SlideShare a Scribd company logo
1 of 61
CYBER SECURITY
Scott Diehl
Vice President of Product Management
Aka. The Tech Guy
WORD & BROWN GENERAL AGENCY
INTRODUCTION
What is Cyber Security?
How Cyber-Safe is Your Business? / Statistics
Cyber Threats
Relevant Security and Privacy Laws
Consequences of a Breach
Tools to Aid in Cyber Security
WORD & BROWN GENERAL AGENCY
COURSE OBJECTIVES
• Understand Cyber Security & Common Threats
• Understand relevant security laws with which we must
comply
• Understand that any Internet-connected system can be
hacked and what to do in the event of a breach
• Obtain tools to aid in the event of a breach and to aid in
preventing a breach
WORD & BROWN GENERAL AGENCY
WHAT IS CYBER SECURITY?
• History
– 1988 – The Morris Worm
• Current
– A method of preventative security
measures designed to protect
systems and networks from such
attacks.
WORD & BROWN GENERAL AGENCY
FAST FACTS
• What is the cloud?
– This is storage on a centralized
server owned by a hosting company
– Ex: Azure, iCloud, AWS
• Think: “Accessible Anywhere”
• Aug 31, 2014 iCloud Hack – 200
celebrity photos posted to 4chan
WORD & BROWN GENERAL AGENCY
WHY IS HACKING SO PREVALENT?
• $$$$
– The TOR Network
• The AlphaBay Market
– Credit Cards for Sale
– RDP Access for Sale
WORD & BROWN GENERAL AGENCY
HOW CAN I BE HACKED?
• Implanted Medical Devices (~2006)
• 'Smart" Phone
• Connected Cars
• Communication Infrastructure (P25
Radio)
• Public Recording& Reflections (UNC
Labs)
• SmartPhone Accelerometer
WORD & BROWN GENERAL AGENCY
PERMISSIBLE HACKING?
• Advertising
– Ex: Gmail
• You’re being tracked on the
Internet at all times.
WORD & BROWN GENERAL AGENCY
PERMISSABLE HACKING?
• Gary Kovacs – Firefox
– Behavioral Tracking
WORD & BROWN GENERAL AGENCY
PERMISSABLE HACKING?
Gary Kovacs – Tracking the Trackers:
http://bit.ly/2cfUiWI
WORD & BROWN GENERAL AGENCY
HOW CYBER-SAFE IS YOUR BUSINESS & LIFE?
• 2015 Major Breaches
– Experian – 15 Million Records
– Anthem - 80 Million Records
– Target – 50 Million Records
– Home Depot – 15 Million Records
– JP Morgan Chase – 12 Million
Records
WORD & BROWN GENERAL AGENCY
HOW CYBER-SAFE IS YOUR BUSINESS & LIFE?
• And healthcare is becoming
increasingly targeted … with very
good reasons ... And results.
WORD & BROWN GENERAL AGENCY
HOW CYBER-SAFE IS YOUR BUSINESS & LIFE?
• 2016 Data Breach Category Summary
• Institution Type | # Breaches
• Banking/Credit/Financial: 4
• Business: 82
• Educational: 20
• Government/Military: 8
• Medical/Healthcare: 63
SOURCE: 2016 DATA BREACH CATEGORY SUMMARY | IDENTITY THEFT
RESOURCE CENTER
WORD & BROWN GENERAL AGENCY
HOW CYBER-SAFE IS YOUR BUSINESS & LIFE?
• 2016 Data Breach Category Summary
• Institution Type | # Records
• Banking/Credit/Financial: 4,382
• Business: 365,356
• Educational: 307,457
• Government/Military: 102,459
• Medical/Healthcare: 3,828,098
SOURCE: 2016 DATA BREACH CATEGORY SUMMARY | IDENTITY THEFT
RESOURCE CENTER
WORD & BROWN GENERAL AGENCY
HOW CYBER-SAFE IS YOUR BUSINESS & LIFE?
• From all the news, you might
assume that only big companies
like these are targets.
WORD & BROWN GENERAL AGENCY
HOW CYBER-SAFE IS YOUR BUSINESS & LIFE?
• WRONG!
• The National Small Business
Association (NSBA) released
statistics showing 68% of their
small business membership
reported being a cyber-victim more
than once.
WORD & BROWN GENERAL AGENCY
CYBER THREATS
• 2016 Targets
– Attacks through employees
– The cloud
– Seniors
– Automobiles
– Cloud Services
– Hardware & VMs
– Wearable Tech
– Internet Ads
– Wifi Hotspots
WORD & BROWN GENERAL AGENCY
CYBER THREATS
• Employee Attacks
– Phishing & Whaling
– Our security is as strong as our
least-informed employee.
– Do you have employee security
awareness training?
WORD & BROWN GENERAL AGENCY
CYBER THREATS
• The Clouds
– Microsoft Azure, Yammer
– Amazon Web Services
– Salesforce Cloud
– Cisco & Citrix
– File-Sharing: Box, Dropbox, Cubby
WORD & BROWN GENERAL AGENCY
CYBER THREATS
• Internet Ads
