David Uberti), investigators seized approximately 64 bitcoin, which is valued at approximately $2.3 million, from a virtual wallet.&nbsp; This particular attack was carried out by a suspected Russian-based criminal gang, according to the Justice Department.&nbsp; It was reported that Colonial paid $4.4 million to the hackers because they were unsure how badly the cyberattack had breached its systems or how long it would take them to bring the pipeline back online.&nbsp;</p>



<p>This was the first (at least that I’ve heard of) time that the US government has actually been successful in getting part of the paid ransom blocked on a major case, so I would not count on the government to help every company out there.&nbsp; This one affected our fuel supply and started a media frenzy, and people were desperately looking for fuel for their vehicles, and frankly, that type of publicity is not good for a somewhat new Administration in Washington, so I’m sure there was immense pressure to do something to show US strength in fighting cybercrime.&nbsp; What about the other attacks?&nbsp; Did the government step in for those?&nbsp; Most of the time, the answer to this date has been no.&nbsp; You need to rely on yourselves, and avoid it from happening in the first place.</p>



<p><strong>Public Entities Are Not Exempt from Hackers</strong></p>



<p>Public entities have also been breached, such as Steamship Authority of Massachusetts, the Washington DC Metro Police, the University of California, Michigan State University and others.&nbsp; People are wondering how they are supposed to protect their data when these large public entities aren’t even able to protect theirs.&nbsp; What are some basic things that can be done to protect your company’s data, and how do we convince organizations that this is serious?&nbsp; Again, I went to experts for answers.</p>



<p>“How do you protect yourself? This is malware, so you use all good hygiene practices we’ve spoken about on many occasions, like our trainings and in our podcasts.&nbsp; You must keep your software and browsers up to date, use Multi Factor Authentication, and most importantly, don’t click on links you aren’t expecting, etc.”&nbsp; stated Ted M.&nbsp; “How can you protect data?&nbsp; Well, in the case of a small library in Indiana, they had their card catalog hacked and encrypted.&nbsp; What they do now is keep a backup of all their critical data offline.&nbsp; If they get hacked, they wipe everything clean and restore from backup.&nbsp; For a small business, this is a very practical solution.&nbsp; For someone like Colonial Pipeline, they discovered it would take many days to do because the entire infrastructure was encrypted.&nbsp; For those larger companies, we would recommend a separation of systems to prevent the unrestricted spread of malware.&nbsp; Sierra Wireless (another very large Fortune 500 firm) was a victim of ransomware.&nbsp; It attacked their administrative functions, but their operational functions were unaffected.&nbsp; The customers were unaware.&nbsp; Most administrative functions were back in days, fully functional within a week.&nbsp; No ransom was paid.”&nbsp;</p>



<p>So, is the answer to just back up your data?&nbsp; Yes, that’s a good practice, but you cannot rely entirely on your backups.&nbsp; As Ted M. said, this takes time that many companies may not have, particularly if they are an essential service or business.&nbsp; To many organizations, time is money.&nbsp; And no one likes to lose money.&nbsp; <em>But would you rather lose your data?&nbsp;</em></p>



<p>In my discussions with the experts, I went on to ask them, how does the COVID-19 stay at home scenario add to the risks of data breaches and cyber-attacks?&nbsp; What can be done to mitigate this, since many companies decided during COVID that they can save money by having certain employees work from home for the long-term?&nbsp; What are some basic must-dos and don’ts that companies should be practicing?</p>



<p>“The spread of ransomware throughout a connected network is the largest risk for a small business,” replied Ted M.&nbsp; Your machines in the office may be “locked down”.&nbsp; Machines at home, less so.&nbsp; At home there are many areas of weakness.&nbsp; Family members.&nbsp; Open ports. &nbsp;Memory sticks may be inserted which are infected.&nbsp; Wireless networks can be hacked.&nbsp; IoT devices (Alexa, Nest, etc.) may be hacked.&nbsp; Multiple entry points, multiplied by the number of employees out of the office in coffee shops or other public places, multiplies the risk.”</p>



<p>Ted M. continued: “What can be done?&nbsp; Work policies must be enforced at home.&nbsp; You should set up machines at home with a separated family account, work account and administrator account.&nbsp; NO ONE BUT the employee should have access on the work account on a machine.&nbsp; You need to restrict rights to the various accounts so work product cannot be breached or compromised.”</p>



