Mobile Security & Cybersecurity Issues for Physicians & Patients Across the Care Continuum
|
|
|
- Bartholomew Powell
- 10 years ago
- Views:
Transcription
1 Mobile Security & Cybersecurity Issues for Physicians & Patients Across the Care Continuum 8th Annual NJ/DV Conference: IT - The Politics of Healthcare October 29, 2015 Atlantic City, NJ William Buddy Gillespie, HCISPP Steven J. Fox, Esq.
2 Agenda The Mobile Physician Good Old Days Information Technology HIMSS Survey Laws & Regulations Tools & Best Practices CyberSecurity
3 Today s Mobile Physician Mobility + Connectivity Risk + Consumerization & BYOD 3
4 The Good Old Days Games Personal Data Apps Hospital Issued 4
5 The Good Old Days Hospital Data Personal Data 5
6 IT Department NO! Games Personal Data Apps 6
7 Employees Are Anarchists! 7
8 Consumerization of IT Convenience Connectivity Productivity Image Marketing Cost? 8
9 Consumerization of IT BYOD Hospital Issued Consumer Devices 9
10 2015 HIMSS Mobile Technology Survey 10
11 Summary of Results 90% of respondents use mobile devices to engage patients 73% have app-enabled patient portals 62% use telehealth services 57% engage in text communications 11
12 Summary of Results 49% use remote patient monitoring 14% report all or most mobile generated data is integrated into an EHR 52% report some data integrated into an EHR 38% make SMS texting available to providers & clinical staff 12
13 Laws and Regulations HIPAA PHI Covered Entities Business Associates Privacy & Security State Laws 13
14 HIPAA - Encryption Addressable Requirement 14
15 Unencrypted = A Postcard Bruce Schneier (1995, ) Larry Rogers (2001) ( written in pencil ) Google Official Blog (June 3, 2014) New York Times (July 16, 2014) 15
16 Google End-to-End Encryption 16
17 Reasonable Expectation of Privacy? Postcard Electronic Communications Privacy Act J!NX.com 17
18 Security Concerns - Threats Disgruntled / dishonest insiders Hackers Hactivists Criminals Malware Law enforcement Government surveillance State-sponsored espionage 18
19 Mobile Threats Lost, misplaced or stolen No user authentication Weak user authentication Intercepted wireless Malware Malicious attachments Malicious or compromised websites Phishing Shortened URLs QR Codes 19
20 20
21 Lost & Stolen Phone Statistics Cellphone robberies on downward trend, but in 2014, 10% of U.S. smartphone users had phones stolen (Lookout) 3.1 million Americans victims in 2013; additional 1.4 million estimated lost (Consumer Reports) 44% of stolen phones were left in public place 70% of victims never recover their phones 21
22 Lost & Stolen Phone Statistics In 2013, 60% of robberies in San Francisco involved a mobile phone Only 29% of users back up their data to a computer or online 36% of owners use a 4-digit password 11% use password longer than 4 digits 34% use no password or pin 22
23 Lost & Stolen Devices: Considering the high frequency of lost assets, encryption is as close to a no brainer solution as it gets for this incident pattern. Sure, the asset is still missing, but at least it will save a lot of worry, embarrassment, and potential lawsuits by simply being able to say the information within it was protected. 23
24 Learning from the Past? Jan. 2015: Wash.-based Premera Blue Cross, 11 million records (initial attack in May 2015) Feb. 2015: Anthem, Inc., 78.8 million records May 2015: CareFirst BlueCross BlueShield, 1.1 million records June 2015: Office of Personnel Management, 10 million records 24
25 Mobile Security Secure Setup Secure Use Control (MDM) (EMM) 25
26 Program / Policy 26
27 Mobile Device Management (EMM) Require security settings Can wipe business data Personal w/ a business sandbox Disable device features Restrict apps permitted in business area 27
28 Consensus Minimum Safeguards 28
29 Secure Setup 1. Review and follow the security instructions of the phone manufacturer and carrier. 2. Maintain physical control of the phone. 3. Set a strong password, passphrase, or PIN. 4. Set locking/wiping after a set number of failed log-on attempts. 5. Set automatic logoff after a defined time. 6. Encrypt confidential data on the phone and any storage card. 29
30 Secure Setup 7. Provide for protection of data in transit. 8. Disable interfaces that are not being used. (Bluetooth, Wi-Fi, etc.) 9. Enable remote location of a lost device and remote locking and wiping. (May require 3 rd party software or service.) 10. Consider use of 3 rd party security apps (antivirus, encryption, remote locating and wiping, etc.). 11. Backup important data. 12. Don t jailbreak or root a smartphone. 30