• Ads when clicked can take you to a
predator site that loads viruses,
malware, adware, spyware and other
harmful code.
• According to the Association of National
Advertisers: ad-fraud has cost global
advertisers more then $6 Billion in 2015.
WORD & BROWN GENERAL AGENCY
CYBER THREATS
• Malware
• An umbrella term used to refer to a
variety of forms of hostile or intrusive
software, including computer viruses,
worms, trojan horses, ransomware,
spyway, adware, scareware and
other malicious programs. It can
take the form of executable code,
scriprts, active contet and other
software.
WORD & BROWN GENERAL AGENCY
CYBER THREATS
Google: Three tips for spotting Malware
http://bit.ly/2ctzzCU
WORD & BROWN GENERAL AGENCY
CYBER THREATS
• Phishing
• The attempt to acquire sensitive
information such as usernames,
passwords and credit card
details, often for malicious
reasons, by masquerading as a
trustworthy entity in an electronic
communication.
WORD & BROWN GENERAL AGENCY
CYBER THREATS
What is Phishing?
http://bit.ly/2bEYUJY
WORD & BROWN GENERAL AGENCY
CYBER THREATS
• Ransomware
• A type of malware that can be covertly
installed on a computer without
knowledge or intention of the user that
restricts access to the infected computer
system in some way and demads the
user pay a ransom to the operators to
remove restrictions.
• EX: Hollywood Presbyterian
WORD & BROWN GENERAL AGENCY
CYBER THREATS
RansomWare – Hollywood Presbyterian Story:
http://bit.ly/2bF06wW
WORD & BROWN GENERAL AGENCY
CYBER THREATS
• Whaling
• A new phenomenon
• Executive-directed
WORD & BROWN GENERAL AGENCY
CYBER THREATS
• Social Engineering
– Harvard Study
• Social Engineering
WORD & BROWN GENERAL AGENCY
CYBER THREATS
What is your Password?
https://www.youtube.com/watch?v=InTxJIF_bC
o
WORD & BROWN GENERAL AGENCY
CYBER THREATS
• Public Wifi
– How many here are connected to the
free “public” wifi?
– Are you sure you’re connected to the
right connection?
• Public Wifi
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA
• Stands for?
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA
• Enacted in 1996
• Set standards for the protection of
health care information.
• Provides the ability to transfer and
continue health insurance coverage for
workers when they change or lose
their jobs.
• Reduce health care fraud and abuse.
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA - Factoid
• The FBI estimates that Health
Care Fraud costs American tax
payers $80 Billion/yr.
• Examples?
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• What agency administers HIPAA?
• FBI
• HHS
• CMS
• CDI
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA
– Privacy
– Portability
– Accountability
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA – Portability
– Limits the ability for a new employer to
exclude someone from coverage due to a
pre-existing condition.
– Provides additional opportunities to enroll in
a group health plan if you lose coverage.
– Prohibits discrimination based on health
factors such as a prior medical condition.
– Guarantees that certain individuals will
have access to and can renew their
individual health insurance policies.
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA – Portability
– Certificates of Creditable Coverage
• Issued after a loss of coverage, enables
continuation of coverage
• Who was covered
• Start & end dates of coverage
• Details the coverage provided
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA – Portability
– Certificates of Creditable Coverage
• Issued after a loss of coverage, enables
continuation of coverage
• Who was covered
• Start & end dates of coverage
• Details the coverage provided
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA + ARRA – Business
Associates
– General Agencies
– Insurance Brokers
– 3rd Party Administrators
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HITECH
– Health Information Technology for
Economic & Clinical Health
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HITECH