<p>You may be thinking, how do I do that?&nbsp; For that, I would highly recommend that you contact a reputable IT services company.&nbsp; Most individuals cannot do that alone (although some teenagers in your household may be able to, but not willing to do so!).&nbsp; However, be sure if they are working with machines that are owned by your organization or contain any type of company data, that the IT service providers you use are HIPAA (for medical information) and/or GLBA (if you deal with financial information) compliant, and be sure if you sponsor a company health plan, that you get a HIPAA Business Associates Agreement signed.&nbsp; You may also need a GLBA vendor agreement in place.</p>



<p><strong>Hacker Groups in the News – Are They The Only Danger?</strong></p>



<p>Recent news reports have named certain hacker groups that have been linked to recent large breaches and ransomware schemes.&nbsp; We’ve heard about DarkSide, REvil group, Avaddon, Evil Corp, DoppelPaymer Gang and more.&nbsp; I asked Ted Mayeshiba and Sidd Gavirneni if we should be worried only about these more infamous groups, or should we be focusing mitigation efforts on a wider range of hackers?&nbsp; Who should we be afraid of, and why?</p>



<p>“The larger groups offer Ramsomware as a Service (RaaS),” said Ted M.&nbsp; This means they put kits together for any middle school whiz kid to use and distribute.&nbsp; They leverage servers and infrastructure where payments are processed and the heavy lifting of hacking is done.&nbsp; <em>It’s the democratization of evil</em>.&nbsp; What this means, however, is that “spearphishing” will become more dangerous.&nbsp; More people, who are likely to know more about you, may send more enticing emails with links for you to click.&nbsp; <em>Social media is now an attack vector. </em>&nbsp;Therefore, <em>it’s important that you NOT use the same photo for business and personal media accounts.&nbsp; Facial recognition software has progressed now, so hackers are able to associate facts on your Instagram account tied with facts on your LinkedIn account to give a good picture of enticements for the hacker to use against you.”</em></p>



<p>People often give me a hard time about why I don’t have social media on my phone and why I don’t have an Instagram account….&nbsp; Hmmmm… I wonder why?&nbsp; And for those of you that may not understand the humor, a phone is also a device that needs to be protected and secured.&nbsp; All devices do, if they are used for company business.&nbsp; Much to my frustration at times, my phone is encrypted, and I download very few applications on it.&nbsp; Those that are downloaded are approved by Aditi Group.&nbsp; Phones can get hacked too, and if they are connected to your networks at the office, they can be just as dangerous as a laptop.&nbsp; For social media, I primarily use a tablet that is not connected to any office networks or databases.</p>



<p>“The most important goal is to protect your business &#8211; irrespective of the size or type of a malicious actor group,” stated Sidd. “And this is because there are many, many more malicious actors that are not in the news &#8211; including newbies. The average cost of a breach for small businesses is $3.6M, and we have seen instances of ransomware attacks by amateur cyber criminals.”</p>



<p>Keep in mind, many of these are faceless individuals, clicking away at holes, trying to find a way into your network.&nbsp; It could be someone next door to you.&nbsp; It could be a friend of your son or daughters’.&nbsp; Social media, as Ted M said, is now a major source for your personal information and a breeding ground for hackers, including, as Sidd mentioned, the newbies.&nbsp;</p>



<p><strong>Healthcare and Insurance Group Attacks</strong></p>



<p>Turning to something close to probably everyone reading this article, healthcare and insurance groups have always been a huge target for hackers and cyber-attacks.&nbsp; From Anthem to Primera Blue Cross to Mass General, Cottage Health, UMass, and more recently, Scripps, have all fallen victim to cyber criminals.&nbsp; Since much of our reading audience is in the healthcare and health insurance business, or a field supporting that business, are there certain things this industry should be doing more of to protect patient and customer medical data?</p>



<p>“Healthcare related businesses usually are subject to Federal HIPAA laws and local State laws that require “de-identify” patient info or protect it,” stated Ted Flittner (Ted F.).&nbsp; “Protection falls on data when At Rest, In Motion, and Deleted. And we must Control Access to just the people who are Authorized to see data.&nbsp; Making all that happen is a lengthy topic and starts with knowing your company.”&nbsp;</p>



