Resources for Educators

 

FBI Urges Reporting of Ransomware Incidents

The FBI issued a Public Service Announcement on September 15, 2016, urging victims to report ransomware incidents to federal law enforcement to “help us gain a more comprehensive view of the current threat and its impact on U.S. victims.” Ransomware is a type of malware installed on a computer or server that encrypts the files, making them inaccessible until a specified ransom is paid. It is an increasingly common and insidious cybercrime. Details for reporting ransomware incidents, and security recommendations, are provided in the PDF below.

FBI  PSA - Ransomware Reporting and Prevention - Sept 2016.pdf

Secret Service Issues Warning About Rising Mobile Payment Fraud

In the past few months, the US Secret Service has observed a steady increase in criminals exploiting vulnerabilities in the account provisioning and verification process for near field communication (NFC) payments to commit fraud. Specifically, criminals are using stolen identity information--such as credit reports, tax records, healthcare, and employee records that contain personally identifiable information--to establish fake accounts on NFC devices and make illicit transactions both online and at “brick and mortar” retailers.  Please read details and mitigation suggestions in the PDF below.

US_Secret_Service_on_Increasing_Mobile_Payment_System_Vulnerability.pdf

U.S. Secret Service Warns of Business Email Scam Leading to ACH Fraud

The Secret Service is currently observing a significant increase in the frequency, sophistication, and fraud losses associated with Business Email Compromise scams, which are a form of Automated Clearing House (ACH) wire fraud. Organizations are encouraged to immediately implement additional authentication steps before performing wire transfer payments to non-U.S. financial institutions, and to report suspected criminal activity associated with these scams to their local Secret Service Electronic Crimes Task Force or field office.

Business_Email_Scam_Leads_to_ACH_Wire_Fraud.pdf

Cybertheft Costs Healthcare $6 Billion a Year

This latest study should be a wake-up call for healthcare providers regardless of size or specialty. ePHI and other data is being resold on private forums that specialize in stolen credit cards and Social Security numbers. Medical records often sell for as much as 20 times the price of a stolen credit card number, because of their value. Is your organization leaking data? 

Cybertheft_Costs_Healthcare_6_Billion_Annually.pdf

JDL Technologies Quoted in CRN Article on Cybersecurity

In responding to CRN about Obama's April 2015 Executive Order authorizing targeted sanctions against cybercriminals, including nation states, JDL Technologies' Alex Muchnik observed, "While our government is taking the actions that it has the power to take, our corporations and businesses need to exercise the same vigilance.  In the final analysis, security is everyone’s responsibility.” 

New_Tool_Against_Cyberthreats.pdf

AWARD-WINNING EBOOK:  Healthcare Data Breaches & Vulnerabilities, and What You Can Do

Let the lessons of 2014 guide your compliance actions this year, with this compelling report developed by JDL HealthTech and offered in easy-to-digest eBook form. Learn what causes 83% of all data breaches in healthcare, and discover the two most common vulnerabilities. Consider the penalties applied in 2014, by the HIPAA-enforcing DHHS Office for Civil Rights, to some extremely small data breaches. It doesn't have to happen to you.

Healthcare_Vulnerabilities_Report.pdf

FEATURE ARTICLE:  Going Thoroughly Virtual

By using virtualization throughout your clients’ entire IT infrastructure — from servers to desktops and applications to storage — you can deliver greater levels of agility, mobility, and efficiency. This ChannelPro article quotes JDL Technologies President Scott Fluegge and other IT experts on what to consider in adopting virtualization within your organization.

Going_Thoroughly_Virtual_-_ChannelPro_Article.pdf

Unencrypted Laptop Costs Healthcare Entity $250,000

Chances are your laptop or tablet goes where you go, carrying healthcare data and PHI from office to vehicle to home and back again. Throw in a side trip to the grocery store or the bank, and you've got a theft in the making. It can happen to anyone, anywhere. 