– Strengthened the notification and
penalty requirements for HIPAA
violations
– Business Associates are now subject
to ARRA’s civil and criminal penalty
provisions.
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA – Health Information
– Individually identifiable information
that relates to:
• The past, present or future physical or
mental health or condition of a member
• The provisions of health care to a member
of a plan
• The past, present or future payment for
the provisions of health care to a member
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA – Health Information
– Examples …
• Medical Conditions
• Treatments
• Medications
• Payment Information for Health Care
Services
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA – Health Information
– PII vs. PHI
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA – Health Information
– PII vs. PHI
– Personally Identifiable Information
refers to information that can be used
to uniquely identify, contact, locate a
single person or that can be used by
other sources to uniquely identify a
single individual.
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA – Health Information
– Personaly Identifiable Information
• Name
• Phone Number
• E-mail Address
• Address
• SSN
• License Plate #
• Account Number
• City
• Medical Record Number
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA – Health Information
– Protected Health Information (PHI)
• Any information about health status,
provisions of health care or payments of
health care that can be linked to a
specific individual
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA – Health Information
– Protected Health Information (PHI)
• Medical Condition + SSN = PHI
• Treatments + Phone # = PHI
• Payment Info + E-Mail Address = PHI
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA – Health Information
– EPHI?
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• HIPAA – Health Information
– EPHI
• Emails which contain PHI.
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• PCI DSS
– Payment Card Industry – Data
Security Standards
WORD & BROWN GENERAL AGENCY
RELEVANT SECURITY AND PRIVACY
LAWS
• State Laws
– like California SB 1386 & AB 1710
– Security Breech Notification, 2003
– Purchased Data, 2014
WORD & BROWN GENERAL AGENCY
CONSEQUENCES OF A BREACH
• Identify a breach
– Incorrectly sending PHI to the wrong
email
– Sending email not-encrypted (SSL +
TLS or Encryption Service)
– Intruision
– Improper disclosure
– Los Information
WORD & BROWN GENERAL AGENCY
CONSEQUENCES OF A BREACH
• Identify a breach
– ITRC defines a breach as, “an
incident in which sensitive,
protected, or confidential data has
potentially been viewed, stolen, or
used by an individual unauthorized
to do so.
WORD & BROWN GENERAL AGENCY
CONSEQUENCES OF A BREACH
• Fines
– Violations range from $100.00 to
$50,000 per violation per day.
– Ignorance is no excuse!
WORD & BROWN GENERAL AGENCY
CONSEQUENCES OF A BREACH
• No one can put the consequences
more eloquently than someone
who has suffered a breach.
• Monika Lewinsky
WORD & BROWN GENERAL AGENCY
CONSEQUENCES OF A BREACH
Monica Lewinsky – The Price of Shame:
https://www.youtube.com/watch?v=xvSxxpFKJ5
w
WORD & BROWN GENERAL AGENCY
CONSEQUENCES OF A BREACH
• HIPAA Violation Fines
• Loss of clients
• Loss of reputation
• Personal liabilities – including
consequences at work
WORD & BROWN GENERAL AGENCY
TOOLS TO AID IN CYBER SECURITY
• BE PREPARED
– Identify a procedure for breach
protocol
– Designate someone to understand
compliance
– Have an investigative process in-
place to define a breach
WORD & BROWN GENERAL AGENCY
TOOLS TO AID IN CYBER SECURITY
• BE PREPARED
– Use 2-Factor Authentication
– Strong Passwords (get a password
manager for your phone!)
– Avoid unknown Android Apps (20K
apps with Malware)
– Don’t use public Wifi
WORD & BROWN GENERAL AGENCY
Thank you!
If you have any questions: sdiehl@wordandbrown.com