31 Passwords / PINS = First line of defense - Should be complex - Most common passwords: - password qwerty (InTechnology.com) 31
32 32
33 Secure Use 1. Limit confidential data on the phone to what is necessary. 2. Be careful in selecting and installing applications. Pay attention to permissions. 3. Configure web accounts to use secure connections. 4. Be careful in using unknown and public wireless clouds. (Or avoid using them.) 5. Don t follow suspicious links in s and text messages. Be careful with attachments. 33
34 Turn WiFi off when not in use Turn Bluetooth off when not in use 34
35 Wireless Networks Wired Equivalent Privacy (WEP) weak! Wi-Fi Protected Access (WPA) - cracked Wi-Fi Protected Access, second generation (WPA2) Sniffer programs War driving Pineapple Evil twin Picture: Wikipedia.org 35
36 Air cards - MiFi Connects to a private data network of the wireless service provider 36
37 Proceed With Caution! 37
38 More Secure Business Enterprise 38
39 Encryption - Who has the key? Internet End User Cloud Service Provider 39
40 Gartner: [Dropbox for Business] a viable offering for organizations...worrying less about IT control and data protection 40
41 Installing Apps Wireless Carriers Others 41
42 Permissions 42
43 Terms of Use 43
44 Encrypted Portable Media CMS Secure Vault SanDisk Ironkey (Imation) Imation Bitlocker to Go Seagate Go Flex 44
45 CyberSecurity -The Problem EMR
46
47 CyberSecurity -The Problem Not only do medical EHR systems themselves pose security risks, but the movement towards making patient data available wherever they may access medical services, implemented through participation in health information exchanges (HIEs), exacerbates the level of risk by posing additional threat vulnerabilities. HIEs face funding challenges due to the fact that they lack clear-cut and profitable business models, and yet federal grants and deadlines maintain a level of time pressure for implementing these systems that do not allow for thorough considerations of security.. Doug Pollack, strategy officer at ID Experts, responsible for strategy and innovation including prevention analysis and response services. As a veteran in the technology industry, he has over 25 years of experience in computer systems, software, and security concerns focusing on creating successful new products in new emerging markets.
48 CyberSecurity Internet Usage In 1995, 16 million users (0.4%) In 2010, 1.6 billion users (23.5%)
49 Cyber-Attack - Trends Increasing sophistication Decreasing costs Increasing attack frequency Difficulties in patching systems Increasing network connections, dependencies, and trust relationships
50 CyberSecurity Top Concerns Mobile Devices - BYOD Medical Devices/Robotic Surgery HIPAA & BAAs Cloud Hosting Internal & External Breaches Data Leakage Limits of Technology & Inadequate Security Systems Funding Patient s Lack of Confidence Third Parties-Vendors Remote Connections
51
52
53 Cyber Security - CIA Confidentiality (privacy) Integrity (quality, accuracy, relevance) Availability (accessibility)
54 CyberSecurity ONC Guidelines New privacy and security guidelines--aimed at protecting the vast amount of healthcare information are now in place. HIEs are networks intended to help states manage the electronic exchange of health information among health care providers and hospitals within their states and across state lines. Privacy and security policies are required as a condition of accepting part of the $550 million federal grant money funding the development of state-based HIEs. The guidelines, issued by the Office of the National Coordinator for Health IT (ONC), provide a common set of "rules of the road" designed to build confidence in the system on both the provider and patient level.. ONC
55 Cyber Security ONC Guidelines Under the new guidelines, state HIE grantees are required to develop privacy and security policies to address each of the fair information practice principles as outlined by ONC. The principles include individual access to information; the right to correct errors; openness and transparency; collection, use and disclosure limitations; security safeguards; data quality and integrity; individual choice; and accountability.
56 Cyber Security Privacy & Security Policies All of the information is password protected and encrypted at its source using state of the art tools to protect the transmission and security of the data. Access to the network is monitored and restricted to only those qualified medical professionals who have demonstrated a need to know the requested information.