<p>Ted F. continued: “The most common statement made by Health and Human Services and Office of Civil Rights in HIPAA violation cases is a lack of adequate RISK ASSESSMENT by the companies.&nbsp; The first responsibility is to understand your own company risks of violating HIPAA privacy rules.&nbsp;&nbsp; The second responsibility is to make a plan to reduce or eliminate those risks.”&nbsp; Of course, Ted F is speaking my language, because as I said above, I’ve been doing HIPAA Privacy &amp; Security Training since 2002, and it’s one of the most important things I tell my students, which are generally CFOs, CEOs, corporate Presidents, Partners, as well as Human Resources professionals and insurance agents.&nbsp; But telling them and having them listen isn’t enough.&nbsp; <em>They have to do something about it. &nbsp;They need to take action.&nbsp;</em></p>



<p>Ted F. continued: “Number one: get an outsider’s view of your business risk.&nbsp; The actions following a risk assessment are specific to the company.”&nbsp;</p>



<p>Sidd Gavirneni took a somewhat different approach to my question.&nbsp; “Cybersecurity is all about People, Processes, and Technology &#8211; making sure that businesses are looking at it holistically.”</p>



<p>“Healthcare is extremely susceptible to cyber-attacks because of the amount of sensitive data, the third party tools and products being used, and the proliferation of IoT devices,” continued Sidd. “So, we always recommend starting with understanding your ecosystem, and creating cybersecurity processes around that ecosystem. There are many things you need to do, but we’ll talk about only a few things that healthcare businesses can get started with:</p>



<ol class="wp-block-list" type="i"><li>Ensuring that you continuously maintain an inventory of all software and devices you are using, and patching them at least once a month with any software updates.</li><li>Encrypt all data</li><li>Make sure that you are backing up all data continuous, but also have a process to restore that data</li><li>People are the primary root cause of breaches. So, train all your employees, consultants, and contractors on cybersecurity best practices. This cannot be a “once a year” effort. It needs to be at least once per month, so it stays top of mind.”</li></ol>



<p>I can’t agree with Sidd more.&nbsp; Too many companies, in my opinion, train their people once, and then forget about it.&nbsp; Some even go so far as to train every two to three years, but with technology changing, and employees being those human beings I mentioned, it just doesn’t stick with them.&nbsp; If you’re a business owner, I implore you to read these words and let them sink in… Then read them again and again until you remember them.&nbsp; Your best defense is to train your employees,&nbsp; your consultants, and contractors on privacy and security of all types, and keep doing it, over and over.&nbsp; Once a month may be overkill for some companies, but for many others, it could be the difference between getting hacked and being safe.&nbsp; Know your business and talk to a consultant to help you determine what type of training and how often you need it for your employees, given your situation.</p>



<p><strong>No Industry is Safe</strong></p>



<p>No one is safe.&nbsp; No industry is safe.&nbsp; Even professional sports teams have been victims of cybercrimes recently.&nbsp; The Houston Rockets were hit with a ransomware attack, even after they claim to have prevented some attacks.&nbsp; This attack was reported as minor, but is it really minor if at least one person falls victim to these attacks and pays?&nbsp;</p>



<p>“It can appear minor to the victim if the dollars are low and they learn their lesson and tighten security,” stated Ted F.&nbsp; “Depending on the type of ransomware attack.&nbsp; Some are simply caused by an executable file that just encrypts data.&nbsp; Some attacks are real breaches into a company’s network AND the lock-up of their data.&nbsp; These situations are a lot more complex and mean the attackers may HAVE copies of some or all of the data.&nbsp; And of course, any payment of ransomware boosts the motivation of these pirates to attempt more plunders.&nbsp; Sometimes even to the same victim all over again.”</p>



<p><strong>Software Updates and Patching</strong></p>



<p>One of the most important things I want to talk about today are software updates and patching and why that’s important.&nbsp; Apple Mac OS recently released an update to address vulnerability that was allowing malware to work around privacy settings.&nbsp; Microsoft 365 had vulnerabilities in email applications.&nbsp; Microsoft also released patches for limited and targeted attacks.&nbsp; What should businesses be doing to assure that updates and patches are installed and used?&nbsp; How important is this?&nbsp; Once again, I asked the experts.</p>