More Related Content

Viewers also liked

Power Point Lesson 07 P2
Power Point Lesson 07 P2Power Point Lesson 07 P2
Power Point Lesson 07 P2Nasir Jumani
 
Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security Panda Security
 
Drugs & tthe Dark Net
Drugs & tthe Dark NetDrugs & tthe Dark Net
Drugs & tthe Dark NetTim Bingham
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leonDarwin de Leon
 
Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizonteam-WIBU
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 
Deep web (Dark side)
Deep web (Dark side)Deep web (Dark side)
Deep web (Dark side)Zied ElAti
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsAndres Baravalle
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?Pierluigi Paganini
 
DiversITy matters - Juliette Reinders Folmer - Codemotion Amsterdam 2016
DiversITy matters - Juliette Reinders Folmer - Codemotion Amsterdam 2016DiversITy matters - Juliette Reinders Folmer - Codemotion Amsterdam 2016
DiversITy matters - Juliette Reinders Folmer - Codemotion Amsterdam 2016Codemotion
 
Attacks, Lies and the Underground World - Andrea Pompili - Codemotion Amsterd...
Attacks, Lies and the Underground World - Andrea Pompili - Codemotion Amsterd...Attacks, Lies and the Underground World - Andrea Pompili - Codemotion Amsterd...
Attacks, Lies and the Underground World - Andrea Pompili - Codemotion Amsterd...Codemotion
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and securityAlisha Korpal
 

Viewers also liked (20)

CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
Online Blackmarket List
Online Blackmarket ListOnline Blackmarket List
Online Blackmarket List
 
Power Point Lesson 07 P2
Power Point Lesson 07 P2Power Point Lesson 07 P2
Power Point Lesson 07 P2
 
5 Effective Training Tools for Truck Drivers
5 Effective Training Tools for Truck Drivers5 Effective Training Tools for Truck Drivers
5 Effective Training Tools for Truck Drivers
 
Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security Why cyber-criminals target Healthcare - Panda Security
Why cyber-criminals target Healthcare - Panda Security
 
Drugs & tthe Dark Net
Drugs & tthe Dark NetDrugs & tthe Dark Net
Drugs & tthe Dark Net
 
Open bazaar
Open bazaarOpen bazaar
Open bazaar
 
The dark web darwin de leon
The dark web   darwin de leonThe dark web   darwin de leon
The dark web darwin de leon
 
Medtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the HorizonMedtec - Cyber-security Challenges on the Horizon
Medtec - Cyber-security Challenges on the Horizon
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 
Deep web (Dark side)
Deep web (Dark side)Deep web (Dark side)
Deep web (Dark side)
 
Dark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developmentsDark web markets: from the silk road to alphabay, trends and developments
Dark web markets: from the silk road to alphabay, trends and developments
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
DiversITy matters - Juliette Reinders Folmer - Codemotion Amsterdam 2016
DiversITy matters - Juliette Reinders Folmer - Codemotion Amsterdam 2016DiversITy matters - Juliette Reinders Folmer - Codemotion Amsterdam 2016
DiversITy matters - Juliette Reinders Folmer - Codemotion Amsterdam 2016
 
Attacks, Lies and the Underground World - Andrea Pompili - Codemotion Amsterd...
Attacks, Lies and the Underground World - Andrea Pompili - Codemotion Amsterd...Attacks, Lies and the Underground World - Andrea Pompili - Codemotion Amsterd...
Attacks, Lies and the Underground World - Andrea Pompili - Codemotion Amsterd...
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 

Similar to Cyber Security - NAHU Continuing Education Course

HIPAA Compliance and Security in a Mobile World
HIPAA Compliance and Security in a Mobile WorldHIPAA Compliance and Security in a Mobile World
HIPAA Compliance and Security in a Mobile WorldRyan Snell
 
Protecting Patient Privacy: Navigating HIPAA in Digital Landscapes
Protecting Patient Privacy: Navigating HIPAA in Digital LandscapesProtecting Patient Privacy: Navigating HIPAA in Digital Landscapes
Protecting Patient Privacy: Navigating HIPAA in Digital LandscapesConference Panel
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 Jason Karn
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response PlanNext Dimension Inc.
 
Don't Let HIPAA Violations Happen: Tips for Staying Safe Online
Don't Let HIPAA Violations Happen: Tips for Staying Safe OnlineDon't Let HIPAA Violations Happen: Tips for Staying Safe Online
Don't Let HIPAA Violations Happen: Tips for Staying Safe OnlineConference Panel
 
Becoming HITECH - 9/2009
Becoming HITECH - 9/2009Becoming HITECH - 9/2009
Becoming HITECH - 9/2009rogersons
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Lawley Insurance
 
HIPAA Compliant Social Media for Professionals
HIPAA Compliant Social Media for ProfessionalsHIPAA Compliant Social Media for Professionals
HIPAA Compliant Social Media for ProfessionalsMarlene Maheu
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach CostResilient Systems
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Diana Maier
 
Fraud, Infringement, HIPAA and Treble Damages: Creating Compliance Strategies...
Fraud, Infringement, HIPAA and Treble Damages: Creating Compliance Strategies...Fraud, Infringement, HIPAA and Treble Damages: Creating Compliance Strategies...
Fraud, Infringement, HIPAA and Treble Damages: Creating Compliance Strategies...HostingCon
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013StampedeCon
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA ComplianceRaffa Learning Community
 
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT AssessmentRachel Caldwell
 
HIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewHIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewClearDATACloud
 

Similar to Cyber Security - NAHU Continuing Education Course (20)

HIPAA Compliance and Security in a Mobile World
HIPAA Compliance and Security in a Mobile WorldHIPAA Compliance and Security in a Mobile World
HIPAA Compliance and Security in a Mobile World
 
