{"id":320,"date":"2018-04-26T07:20:33","date_gmt":"2018-04-26T11:20:33","guid":{"rendered":"http:\/\/eagleassociates.net\/news\/?p=320"},"modified":"2018-04-26T07:20:33","modified_gmt":"2018-04-26T11:20:33","slug":"cyber-extortion","status":"publish","type":"post","link":"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/","title":{"rendered":"Cyber Extortion"},"content":{"rendered":"<p>According to the Office for Civil Rights (OCR), incidents of cyber extortion have risen over the past few years and are projected to be a major source of digital disruption in the future. Cyber extortion is defined as a crime involving an attack or threat of attack, coupled with a demand for money to stop it. In addition to ransomware attacks, where cyber criminals encrypt your data and demand a ransom to restore your access to it, cyber extortion includes threats to make stolen information public, or to delete files altogether.<\/p>\n<p>It is important to realize that even the smallest practices have been a target, due to the fact that patient information is valuable and smaller organizations are sometimes more lax in securing their information systems. Please consider the following recommendations in order to limit your liability exposure:<\/p>\n<p><b><i>Security Risk Analysis (SRA)<\/i><\/b> \u2013 Ensure that you perform a complete review of your HIPAA Security Rule policies and procedures on an annual basis.<span class=\"Apple-converted-space\">\u00a0 <\/span>Remember that a SRA involves verifying that you have implemented policies\/procedures to limit risk to your electronic protected health information (EPHI).<span class=\"Apple-converted-space\">\u00a0 <\/span>Current subscribers to Eagle\u2019s HIPAA Compliance System have a complete SRA tool to meet this annual requirement.<\/p>\n<p><b><i>Technical Network Assessment<\/i><\/b> <b><i>(TNA) <\/i><\/b>\u2013 A TNA involves a diagnostic evaluation of your information system to look for open unsecured ports, devices missing security patch updates, enabled User IDs that should have been terminated, and more.<span class=\"Apple-converted-space\">\u00a0 <\/span>Documentation from a TNA works in concert with a SRA, and provides strong evidence of applying reasonable safeguards to limit risks to patient information.<\/p>\n<p><b><i>Workforce Privacy and Security Training<\/i><\/b> \u2013 Awareness for privacy and security is critical to the front-line defense for your information system.<span class=\"Apple-converted-space\">\u00a0 <\/span>Eagle provides privacy and security training in the April and May issues of the <i>Advisor\u00ae<\/i> to help with this task.<span class=\"Apple-converted-space\">\u00a0 <\/span>Eagle also provides<span class=\"Apple-converted-space\">\u00a0 <\/span>\u201cCompliance Notes\u201d (a monthly one-page article in the <i>Advisor\u00ae<\/i>) to remind staff about privacy and security issues.<span class=\"Apple-converted-space\">\u00a0 <\/span>Train staff to identify suspicious emails and messaging scams that could lead to malicious software infecting your information system.<\/p>\n<p><b><i>Anti-virus or anti-malware systems<\/i><\/b> \u2013 Ensure that you have a strong firewall and anti-virus applications that can scan your information system and provide alerts when suspicious activity occurs.<span class=\"Apple-converted-space\">\u00a0 <\/span>The keys are to implement such applications and monitor the alerts so that immediate corrective actions can be taken.<\/p>\n<p><b><i>Data backups<\/i><\/b> \u2013 Your data backup procedures should ensure that backup data is encrypted and disconnected from your local server\/network (having the data physically taken off site each night or backed up to a secure remote server).<span class=\"Apple-converted-space\">\u00a0 <\/span>Having the backup data stored off site will be critical to your recovery in the event of a disaster or attacks from ransomware.<\/p>\n<p><b><i>Audit Logs<\/i><\/b> \u2013 While most EMR and operating systems have robust audit logs, they need to be periodically reviewed for unusual or suspicious activity. Create a schedule of reviewing activity reports on at least a monthly basis.<\/p>\n<p>Threats to your information system and the patient data that you store will not diminish in the future, they will likely intensify.<span class=\"Apple-converted-space\">\u00a0 <\/span>Take steps now to ensure your EPHI is protected from known threats by completing a security risk analysis and technical network assessment. These evaluations will help you improve the security of your practice\u2019s information system and reduce your liability.