<p>“Remember that HIPAA requires that ‘Covered Entities’ – those subject to HIPAA always use computer systems and software that are still supported by their makers.&nbsp; That’s because we know that weaknesses are continually bubbling up to the surface.&nbsp; And as they appear, companies scramble to push out patches as software updates,” responded Ted F.</p>



<p>“Sometimes these weaknesses are glaring holes.&nbsp; But most often they are rarely encountered combinations of keystrokes and commands that can unintentionally allow hackers to get in or take control of computers.&nbsp; Once a vulnerability becomes known about by hackers, they share with other hackers and malware code is written and deployed around the world.&nbsp; The most common way to spread those viruses is with spammy emails with links we shouldn’t click on…”&nbsp;</p>



<p>And how many times have we seen just that?&nbsp; Employees, again, your weakest link, should know better but they don’t, or they forget.&nbsp; You must train them of the dangers, and you must do it frequently.</p>



<p>“Some exploits can be made on computer servers directly – like the ones in your office or running the stuff “in-the-cloud” without any users clicking on email,” continued Ted F.&nbsp;&nbsp; “These are the kind of exploits that we see when a website is “hacked” and you see ads for ED or cheap drugs.&nbsp; They are also the attack opportunities like Microsoft had with their Exchange email software this year.&nbsp; That one event allowed more than 30,000 Exchange email severs to be attacked by malware before patches were deployed.”</p>



<p>I continued this discussion with Ted F. “Hackers rely on the time window of opportunity between when an exploit is revealed and when software companies publish updates.&nbsp; But most importantly, before users – you and I, update our computers.” &nbsp;Timing, as Ted F said, is everything.&nbsp; And often, only a short amount of time is enough to set the path towards data destruction or ransom attacks.&nbsp; &nbsp;</p>



<p>“Patching is critical, and should be done as frequently as possible,” stated Zach Auta of Zeguro. “If an organization is unable to automate patches so that they are installed as they become available, then patching should be done on regular intervals, more often than just monthly.”</p>



<p><strong>The Travel Industry</strong></p>



<p>The travel industry has also been hit hard recently after a devastating 15+ months.&nbsp; Booking.com, Malaysia Airlines, British Airways and more have been victims.&nbsp; As people and businesses are now starting to finally start traveling again, for both vacations and business, what can they do to keep their information safe?</p>



<p>“Lost or stolen phones are the number one way that data gets intercepted when you’re traveling,” stated Ted F.&nbsp; So, I asked for a list of “to-dos”, and Ted F replied:</p>



<ol class="wp-block-list" type="i"><li>Back up your phone</li><li>Secure your phone with a strong password – just a few thumb strokes or a 4-digit pin.</li><li>Only use public wifi with a <em>virtual private network</em> or <em>VPN</em>.&nbsp; IT Service companies like ours can set up a hardware VPN or you can subscribe to VPN software.&nbsp;</li><li>Don’t text or email secret info like your passwords to family or office while traveling.&nbsp; SMS and email are inherently insecure – like sending postcards.&nbsp; Set up password storage programs – LastPass, Dashlane, etc <em>before</em> you travel.&nbsp;</li><li>Be mindful or who is watching or listening to phone calls when you tell someone your name, address, birthday, social security number, or credit card number over the phone.&nbsp;&nbsp; Use an ear bud and not a speaker phone.”</li></ol>



<p>Because these things are so common, I pressed Ted F. for more information.&nbsp; “We also avoid downloading and installing apps which may be convenient but really are not necessary.&nbsp; These apps from travel companies and smaller businesses may have flaws and may not be updated as quickly as operating systems and big software programs.”</p>



<p>There we are again, back to the dangers of apps on phones… With all of the sports events moving to mobile ticketing only, that was a tough one for me.&nbsp; I may have to buy a second mobile phone just to use for mobile ticketing!</p>



<p><strong>Working From Home Dangers</strong></p>



<p>Another thing we should be concerned about, particularly now with more people continuing to work from home, are kids and online gaming, as there are always issues with security.&nbsp; What about the parents of those kids?&nbsp; What can be done to keep your kids, as well as your data, safe while playing online games?</p>