Protecting Patient Privacy: Navigating HIPAA in Digital Landscapes
Protecting Patient Privacy: Navigating HIPAA in Digital LandscapesProtecting Patient Privacy: Navigating HIPAA in Digital Landscapes
Protecting Patient Privacy: Navigating HIPAA in Digital Landscapes
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
 
CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014 CAHU EXPO Grove City, OH 2014
CAHU EXPO Grove City, OH 2014
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
Don't Let HIPAA Violations Happen: Tips for Staying Safe Online
Don't Let HIPAA Violations Happen: Tips for Staying Safe OnlineDon't Let HIPAA Violations Happen: Tips for Staying Safe Online
Don't Let HIPAA Violations Happen: Tips for Staying Safe Online
 
Becoming HITECH - 9/2009
Becoming HITECH - 9/2009Becoming HITECH - 9/2009
Becoming HITECH - 9/2009
 
Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015Cybersecurity Seminar March 2015
Cybersecurity Seminar March 2015
 
HIPAA Compliant Social Media for Professionals
HIPAA Compliant Social Media for ProfessionalsHIPAA Compliant Social Media for Professionals
HIPAA Compliant Social Media for Professionals
 
Deconstructing Data Breach Cost
Deconstructing Data Breach CostDeconstructing Data Breach Cost
Deconstructing Data Breach Cost
 
Co3 rsc r5
Co3 rsc r5Co3 rsc r5
Co3 rsc r5
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
2016-04-21 HIPAA
2016-04-21 HIPAA2016-04-21 HIPAA
2016-04-21 HIPAA
 
Fraud, Infringement, HIPAA and Treble Damages: Creating Compliance Strategies...
Fraud, Infringement, HIPAA and Treble Damages: Creating Compliance Strategies...Fraud, Infringement, HIPAA and Treble Damages: Creating Compliance Strategies...
Fraud, Infringement, HIPAA and Treble Damages: Creating Compliance Strategies...
 
Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013Big Data and Big Law at Walmart - StampedeCon 2013
Big Data and Big Law at Walmart - StampedeCon 2013
 
2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance2017-01-24 Introduction of PCI and HIPAA Compliance
2017-01-24 Introduction of PCI and HIPAA Compliance
 
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment
 
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment
 
HIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewHIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An Overview
 

Recently uploaded

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Cyber Security - NAHU Continuing Education Course

