SIDEBAR
»
S
I
D
E
B
A
R
«
What C-Level Executives Need to Know about Ransomware
Aug 10th, 2016 by aperio

With warnings about ransomware appearing more frequently in the news, what do you need to know to protect your company?

 

What Is Ransomware?

 

Ransomware is a kind of software that makes it possible for hackers to block access to your files and data, often by encrypting them. You are then required to pay a ransom, often in the form of Bitcoin, in order to regain access to your information.

 

What Kinds of Computers and Devices Are At Risk from Ransomware Attacks?

 

According to a PCWorld article on ransomware from this year, while computers running Windows are a major target, there are also applications targeting Android and attacks on Linux servers have recently been on the increase. Mobile devices such as smartphones can also be especially vulnerable, as users often download applications to them without carefully considering security risks.

 

What Methods Do Cyber Criminals Use to Infect Your Systems with Ransomware?

 

There are several methods, and these are not always technological in nature. One method is phishing, which involves tricking users into giving away information such as passwords, credit card details, and more. You may also have heard of spear phishing, which is a particular type of phishing. In spear phishing, hackers present users with apparently trustworthy requests for information.

 

Can You Rely on Law Enforcement to Get Your Data Back After a Ransomware Attack?

 

No. Most of the time, law enforcement can do very little to help you recover your data. Your best bet is to focus on prevention, keeping your security patches and updates current, having effective data backups, and having a well-tested recovery plan.

 

It’s important to remember that your backups should not be connected to your main system. If your backup is connected, the ransomware can block access to it too, leaving you with nothing. Many security experts recommend the 3-2-1 rule. This means you should have at least three copies of your data, have it stored in two different formats, and have at least one copy stored offline or off site.

 

If All Else Fails, Should You Pay a Ransom to Recover Your Data?

 

There are differing opinions on this, even among law enforcement officials. In some cases, such as hospitals who face the risk of harm or even death to their patients if they can’t quickly recover data, it might seem advisable to pay a ransom.

 

However, there is never a guarantee that cyber criminals will actually return access. And worse, knowing that a business has paid a ransom may make that business or others in the same industry tempting targets for future attacks.

 

Can You Count on Security Updates to Always Protect Your Company from Ransomware Attacks?

 

Unfortunately, no. Your company’s information will still be at risk from zeroday vulnerabilities. A zero-day vulnerability refers to a hole in security that is at first unknown to a software vendor. There is a period of time between the creation of an attack exploiting that hole in security, and the release of security updates by the software’s developers. During that period of time, your information can be attacked.

 

Promptly uploading security updates helps to minimize this risk, but ultimately your company will need to be prepared to recover from data backups if you have to bad luck to be attacked during the period of vulnerability.

 

Ransomware is constantly evolving, making it a difficult challenge for companies to protect against. This makes it especially important to do all that you can to minimize your company’s risk from attack.

 

 

 

 

Ransomware Risk for Smaller Companies On the Rise
Jul 28th, 2016 by aperio

The threat of ransomware attacks is on the rise in 2016. Ransomware itself has been around for decades and is constantly evolving. This presents a serious security challenge for both small and large businesses.

 

The good news is that larger companies are improving their security as they become more aware of the risk. But in an ironic twist, their improved security can be bad news for small or mid-sized businesses. With cyber criminals having less success with large targets, they are switching to companies with smaller security budgets and less experience protecting themselves from attacks.

 

Ransomware History Highlights

 

  • 1989 – AIDS Trojan (a.k.a. PC Cyborg). This “generation one” ransomware was fairly easy to overcome as it simple cryptography and tools were quickly developed to decrypt affected files.
  • 2006
    • Archiveus Trojan. This was the first ransomware to use RSA encryption. It encrypted all items in the MyDocuments directory. Victims were required to buy items from an online pharmacy in order to receive a password to regain access to their files.
    • GPcode Trojan. This spread via an email attachment which appeared to be a job application. It also used a more sophisticated encryption method.
  • 2007 – WinLock. This did not use encryption. Instead, it locked out users while displaying pornographic images. It required users to send a $10 premium-rate SMS in order to receive a code to unlock their computers.
  • 2008 – GPcode.AK virus. This was a variant of the GPcode trojan and used even more sophisticated encryption.