<p>“The only real way to protect your data and allow online and multiplayer games is to keep the gamers separate from any computers and phones that have your business data or sensitive personal info”, replied Ted F.&nbsp;&nbsp;&nbsp; Don’t allow games on your computers, and never on business machines. Use separate networks.&nbsp; Virtual Local Area Networks (VLANs) use the same internet provider, same wires, but special hardware creates separate <strong><em>virtual</em></strong> networks that can’t talk to each other.&nbsp; So, kids can be on their own, and you or Work can be on another.&nbsp; Risky games on the Kid’s Network won’t affect you on the Work Network.&nbsp; It can be all inside your home.&nbsp; I recommend you call an IT Service company like ours to learn more or have us set it up.”</p>



<p>Zach Ayta had additional ideas on this subject.&nbsp; “Malicious actors will stop at nothing to creatively gain access to information or hardware through gaming platforms. Parents should encourage the following:</p>



<ol class="wp-block-list" type="i"><li>Avoid participating in chat, when possible</li><li>Never share personal information about yourselves or your personal lives</li><li>Avoid clicking links provided in chats</li><li>Online download gaming updates from app stores or within the game, never from external websites/sources</li><li>Only add gaming friends/contacts that they know in real life (IRL).”</li></ol>



<p><strong>New Cybersecurity Regulations</strong></p>



<p>Moving on to another subject, I asked the experts about new cybersecurity regulations. The Dept of Homeland Security is working on regulations…&nbsp; The Transportation Security Administration and Cybersecurity and Infrastructure Security Agency are getting involved.&nbsp; I asked them how much they think the government can help with this problem?&nbsp; Even if we have regulations, will that solve the problems?</p>



<p>“Rules don’t really change human behavior,” stated Ted F. matter-of-factly.&nbsp; “Regulations may lead to more widespread use of security steps like 2-factor authentication (like when your bank sends a confirmation code to login).&nbsp; But rules won’t prevent people from clicking on email links to malware. And we all know that people still have to <em>follow</em> the rules.&nbsp; HIPAA was enacted in 1996, [and has been enforced since the Privacy &amp; Security Rules went into effect in] 2003.&nbsp; But companies still routinely violate HIPAA rules.”</p>



<p>That they do.&nbsp; All you have to do is take a glance at HHS/OCR’s “wall of shame,” which they seem to be very proud of, to see just how many entities violate HIPAA Privacy &amp; Security rules, as well as HITECH, regularly.</p>



<p>“We still need to be aware, train our co-workers to be aware, and assess our risks, put measures in place to help reduce risk, and consider insurance for when the unexpected does happen,” continued Ted F.&nbsp;</p>



<p>“The increase in regulatory frameworks is unsurprising, but necessary,” stated Sidd Gavirneni. “One of the challenges is that passage of regulations is an archaic process, and often by the time they are instituted, the technology world may have evolved well beyond the scope of the regulations. Secondly, current regulations fail to motivate organizations to go above and beyond what is required of them.”</p>



<p>In case you haven’t been reading the news or watching it on television or online, the recent meeting between President Biden and Russian President Putin put cybersecurity in the forefront.&nbsp; Although nothing specific came out of that meeting, the two did agree to “begin consultations on that issue.”&nbsp; (Russian President Putin in a post-meeting interview).&nbsp; But, we all know, actions speak louder than words, and I’m guessing it will be quite some time before we see any real actions from the US and Russia in a combined effort, if ever.</p>



<p><strong>Training for Employees</strong></p>



<p>Let’s talk about proper training for the front-line workers of businesses.&nbsp; Those who sit at a computer most of the day… We’ve mentioned training a number of times in this article so far, but as far as I’m concerned, you can’t talk about it enough. What kind of training do employees need to help protect their company’s security?</p>



<p>Ted F. was more than happy to discuss this topic again.&nbsp; “Know company policies and why it matters to follow them.&nbsp;&nbsp; The key topic these days is email diligence.&nbsp; Don’t click on email links or download files that you don’t really know.&nbsp; Slow down and take time to scrutinize.&nbsp; Teach people how to recognize fakes and legitimate messages,” he stated.&nbsp; “And train people on how to react if malware, ransom, or phishing attempts succeed.&nbsp; Who should they call and what should they do next?”&nbsp; That seems to be one of the glaring missing pieces in most employers’ privacy policies.&nbsp;</p>