  • 1. CYBER SECURITY Scott Diehl Vice President of Product Management Aka. The Tech Guy
  • 2. WORD & BROWN GENERAL AGENCY INTRODUCTION What is Cyber Security? How Cyber-Safe is Your Business? / Statistics Cyber Threats Relevant Security and Privacy Laws Consequences of a Breach Tools to Aid in Cyber Security
  • 3. WORD & BROWN GENERAL AGENCY COURSE OBJECTIVES • Understand Cyber Security & Common Threats • Understand relevant security laws with which we must comply • Understand that any Internet-connected system can be hacked and what to do in the event of a breach • Obtain tools to aid in the event of a breach and to aid in preventing a breach
  • 4. WORD & BROWN GENERAL AGENCY WHAT IS CYBER SECURITY? • History – 1988 – The Morris Worm • Current – A method of preventative security measures designed to protect systems and networks from such attacks.
  • 5. WORD & BROWN GENERAL AGENCY FAST FACTS • What is the cloud? – This is storage on a centralized server owned by a hosting company – Ex: Azure, iCloud, AWS • Think: “Accessible Anywhere” • Aug 31, 2014 iCloud Hack – 200 celebrity photos posted to 4chan
  • 6. WORD & BROWN GENERAL AGENCY WHY IS HACKING SO PREVALENT? • $$$$ – The TOR Network • The AlphaBay Market – Credit Cards for Sale – RDP Access for Sale
  • 7. WORD & BROWN GENERAL AGENCY HOW CAN I BE HACKED? • Implanted Medical Devices (~2006) • 'Smart" Phone • Connected Cars • Communication Infrastructure (P25 Radio) • Public Recording& Reflections (UNC Labs) • SmartPhone Accelerometer
  • 8. WORD & BROWN GENERAL AGENCY PERMISSIBLE HACKING? • Advertising – Ex: Gmail • You’re being tracked on the Internet at all times.
  • 9. WORD & BROWN GENERAL AGENCY PERMISSABLE HACKING? • Gary Kovacs – Firefox – Behavioral Tracking
  • 10. WORD & BROWN GENERAL AGENCY PERMISSABLE HACKING? Gary Kovacs – Tracking the Trackers: http://bit.ly/2cfUiWI
  • 11. WORD & BROWN GENERAL AGENCY HOW CYBER-SAFE IS YOUR BUSINESS & LIFE? • 2015 Major Breaches – Experian – 15 Million Records – Anthem - 80 Million Records – Target – 50 Million Records – Home Depot – 15 Million Records – JP Morgan Chase – 12 Million Records
  • 12. WORD & BROWN GENERAL AGENCY HOW CYBER-SAFE IS YOUR BUSINESS & LIFE? • And healthcare is becoming increasingly targeted … with very good reasons ... And results.
  • 13. WORD & BROWN GENERAL AGENCY HOW CYBER-SAFE IS YOUR BUSINESS & LIFE? • 2016 Data Breach Category Summary • Institution Type | # Breaches • Banking/Credit/Financial: 4 • Business: 82 • Educational: 20 • Government/Military: 8 • Medical/Healthcare: 63 SOURCE: 2016 DATA BREACH CATEGORY SUMMARY | IDENTITY THEFT RESOURCE CENTER
  • 14. WORD & BROWN GENERAL AGENCY HOW CYBER-SAFE IS YOUR BUSINESS & LIFE? • 2016 Data Breach Category Summary • Institution Type | # Records • Banking/Credit/Financial: 4,382 • Business: 365,356 • Educational: 307,457 • Government/Military: 102,459 • Medical/Healthcare: 3,828,098 SOURCE: 2016 DATA BREACH CATEGORY SUMMARY | IDENTITY THEFT RESOURCE CENTER
  • 15. WORD & BROWN GENERAL AGENCY HOW CYBER-SAFE IS YOUR BUSINESS & LIFE? • From all the news, you might assume that only big companies like these are targets.
  • 16. WORD & BROWN GENERAL AGENCY HOW CYBER-SAFE IS YOUR BUSINESS & LIFE? • WRONG! • The National Small Business Association (NSBA) released statistics showing 68% of their small business membership reported being a cyber-victim more than once.
  • 17. WORD & BROWN GENERAL AGENCY CYBER THREATS • 2016 Targets – Attacks through employees – The cloud – Seniors – Automobiles – Cloud Services – Hardware & VMs – Wearable Tech – Internet Ads – Wifi Hotspots
  • 18. WORD & BROWN GENERAL AGENCY CYBER THREATS • Employee Attacks – Phishing & Whaling – Our security is as strong as our least-informed employee. – Do you have employee security awareness training?
  • 19. WORD & BROWN GENERAL AGENCY CYBER THREATS • The Clouds – Microsoft Azure, Yammer – Amazon Web Services – Salesforce Cloud – Cisco & Citrix – File-Sharing: Box, Dropbox, Cubby
  • 20. WORD & BROWN GENERAL AGENCY CYBER THREATS • Internet Ads • Ads when clicked can take you to a predator site that loads viruses, malware, adware, spyware and other harmful code. • According to the Association of National Advertisers: ad-fraud has cost global advertisers more then $6 Billion in 2015.
  • 21. WORD & BROWN GENERAL AGENCY CYBER THREATS • Malware • An umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyway, adware, scareware and other malicious programs. It can take the form of executable code, scriprts, active contet and other software.
  • 22. WORD & BROWN GENERAL AGENCY CYBER THREATS Google: Three tips for spotting Malware http://bit.ly/2ctzzCU
  • 23. WORD & BROWN GENERAL AGENCY CYBER THREATS • Phishing • The attempt to acquire sensitive information such as usernames, passwords and credit card details, often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.
  • 24. WORD & BROWN GENERAL AGENCY CYBER THREATS What is Phishing? http://bit.ly/2bEYUJY
  • 25. WORD & BROWN GENERAL AGENCY CYBER THREATS • Ransomware • A type of malware that can be covertly installed on a computer without knowledge or intention of the user that restricts access to the infected computer system in some way and demads the user pay a ransom to the operators to remove restrictions. • EX: Hollywood Presbyterian
  • 26. WORD & BROWN GENERAL AGENCY CYBER THREATS RansomWare – Hollywood Presbyterian Story: http://bit.ly/2bF06wW
  • 27. WORD & BROWN GENERAL AGENCY CYBER THREATS • Whaling • A new phenomenon • Executive-directed
  • 28. WORD & BROWN GENERAL AGENCY CYBER THREATS • Social Engineering – Harvard Study • Social Engineering
  • 29. WORD & BROWN GENERAL AGENCY CYBER THREATS What is your Password? https://www.youtube.com/watch?v=InTxJIF_bC o
  • 30. WORD & BROWN GENERAL AGENCY CYBER THREATS • Public Wifi – How many here are connected to the free “public” wifi? – Are you sure you’re connected to the right connection? • Public Wifi
  • 31. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA • Stands for?