57 Cyber Security Security Architecture The secure exchange of electronic health information is important to the development of electronic health records (EHRs) and to the improvement of the U.S. healthcare system. While the U.S. healthcare system is widely recognized as one of the most clinically advanced in the world, costs continue to rise, and often preventable medical errors occur. Health information technology (HIT), especially the development of electronic health records for use in both inpatient and ambulatory care settings, has the potential for providing reliable access to health information and thereby improving the healthcare system. However, the prospect of storing, moving, and sharing health information in electronic formats raises new challenges on how to ensure that the data is adequately protected.
58 Cyber Security NIST Security Architecture NIST published "Security Architecture Design Process for Health Information Exchanges (HIEs) (NISTIR 7497)" in September 2010, to provide a systematic approach to designing a technical security architecture for the exchange of health information that leverages common government and commercial practices and that demonstrates how these practices can be applied to the development of HIEs. The publication assists organizations in ensuring that data protection is adequately addressed throughout the system development life cycle, and that these data protection mechanisms are applied when the organization develops technologies that enable the exchange of health information.
59 Cyber Security Security Architecture The operating model outlined in the NIST publication will help organizations that are implementing HIEs to: Understand major regulations and business drivers. Identify cross-organizational enabling services. Define supporting business processes (for each service). Develop notional architectures (as a blueprint to support services, processes, and the selection of technical solutions). Select technical solutions.
60 CyberSecurity Medical Devices/Robotic Surgery Summary of Problem and Scope: Many medical devices contain configurable embedded computer systems that can be vulnerable to cybersecurity breaches. In addition, as medical devices are increasingly interconnected, via the Internet, hospital networks, other medical device, and smartphones, there is an increased risk of cybersecurity breaches, which could affect how a medical device operates
61 Cyber Security Medical Devices/Robotic Surgery General Principles Manufacturers should develop a set of security controls to assure medical device cyber security to maintain information confidentiality, integrity, and availability.
62 CyberSecurity Medical Devices - FDA On June 13, 2013, in response to increased reports of computer viruses and other cyber security breaches concerning medical devices and hospital networks, the Food and Drug Administration (FDA) issued a safety communication on cyber security for medical devices and hospital networks and a new draft guidance document, "Content of Premarket Submissions for Management of Cybersecurity in Medical Devices."
63 CyberSecurity ICS-CERT What is ICS-CERT? The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) provides a control system security focus in collaboration with US-CERT to: Conduct vulnerability and malware analysis Provide onsite support for incident response and forensic analysis Provide situational awareness in the form of actionable intelligence Coordinate the responsible disclosure of vulnerabilities/mitigations Share and coordinate vulnerability information and threat analysis through information products and alerts.
64 CyberSecurity Best Practices Best Practices for Technology Environment Configuration Management Software Maintenance Operating Maintenance Mobile Device Management (BYOD) Security Culture Backup and DR Checklists and ITSM for all Elements
65 CyberSecurity Best Practices Passwords & Strong Authentication Anti-Virus Software Firewall(s) Controlled Access to PHI Controlled Physical Access Limit Network Access Plan for the Unexpected
66 CyberSecurity The Next Frontier Accountable Care Organizations (ACOs) Portals HIEs & Direct-HISPs Cloud Hosting Meaningful Use HIPAA Omnibus Bill
67 CyberSecurity Reference Sites HHS Office for Civil Rights website ( /understanding/) NIST 800 Series Special Publications ( SPs.html)
68 CyberSecurity Reference Sites CYBER SECURITY Guide The protection of data and systems in networks that connect to the Internet 10 Best Practices content/uploads/2012/07/onc_cyber- Security-Guide-V-1.0.pdf
69 QUESTIONS? William Buddy Gillespie, #budgill, Steven J. Fox Acknowledgment: These slides are based on a presentation by Steve Fox & David G. Ries to the ABA Health Law section on March 6, 2015 and a presentation by William J. Gillespie to the Carnegie Mellon University CERT Symposium on June 26,
An Independent Member of Baker Tilly International
Healthcare Security and Compliance July 23, 2015 Presenters Kelley Miller, CISA, CISM - Principal [email protected] Barbie Thomas, MBA, CHC [email protected] 2 Agenda Introductions Cybersecurity
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
HIPAA Requirements and Mobile Apps
HIPAA Requirements and Mobile Apps OCR/NIST 2013 Annual Conference Adam H. Greene, JD, MPH Partner, Washington, DC Use of Smartphones and Tablets Is Growing 2 How Info Sec Sees Smartphones Easily Lost,
North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP
Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches
Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches Speakers Phillip Long CEO at Business Information Solutions Art Gross President & CEO of HIPAA
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS MSCPA HEALTH CARE SERVICES SEMINAR Ken Miller, CPA, CIA, CRMA, CHC, CISA Senior Manager, Healthcare HORNE LLP September 25, 2015 AGENDA 2015 The Year of the Healthcare
PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO JBaskin@nshs.