Unencrypted_Laptop_Costs_Healthcare_Entity_$250,000.pdf

Meaningful Use Update – CMS Announces EHR Penalties

The Centers for Medicare and Medicaid Services say many doctors will see their 2015 Medicare payments cut by 1% for failing to meet federal electronic health-record incentive-payment program standards.  In addition, only about 10% of those scheduled to move to Stage 2 this year have done so. However, their payment period doesn't end until Dec. 31—and they have until the end of February to attest. 

Meaningful_Use_Update_-_CMS_Announces_2013_Penalties_and_Other_News.pdf

Cybercrime is a Growth Industry, Says Latest CSIS Report

The returns are great, and the risks are low. The most recent report on the state of cybercrime worldwide is now available from the Center for Strategic and International Studies (CSIS), in concert with Intel Security.  The report estimates the probable annual cost to the global economy at more than $400 billion.  According to the report, “Governments and companies underestimate how much risk they face from cybercrime, and how quickly this risk can grow.”

Report_on_Global_Cybercrime_June_2014.pdf

Security: Healthcare's Fixer-Upper

This excellent article by Healthcare IT News Editor Erin McCann explores the alarming state of affairs in healthcare today, how the industry's slack security is bad for business, and what some are doing to step it up. Solid advice ... should be required reading for heatlhcare providers!   

Security_Healthcares_Fixer_Upper.pdf

The Facts About ICD-10 and Its Impact on Physicians

The deadline for implementation of a huge new set of diagnostic codes, known as ICD-10, is set for October 1, 2014, after a one-year postponement. Compliance is required, and no further delays are expected. This set of useful FAQs is provided courtesy of the American Medical Association.

Facts_About_ICD-10.pdf

US CERT Alert on CryptoLocker Ransomware

US-CERT is warning of a vicious new malware campaign that surfaced in late 2013 and is associated with a growing number of ransomware infections affecting Microsoft Windows systems running Windows 8, Windows 7, Vista, and XP operating systems. 

CryptoLocker is a new variant of ransomware that restricts access to infected computers and demands the victim provide a payment to the attackers in order to decrypt and recover their files. There is also an identity theft element to the infection.

Cryptolocker-US-CERT-Alert-Nov-2013.pdf

CryptoLocker Facts and Tips from Sophos

With CryptoLocker wreaking serious havoc, especially in the SMB community, this article is a must-read. It explains how this new ransomware works and offers instructions for prevention, cleanup, and recovery (which is actually possible in certain cases). Convenient 8-minute video makes it crystal clear. 

CryptoLocker-Details-From-Naked-Security-By-Sophos-Oct-2013.pdf

Five Ways to Secure Your Web-Browsing Users

In addition to the usual suspect tips, this article offers detailed advice for securing your browsers and standardizing your web software. Recommended reading, from the security experts at Sophos. 

Five-Ways-To-Reduce-Risk-From-Modern-Web-Threats.pdf

Five Ways Your SMB Can Profit From Managed IT Services

It’s been demonstrated repeatedly that Managed Services make clear sense for small businesses. In this article, Steven Vigeant of Data Evolution discusses five primary benefits of Managed Services for small to mid-size businesses. We second his conclusion!

5-Ways-Small-Business-Will-Profit-From-Managed-IT-Services.pdf

Why a Managed Services Solution is Good for Your Enterprise IT Team

Managed IT Services aren't just for small or mid-size businesses. Many enterprises leverage an expert MSP to manage the routine activities so that internal IT staff can be more strategic, more effective, and more productive. 

Why-A-Managed-Services-Solution-Is-Good-For-Your-IT-Team.pdf

Computer Security Tips for Small Business

As small businesses become more reliant on technology, they also become more vulnerable to cybercrime. A Gartner study found that 90 percent of companies who suffer major data loss close their doors within two years. Here are 10 tips to secure your business computers.

10-Computer-Security-Tips-For-Small-Businesses.pdf