  • 32. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA • Enacted in 1996 • Set standards for the protection of health care information. • Provides the ability to transfer and continue health insurance coverage for workers when they change or lose their jobs. • Reduce health care fraud and abuse.
  • 33. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA - Factoid • The FBI estimates that Health Care Fraud costs American tax payers $80 Billion/yr. • Examples?
  • 34. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • What agency administers HIPAA? • FBI • HHS • CMS • CDI
  • 35. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA – Privacy – Portability – Accountability
  • 36. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA – Portability – Limits the ability for a new employer to exclude someone from coverage due to a pre-existing condition. – Provides additional opportunities to enroll in a group health plan if you lose coverage. – Prohibits discrimination based on health factors such as a prior medical condition. – Guarantees that certain individuals will have access to and can renew their individual health insurance policies.
  • 37. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA – Portability – Certificates of Creditable Coverage • Issued after a loss of coverage, enables continuation of coverage • Who was covered • Start & end dates of coverage • Details the coverage provided
  • 38. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA – Portability – Certificates of Creditable Coverage • Issued after a loss of coverage, enables continuation of coverage • Who was covered • Start & end dates of coverage • Details the coverage provided
  • 39. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA + ARRA – Business Associates – General Agencies – Insurance Brokers – 3rd Party Administrators
  • 40. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HITECH – Health Information Technology for Economic & Clinical Health
  • 41. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HITECH – Strengthened the notification and penalty requirements for HIPAA violations – Business Associates are now subject to ARRA’s civil and criminal penalty provisions.
  • 42. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA – Health Information – Individually identifiable information that relates to: • The past, present or future physical or mental health or condition of a member • The provisions of health care to a member of a plan • The past, present or future payment for the provisions of health care to a member
  • 43. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA – Health Information – Examples … • Medical Conditions • Treatments • Medications • Payment Information for Health Care Services
  • 44. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA – Health Information – PII vs. PHI
  • 45. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA – Health Information – PII vs. PHI – Personally Identifiable Information refers to information that can be used to uniquely identify, contact, locate a single person or that can be used by other sources to uniquely identify a single individual.
  • 46. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA – Health Information – Personaly Identifiable Information • Name • Phone Number • E-mail Address • Address • SSN • License Plate # • Account Number • City • Medical Record Number
  • 47. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA – Health Information – Protected Health Information (PHI) • Any information about health status, provisions of health care or payments of health care that can be linked to a specific individual
  • 48. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA – Health Information – Protected Health Information (PHI) • Medical Condition + SSN = PHI • Treatments + Phone # = PHI • Payment Info + E-Mail Address = PHI
  • 49. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA – Health Information – EPHI?
  • 50. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • HIPAA – Health Information – EPHI • Emails which contain PHI.
  • 51. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • PCI DSS – Payment Card Industry – Data Security Standards
  • 52. WORD & BROWN GENERAL AGENCY RELEVANT SECURITY AND PRIVACY LAWS • State Laws – like California SB 1386 & AB 1710 – Security Breech Notification, 2003 – Purchased Data, 2014
  • 53. WORD & BROWN GENERAL AGENCY CONSEQUENCES OF A BREACH • Identify a breach – Incorrectly sending PHI to the wrong email – Sending email not-encrypted (SSL + TLS or Encryption Service) – Intruision – Improper disclosure – Los Information
  • 54. WORD & BROWN GENERAL AGENCY CONSEQUENCES OF A BREACH • Identify a breach – ITRC defines a breach as, “an incident in which sensitive, protected, or confidential data has potentially been viewed, stolen, or used by an individual unauthorized to do so.
  • 55. WORD & BROWN GENERAL AGENCY CONSEQUENCES OF A BREACH • Fines – Violations range from $100.00 to $50,000 per violation per day. – Ignorance is no excuse!
  • 56. WORD & BROWN GENERAL AGENCY CONSEQUENCES OF A BREACH • No one can put the consequences more eloquently than someone who has suffered a breach. • Monika Lewinsky
  • 57. WORD & BROWN GENERAL AGENCY CONSEQUENCES OF A BREACH Monica Lewinsky – The Price of Shame: https://www.youtube.com/watch?v=xvSxxpFKJ5 w
  • 58. WORD & BROWN GENERAL AGENCY CONSEQUENCES OF A BREACH • HIPAA Violation Fines • Loss of clients • Loss of reputation • Personal liabilities – including consequences at work
  • 59. WORD & BROWN GENERAL AGENCY TOOLS TO AID IN CYBER SECURITY • BE PREPARED – Identify a procedure for breach protocol – Designate someone to understand compliance – Have an investigative process in- place to define a breach
  • 60. WORD & BROWN GENERAL AGENCY TOOLS TO AID IN CYBER SECURITY • BE PREPARED – Use 2-Factor Authentication – Strong Passwords (get a password manager for your phone!) – Avoid unknown Android Apps (20K apps with Malware) – Don’t use public Wifi
  • 61. WORD & BROWN GENERAL AGENCY Thank you! If you have any questions: sdiehl@wordandbrown.com