PREP Course #25: Hot Topics in Cyber Security and Database Security Presented by: Joe Baskin Manager, Information Security, OCIO [email protected] Objectives Discuss hot topics in cyber security and database
Electronic Communication In Your Practice. How To Use Email & Mobile Devices While Maintaining Compliance & Security
Electronic Communication In Your Practice How To Use Email & Mobile Devices While Maintaining Compliance & Security Agenda 1 HIPAA and Electronic Communication 2 3 4 Using Email In Your Practice Mobile
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Healthcare Information Security Today
Healthcare Information Security Today 2015 Survey Analysis: Evolving Threats and Health Info Security Efforts WHITE PAPER SURVEY BACKGROUND The Information Security Media Group conducts an annual Healthcare
Cyber Security An Exercise in Predicting the Future
Cyber Security An Exercise in Predicting the Future Paul Douglas, August 25, 2014 AUDIT & ACCOUNTING + CONSULTING + TAX SERVICES + TECHNOLOGY I www.pncpa.com I www.pntech.net What is Cyber Security? Measures
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord
Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Hot Topics in IT Security PREP#28 May 1, 2014. David Woska, Ph.D. OCIO Security
Hot Topics in IT Security PREP#28 May 1, 2014 David Woska, Ph.D. OCIO Security CME Disclosure Statement The North Shore LIJ Health System adheres to the ACCME s new Standards for Commercial Support. Any
INFORMATION SECURITY FOR YOUR AGENCY
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
Overview of the HIPAA Security Rule
Office of the Secretary Office for Civil Rights () Overview of the HIPAA Security Rule Office for Civil Rights Region IX Alicia Cornish, EOS Sheila Fischer, Supervisory EOS Topics Upon completion of this
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
PREP Course # 20: HIPAA Security Presented by: Joe Baskin, Manager, Information Security
PREP Course # 20: HIPAA Security Presented by: Joe Baskin, Manager, Information Security 1 CME Disclosure Statement The Northwell Health adheres to the ACCME s new Standards for Commercial Support. Any
Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use
Click to edit Master title style Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use Andy Petrovich, MHSA, MPH M-CEITA / Altarum Institute April 8, 2015 4/8/2015 1 1 Who is M-CEITA?
Data Protection Act 1998. Bring your own device (BYOD)
Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
8/3/2015. Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice
Integrating Behavioral Health and HIV Into Electronic Health Records Communities of Practice Monday, August 3, 2015 1 How to ask a question during the webinar If you dialed in to this webinar on your phone
EHS Privacy and Information Security
EHS Privacy and Information Security Resident Orientation 26 June 2015 Steve Winter CISSP, CNE, MCSE Senior Information Security Engineer Privacy and Information Security Office Erlanger Health System
The CIO s Guide to HIPAA Compliant Text Messaging
The CIO s Guide to HIPAA Compliant Text Messaging Executive Summary The risks associated with sending Electronic Protected Health Information (ephi) via unencrypted text messaging are significant, especially
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services
HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services How MSPs can profit from selling HIPAA security services Managed Service Providers (MSP) can use the Health Insurance Portability
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
I ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
What s New with HIPAA? Policy and Enforcement Update
What s New with HIPAA? Policy and Enforcement Update HHS Office for Civil Rights New Initiatives Precision Medicine Initiative (PMI), including Access Guidance Cybersecurity Developer portal NICS Final
Managing Mobile Device Security
Managing Mobile Device Security Kathy Downing, MA, RHIA, CHPS, PMP AHIMA Director Practice Excellence Objectives Understand how HIPAA and HITECH apply to mobile devices. Understand the oversight needed
INFORMATION SECURITY GUIDE. Employee Teleworking. Information Security Unit. Information Technology Services (ITS) July 2013
INFORMATION SECURITY GUIDE Employee Teleworking Information Security Unit Information Technology Services (ITS) July 2013 CONTENTS 1. Introduction... 2 2. Teleworking Risks... 3 3. Safeguards for College
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:
HIPAA Privacy Officer Orientation Presented by: Cathy Montgomery, RN Privacy Officer Job Description Serve as leader Develop Policies and Procedures Train staff Monitor activities Manage Business Associates
Security Best Practices for Mobile Devices
Security Best Practices for Mobile Devices Background & Introduction The following document is intended to assist your business in taking the necessary steps needed to utilize the best security practices