 

Explosive Growth of Ransomware

 

From 2012 until the present, there has been an explosion in the growth of ransomware. This was due in part to the use of anonymous payment services, which made collecting payments from victims much simpler for ransomware creators. Symantecs Internet Security Threat Report from April 2016 show the alarmingly rapid increase in ransomware discoveries:

 

  • 2012 – Reveton.
  • 2013 – Urausy, Kovter, Nymaim, Cryptowall, Browlock.
  • 2014 – Linkup, Slocker, CTB-Locker/Citron, Synolocker, Onion, TorrentLocker, Zerolocker, Coinvault, Virlock.
  • 2015 – Cryptolocker2015, Symplocker, TeslaCrypt, BandarChor, Cryptvault, Tox, Troldesh, Pacman, Pclock, Threat Finder, Hidden Tear, ORX-Locker, Dumb, Encryptor RaaS, CryptoApp, LockDroid, LowLevel404, CryptInfinite, Unix.Ransomcrypt, Radamant, VaultCrypt, XRTN, Mabouia OSX POC, Power Worm, DMA-Locker, Gomasom, Chimera-Locker.
  • 2016 (first quarter alone) – CryptoJocker, Nanolocker, LeChiffre, Magic, Ginx, 73v3n, Locky, Umbrecrypt, Hydracrypt, Vipasana, Hi Buddy, Job Cryptor, PayCrypt, and KeRanger.

 

How Can Smaller Companies Protect Themselves?

 

Since ransomware often blocks your access to your files, one of the best ways to protect your company is to make sure all of your data is properly and regularly backed up. At least one version of your backed up data will need to be stored in a system that is isolated from the rest of your systems. You don’t want your backups to be affected by the ransomware too!

 

You also need to make certain that your security patches and updates are deployed as soon as possible as these updates often involve security improvements to protect your company from known threats.

 

For companies without the same level of security resources available to them as larger companies, it’s also worthwhile to consider making use of companies such as AperioIT. We offer virtual CIO (Chief Information Officer) services, where we help you plan your IT strategy and budget.

It’s More Than Just an IT Problem
Jun 16th, 2016 by aperio

Not every HIPAA security requirement is related to technology. Just two of the requirements to keep in mind when you work to make your company HIPAA compliant include Business Associate Agreements and Risk Assessment.

 

HIPAA Requirement for Business Associate Agreement

 

In addition to your IT department’s need to keep Protected Health Information (PHI) in electronic form secure, you need to consider issues not related to technology. For example, if a company you work with is considered a business associate under HIPAA, this means you must have a business associate agreement (BAA) in place with them before transmitting PHI to them. This BAA is a contract to uphold PHI security according to HIPAA guidelines. Failure to have the (BAA) in place at the proper time can result in fines and other penalties.

 

In a recent case, a surgical practice ended up having to settle with the Office of Civil Rights of the U.S. Department of Health and Human Services (OCR) for $750,000 after it improperly disclosed several thousand patients’ PHI to a service provider without first entering into a BAA with the service provider. This service provider had agreed to digitize x-rays containing PHI, in exchange for extracting and keeping the silver from the x-ray film. While this provider’s service might not appear at first glance to be related to health care, the fact that the x-rays contained PHI and the provider “created, received, maintained, or transmitted” the PHI without a BAA in place made all the difference in this case.

 

HIPAA Requirement for Risk Assessment

 

HIPAA requires all covered entities, their business associates, and subcontractors of business associates to conduct a risk assessment. As stated in HIPAA these entities must, “…implement policies and procedures to prevent, detect, contain, and correct security violations.” Further, a risk assessment is defined as a, “…thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information.”

 

In another case, a Minnesotabased health care company paid a $1.5 million settlement after one of its business associates was investigated. A laptop containing PHI for the health care company’s patients had been stolen from the car of one of the business associate’s employees. The health care company was penalized both because there was no BAA in place between it and its business associate, and because it had not conducted an adequate analysis to the security threats to the PHI.

 

HIPAA Audits, Phase 2 – Business Associates May Also Be Audited

 

As we mentioned in our recent post, “Is Your Business Affected by HIPAA Regulations,” the OCR launched Phase 2 of its HIPAA Audit Program on March 21, 2016. In this phase, any covered entity or business associate may be audited. Per the OCR, these audits can involve onsite assessments or desk audits.

 

Need to Learn More about HIPAA Compliance?

 

If you’d like to learn more about how HIPAA compliance may affect your business, Aperio-IT will be holding a free Lunch and Learn Event on Wednesday, June 8. Brian Olsen, HIPAA Security Advisor, will be joining us to help answer your concerns about HIPAA regulations. You can find out details and register here to attend.

 

You can also take a look at our previous HIPAA-related posts:

Mitigating the Risk of Ransomware Attacks
Jun 14th, 2016 by aperio

In the first part of this series, we discussed the recent increase in ransomware attacks on hospitals, what ransomware is, and what features of hospitals and healthcare organizations make them especially tempting targets. In this final part, we’ll look at what organizations can do to protect themselves and their patients or clients from these attacks.

 

How to prevent attacks – or at least minimize damage

 

A recent study by SailPoint on security practices within organizations takes the stand that organizations should assume that data breaches are now a matter of “when” rather than “if.” That is, a wise organization should focus not only on preventing data breaches, but also on recovering successfully from them when they inevitably occur.

 

Since many ransomware attackers gain access from successful phishing attempts, organizations still need to focus on educating their employees to identify phishing. This means continuing to teach users how to identify suspicious emails and share them with their IT teams so those IT teams can keep track of possible attacks.