Editor's Notes

  1. https://www.youtube.com/watch?v=1kI2XgGEzms -> Morris Worm
  2. Who has a FREE Gmail account?
  3. https://www.youtube.com/watch?v=f_f5wNw-2c0
  4. Of the 4,607,752 records stolen in 2016, 83.1% of them were in Medical/Healthcare.
  5. https://www.youtube.com/watch?v=nvIXGeB1WgE
  6. https://www.youtube.com/watch?v=9TRR6lHviQc
  7. Hospital Example
  8. Hospital Example
  9. Friend’s story
  10. People in a line waiting at a copy machine What are effective ways to cut in line? (Any ideas?) Option 1: “Excuse me, I have 5 pages. May I use the Xerox machine? - 60% effective Option 2: “Excuse me, I have 5 pages. May I use the Xerox machine, because I’m in a rush?” – 94% effective The word “because” was the key – it didn’t matter what was said after that, only the feeling that an explanation was given. Option 3: “Excuse me, I have 5 pages. May I use the Xerox machine because I have to make some copies?” – 94% effective Psychological Backdoors: Liking Reciprocation
  11. The US Department of Health & Human Services (HHS) implemented the requirements of HIPAA to address the use and disclosure of individuals’ health information by all Covered Entities. Types of covered entities? Health Plans, Data Processors, Doctors, Hospitals The American Recovery & Reinvestment Act of 2009 (ARRA) extends this requirement to Business Associates.
  12. Privacy/Security – set standards for the protection of health care information Accountability – Reduce health care frauw and abuse Portability -
  13. Privacy/Security – set standards for the protection of health care information Accountability – Reduce health care frauw and abuse Portability -
  14. Privacy/Security – set standards for the protection of health care information Accountability – Reduce health care frauw and abuse Portability -
  15. Privacy/Security – set standards for the protection of health care information Accountability – Reduce health care frauw and abuse Portability -
  16. Privacy/Security – set standards for the protection of health care information Accountability – Reduce health care frauw and abuse Portability -
  17. Year? 2009 – part of ARRA – American Recovery & Reinvestment Act 2009
  18. Electronic Protected Health Information – defined as PHI that is maintained or transmitted via electronic means
  19. SB1386 Amended Civil codes 1798.29, 1798.82 and 1798.84 -> regulates privacy of personal information. Enacted 2003; requires victims of a breach be notified and sets standards for that notification.
  20. There are civil monetary penalties for failure to comply with the Rule. The penalties are ranked on a tiered level based on levels of culpability. If the covered entity or business associate did not know and could not have known of the HIPAA violation, then the penalty range is $100 - $50,000 per incident. If the covered entity or business associate knew, or would have known through reasonable due diligence, that an act or omission would violate the Rule, but did not act with willful intent, then the penalty range is $1,000 - $50,000 per incident. If the covered entity or business associate acted with willful neglect, but corrected its violation within 30 days, then the penalty range is $10,000 - $50,000 per incident. If the covered entity or business associate acted with willful neglect and took no corrective measures within 30 days, then the penalty is $50,000 per incident. There is an annual aggregate cap of $1.5 million for violations of the same provision.
  21. https://www.youtube.com/watch?v=H_8y0WLm78U&spfreload=5
  22. When an organization puts policies in place to follow HIPAA guidelines and allows workforce members to violate them without consequence, that organization is subject to penalties under HIPAA.
  23. Unseen.is <- Anonymous Free Email Tor Firefox Browser <- Anonymous Browsing Read Privacy Policies Use Spam Filters
  24. Unseen.is <- Anonymous Free Email Tor Firefox Browser <- Anonymous Browsing Read Privacy Policies Use Spam Filters