<p>“Employees are often the first and last line of defense against security incidents and equipping them with the education they need to change their behavior is important,” stated Sidd Gavirneni. “The key for any effective training is that it is not one size fits all. A robust training program should address both the knowledge gaps in an employee&#8217;s cybersecurity aptitude and risks that they face in their job functions. Additionally, many security awareness programs fail because every employee takes the same training at the same time, typically annually. Ongoing training on a monthly basis helps keep security top of mind.”</p>



<p>How do you train your employees?&nbsp; Every company, every industry is different.&nbsp; However, there are easy training tools you can use.&nbsp; Up-to-date video training is cost effective and easy for Human Resources.&nbsp; However, if you use video training, it’s best to incorporate live interactions within it.&nbsp; Personally, I like to create my training videos with stopping points in the video where you can literally hit pause and do role playing with your staff, or other interactions, to keep them engaged and aware.&nbsp; I also include statements in my videos, usually at the end, where I inform the employees that their employer will now distribute your internal policies and review them with you, to make sure that the employer is actually prepared to have the training.&nbsp;</p>



<p>We also find that more than one voice or face in a training is good, particularly in longer training.&nbsp; One voice, no matter how effective they are, can cause someone to lose interest after a time.&nbsp; Short (one hour or less) trainings are usually ok with a single voice, but longer ones may lose the audience.&nbsp;</p>



<p>I personally love in-person, live training, although I had to convert to web-based training during COVID.&nbsp; In-person training allows the trainer to look the employees in the eyes, see where they are confused and stop to see how you can help.&nbsp; Now that we are opening up again, and more people are vaccinated, we will be going back to live training in the next couple of months.</p>



<p>I tend to shy away from on-line only training with no interaction, because people tend to not pay as much attention.&nbsp; If you are using an online only training tool, be sure to use one that has tests that employees must pass.&nbsp; If using this type, use also double-authentication to be sure that you are in fact training the person you think you are training, and not having one person take everyone’s test (and perhaps get paid to do it by others).&nbsp;</p>



<p>The most important thing is to decide what groups need to be trained, and train specific to each of those levels.&nbsp; In HIPAA Privacy &amp; Security training, I generally prefer 4 to 6 hours for Privacy &amp; Security Officers and privacy work group members.&nbsp; Most don’t do that… But I do like to be complete, and it’s far too complicated to do in an hour at that level.&nbsp; I also like to do Supervisor &amp; Manager training, as they have specific roles in monitoring and enforcing the policies of your organization, which is usually about a 2-hour training the first time, with follow-ups ongoing. &nbsp;I believe electronic training and cybersecurity training is mandatory for everyone.&nbsp; If it’s provider group, then of course specific training is needed to address the requirements of a provider.&nbsp; Basic All Employee Training is also needed, which in my opinion, should include electronic security and cybersecurity training today.&nbsp;</p>



<p>Each company’s privacy officer and security officer should appoint a privacy work group to deal with day-to-day functions, including proper training.&nbsp; That group should determine the most appropriate means of training that meets the needs of your organization.</p>



<p>If you’re not sure what type of training you need or how to go about it, you can certainly contact any of us involved in this article for assistance.&nbsp; I know I’m happy to help you, and I know Aditi and Zeguro would be as well.</p>



<p><strong>Cybersecurity Insurance</strong></p>



<p>Cybersecurity Insurance is now available, yet many employers still haven’t even thought about adding it.&nbsp; Is it affordable and is it worth the price?&nbsp; I believe it is, and our experts agree, wholeheartedly.&nbsp;</p>



<p>“This is just like other insurance questions.&nbsp; If you can afford not to be insured, ok.&nbsp; If you can’t afford the potential loss or cost of being without coverage, GET INSURANCE,” stated Ted F.&nbsp; “The cost of ransomware for example could include the ransom itself, cost of forensics investigators to determine if they <strong><em>took</em></strong> your data, the cost of bad press, possible legal penalties for breach, and customer lawsuits for letting hackers get their data.&nbsp; We think insurance is a great idea.”</p>