 

Phishing is a specific type of social engineering attack in which confidential information is acquired by fraudulent methods. These attacks often attempt to acquire user names, passwords, or other information useful to hackers. In the case of ransomware attacks, hackers are generally attempting to get information that will allow them access to an organization’s systems.

 

Potential phishing attempts can be identified by educated users. For instance, they often make use of link shorteners or embedded links in an effort to create links that appear legitimate. Then after these links are clicked, they take victims to websites specifically created for fraudulent purposes.

 

Phishing attempts also frequently use threats to create a sense of urgency and fear so victims will hurry and not think carefully about the potential effects of their actions. Emails that threaten to cancel accounts immediately, etc., should be considered highly suspicious.

 

Some of the other measures suggested by the Department of Homeland Security include:

 

  • Employing a data backup and recovery plan for all critical information.
  • Using application whitelisting to help prevent malicious software and unapproved programs from running.
  • Keeping operating systems and software up-to-date with the most recent patches.
  • Maintaining up-to-date anti-virus software.
  • Restricting user permissions to install and run software applications.
  • Instructing users not to follow unsolicited web links in emails.
  • Avoiding enabling macros from email attachments.

 

In the case of MedStar’s ransomware attack, data backups were a key part of their solution. The organization reported that they were able shut down their systems, isolating the damage, and later restore their data from backups without having to resort to paying a ransom.

 

Future security requirements and guidelines

 

It is possible that HIPAA requirements will be changed in the future in response to ransomware attacks. According to Bloomberg BNA, Rep. Ted Lieu (D-Calif.) is considering legislation “that would require hospitals and other health-care organizations to notify their patients when they’ve been the victim of a ransomware attack.” This would involve updating HIPAA’s current requirements regarding breach notification.

 

The FBI also offered guidance regarding the risks of ransomware in its podcast from May 25, 2016, “Ransomware on the Rise.”

 

Additional Links:

United States Computer Emergency Readiness Team, Alert TA16-091A: Ransomware and Recent Variants

Bloomberg BNA, Ted Lieu mulls ransomware attack requirements

 

 

 

HIPAA Rules for Protected Health Information
Jun 1st, 2016 by aperio

A common question regarding HIPAA is whether a covered entity can be fined for violations of the HIPAA rules even if there is no breach of Protected Health Information. Worryingly, the answer is yes. So a clear understanding of the HIPAA rules is necessary to protect your company.

 

While HIPAA (the Health Insurance Privacy and Accountability Act) has many rules, when people speak of the “HIPAA Rules” they are usually referring to three primary sets of regulations. These “rules” lay out how covered entities are to handle PHI (Protected Health Information). The three main HIPAA Rules are:

  • The Privacy Rule
  • The Security Rule
  • The Breach Notification Rule

 

The Privacy Rule

The Privacy Rule applies to PHI in any form, including oral, written, and electronic. Under the Privacy Rule, covered entities are responsible for making certain their employees (and business associates) use and/or disclose PHI only for authorized purposes. This means employers must keep their workforce trained to recognize what data is considered PHI and how to handle it appropriately.

 

Under this rule, covered entities are also responsible for making certain that only as much PHI as is necessary for a given purpose is disclosed. That is, the rule means it is not appropriate to just share entire medical records; only the portion of a record that is necessary for a given task is appropriate to share.

 

Other areas covered by the Privacy Rule include requirements for Business Associate Agreements (BAAs) with covered entities’ customers, vendors, and partners; standards to de-identification of Protected Health Information (that is, what kinds of information need to be removed from PHI in order to make it appropriate to share); specifications of patients’ rights to their own PHI; and requirements for covered entities to designate a privacy officer, publishing of privacy practices, and more.

 

The Security Rule

Unlike the Privacy Rule, the Security Rule applies only to electronic PHI. It delineates requirements for administrative, physical, and technical safeguards of electronic PHI and requires publication of documentation that describes the policies and procedures covered entities employ regarding those safeguards.

 

The Security Rule also specifies how long a covered entity must retain documentation of their Security Rule compliance.

 

The Breach Notification Rule

The Breach Notification Rule defines a reportable HIPAA breach, states what covered entities must do in case of such a breach, who they must notify, and how soon they must notify them.

 

This rule also states under what circumstances unauthorized access to encrypted PHI may not be considered a reportable breach.

 

Ready to Learn More about HIPAA Compliance?

 

If you’d like to learn more about how HIPAA compliance, Aperio IT will be holding a free Lunch and Learn Event on Wednesday, June 8. Brian Olsen, HIPAA Security Advisor, will be joining us to help answer your concerns about HIPAA regulations. You can find out details and register here to attend.

 

You can also take a look at our recent HIPAA-related posts:

 

SIDEBAR
»
S
I
D
E
B
A
R
«
»  Substance:WordPress   »  Style:Ahren Ahimsa