HIPAA for HIT and EHRs. Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals
HIPAA for HIT and EHRs Latest on Meaningful Use and EHR Certification: For Privacy and Security Professionals Donald Bechtel, CHP Siemens Health Services Patient Privacy Officer Fair Information Practices
State of Security Survey GLOBAL FINDINGS
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
State of South Carolina Policy Guidance and Training
State of South Carolina Policy Guidance and Training Policy Workshop All Agency Mobile Security July 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy Overview: Mobile Security
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
Cyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
White Paper. Data Security. The Top Threat Facing Enterprises Today
White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is
Cybersecurity for Meaningful Use. 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013
Cybersecurity for Meaningful Use 2013 FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013 Healthcare Sector Vulnerable to Hackers By Robert O Harrow Jr.,
Encryption Made Simple for Lawyers
Encryption Made Simple for Lawyers By David G. Ries, Esq. and John W. Simek Encryption is a topic that most attorneys don t want to touch with a 10-foot pole, but it is becoming a more and more important
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee
Why Email Encryption is Essential to the Safety of Your Business
Why Email Encryption is Essential to the Safety of Your Business What We ll Cover Email is Like a Postcard o The Cost of Unsecured Email 5 Steps to Implement Email Encryption o Know Your Compliance Regulations
How To Protect Yourself From Cyber Threats
Cyber Security for Non- Profit Organizations Scott Lawler CISSP- ISSAP, ISSMP, HCISPP Copyright 2015 LP3 May 2015 Agenda IT Security Basics e- Discovery Compliance Legal Risk Disaster Plans Non- Profit
Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice
Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice Agenda Learning objectives for this session Fundamentals of Mobile device use and correlation to HIPAA compliance HIPAA
FDA Releases Final Cybersecurity Guidance for Medical Devices
FDA Releases Final Cybersecurity Guidance for Medical Devices By Jean Marie R. Pechette and Ken Briggs Overview and General Principles On October 2, 2014, the Food and Drug Administration ( FDA ) finalized
2 0 1 4 F G F O A A N N U A L C O N F E R E N C E
I T G OV E R NANCE 2 0 1 4 F G F O A A N N U A L C O N F E R E N C E RAJ PATEL Plante Moran 248.223.3428 [email protected] This presentation will discuss current threats faced by public institutions,
Conducting a Risk Assessment for Mobile Devices
Conducting a Assessment for Mobile Devices May 9, 2012 David Frei Director, Digital/Information Security Specialist The Changing Environment Today s Discussion Available Industry Assessment Models Unique
Use of tablet devices in NHS environments: Good Practice Guideline
Use of Tablet Devices in NHS environments: Good Practice Guidelines Programme NPFIT Document Record ID Key Sub-Prog / Project Technology Office Prog. Director Chris Wilber Status APPROVED Owner James Wood
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011
Nationwide Review of CMS s HIPAA Oversight Brian C. Johnson, CPA, CISA Wednesday, January 19, 2011 1 WHAT I DO Manage Region IV IT Audit and Advance Audit Technique Staff (AATS) IT Audit consists of 8
Datto Compliance 101 1
Datto Compliance 101 1 Overview Overview This document provides a general overview of the Health Insurance Portability and Accounting Act (HIPAA) compliance requirements for Managed Service Providers (MSPs)
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:
1. Do you implement virus controls and filtering on all systems? Anti-Virus anti-virus software packages look for patterns in files or memory that indicate the possible presence of a known virus. Anti-virus
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014
Healthcare IT (HIT) Strategic Planning & Budgeting MARCH 26, 2014 Agenda Introduction / Session Overview HIT Budgeting 101 Security and Compliance EHR budgeting HIT Where Are We Going Q & A 2 Copyright
Data Breach Response Planning: Laying the Right Foundation
Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
What Data? I m A Trucking Company!
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 [email protected] Presented by: Rob D. Moseley, Jr. 2 West
HIPAA and HITECH Compliance for Cloud Applications
What Is HIPAA? The healthcare industry is rapidly moving towards increasing use of electronic information systems - including public and private cloud services - to provide electronic protected health
SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