<p>Obviously, this was an easy question for Sidd, as the CEO and co-founder of Zeguro, a cybersecurity liability company.&nbsp;</p>



<p>“Cybersecurity insurance is a critical part of a robust cyber risk management program. Premiums are determined by a number of factors, including but not limited to an organization&#8217;s industry, projected revenue, amount of sensitive/confidential information, and security/process controls. In general, I would describe cyber insurance as being relatively affordable for what is covered, but those costs are rising as insurers realize that their underwriting models were not fit for the risks they were taking on. It is important that organizations work with insurers that have a deep understanding of cybersecurity and cyber risk and uses more than financial modeling to evaluate premiums, so costs stay down over the long term.”</p>



<p><strong>Conclusion</strong></p>



<p>In conclusion, I would ask that you think about the current storm we’re in.&nbsp; The clouds have not yet begun to part.&nbsp; We are a long way from that.&nbsp; But you have tools available to you to help you take shelter and weather the storm, and hopefully, see clear skies ahead…. You may have to invest it in financially and with administrative processes such as real training, but it would be money well spent.&nbsp; &nbsp;Let’s combat the new national emergency with knowledge and action, and take control of our data, before it’s too late.&nbsp; ##</p>



<p><strong>Author’s Note &amp; Mini Biography</strong>:</p>



<p><em>I’d like to thank the contributors to this article, Ted Mayeshiba and Ted Flittner from Aditi Group, as well as Sidd Gavirneni and Zach Ayta of Zeguro for their assistance.&nbsp; Aditi Group can be reached at (855) Go-Aditi (855-462-3484) or </em><a href="mailto:info@aditigroup.com"><em>info@aditigroup.com</em></a><em>, and Zeguro can be reached at </em><em>(855) 980-0660.</em><em>&nbsp; </em><em>If you need or want my assistance, you can reach me at (714) 693-9754 x 3 or email me at </em><a href="mailto:dmcociu@advancedbenefitconsulting.com"><strong><em>dmcociu@advancedbenefitconsulting.com</em></strong></a><em>.&nbsp;</em></p>



<p><em>Dorothy Cociu is the President of Advanced Benefit Consulting, and a veteran Privacy &amp; Security consultant and trainer, with </em><em>expertise in HIPAA Privacy &amp; Security, HITECH, GLBA and related laws.&nbsp; She is the author of a HIPAA manual for employers and trains and consults nationally on physical and administrative security, as well as some facets of HIPAA Security.&nbsp; She relies on her technology partners, Aditi Group, for the IT security complexities of HITECH.&nbsp; Dorothy is the host of her company’s own podcast, </em><a href="https://advancedbenefitconsulting.com/benefits-executive-roundtable-podcast/"><strong><em>Benefits Executive Roundtable</em></strong></a><strong><em>,</em></strong><em> and is an instructor for many CE courses for CAHU and its local chapters, as well as SIIA, PIHRA, SHRM and other associations.&nbsp; She is the Vice President, Communications, of CAHU.&nbsp; She is also an HRCI instructor, and her firm is an HRCI provider.&nbsp; Advanced Benefit Consulting is also a CE provider for the California Department of Insurance.&nbsp; They recently launched their new education platform, </em><a href="https://advancedbenefitconsulting.com/empowered-education-center/"><strong><em>Empowered Education Center, Powered By Advanced Benefit Consulting &amp; Aditi Group</em></strong></a><strong><em>,</em></strong><em> whichprovides on-demand classes for HRCI credit, general employer education, Privacy &amp; Security education and training, and coming soon, CE credit for agents on the platform (pending DOI approval at this time).&nbsp; Her firm and her technology partners also do live training and have a monthly subscription service available for employee privacy &amp; security training, including Cybersecurity.&nbsp;</em></p>
<p>The post <a href="https://advancedbenefitconsulting.com/cyber-attacks-hit-home-the-next-national-emergency-and-valuable-cybersecurity-tools-to-keep-you-safe/">Cyber Attacks Hit Home &#8211; The Next National Emergency?  Valuable Cybersecurity Tools to Keep You Safe</a> appeared first on <a href="https://advancedbenefitconsulting.com">Advanced Benefit Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