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the Office for Civil Rights (OCR), incidents of cyber extortion have risen over the past few years and are projected to be a major source of digital disruption in the future. Cyber extortion is defined as a crime involving an attack or threat of attack, coupled with a demand for money to stop&#8230; <span class=\"more\"><a class=\"more-link\" href=\"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/\">Continue reading <span class=\"meta-nav\">&#8594;<\/span><\/a><\/span><\/p>\n","protected":false},"author":2,"featured_media":321,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[23,47,33,64],"class_list":["post-320","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eagle-staff","tag-hipaa","tag-security","tag-security-risk-analysis","tag-technical-network-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Extortion | Eagle Associates News<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Extortion | Eagle Associates News\" \/>\n<meta property=\"og:description\" content=\"According to the Office for Civil Rights (OCR), incidents of cyber extortion have risen over the past few years and are projected to be a major source of digital disruption in the future. Cyber extortion is defined as a crime involving an attack or threat of attack, coupled with a demand for money to stop... Continue reading &#8594;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/\" \/>\n<meta property=\"og:site_name\" content=\"Eagle Associates News\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-26T11:20:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2018\/04\/cyber-extortion.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eagle Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eagle Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2018\\\/04\\\/cyber-extortion\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2018\\\/04\\\/cyber-extortion\\\/\"},\"author\":{\"name\":\"Eagle Staff\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/ed0338105c6f7bd7e7014934db2b97f9\"},\"headline\":\"Cyber Extortion\",\"datePublished\":\"2018-04-26T11:20:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2018\\\/04\\\/cyber-extortion\\\/\"},\"wordCount\":545,\"image\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2018\\\/04\\\/cyber-extortion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/cyber-extortion.jpg\",\"keywords\":[\"hipaa\",\"security\",\"security risk analysis\",\"technical network assessment\"],\"articleSection\":[\"eagle associates staff\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2018\\\/04\\\/cyber-extortion\\\/\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2018\\\/04\\\/cyber-extortion\\\/\",\"name\":\"Cyber Extortion | Eagle Associates News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2018\\\/04\\\/cyber-extortion\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2018\\\/04\\\/cyber-extortion\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/cyber-extortion.jpg\",\"datePublished\":\"2018-04-26T11:20:33+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/ed0338105c6f7bd7e7014934db2b97f9\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2018\\\/04\\\/cyber-extortion\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2018\\\/04\\\/cyber-extortion\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2018\\\/04\\\/cyber-extortion\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/cyber-extortion.jpg\",\"contentUrl\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/cyber-extortion.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/2018\\\/04\\\/cyber-extortion\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Extortion\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/\",\"name\":\"Eagle Associates News\",\"description\":\"News and More from Eagle Associates, Inc.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eagleassociates.net\\\/news\\\/#\\\/schema\\\/person\\\/ed0338105c6f7bd7e7014934db2b97f9\",\"name\":\"Eagle Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g\",\"caption\":\"Eagle Staff\"},\"sameAs\":[\"http:\\\/\\\/www.eagleassociates.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Extortion | Eagle Associates News","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Extortion | Eagle Associates News","og_description":"According to the Office for Civil Rights (OCR), incidents of cyber extortion have risen over the past few years and are projected to be a major source of digital disruption in the future. Cyber extortion is defined as a crime involving an attack or threat of attack, coupled with a demand for money to stop... Continue reading &#8594;","og_url":"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/","og_site_name":"Eagle Associates News","article_published_time":"2018-04-26T11:20:33+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2018\/04\/cyber-extortion.jpg","type":"image\/jpeg"}],"author":"Eagle Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Eagle Staff","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/#article","isPartOf":{"@id":"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/"},"author":{"name":"Eagle Staff","@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/ed0338105c6f7bd7e7014934db2b97f9"},"headline":"Cyber Extortion","datePublished":"2018-04-26T11:20:33+00:00","mainEntityOfPage":{"@id":"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/"},"wordCount":545,"image":{"@id":"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/#primaryimage"},"thumbnailUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2018\/04\/cyber-extortion.jpg","keywords":["hipaa","security","security risk analysis","technical network assessment"],"articleSection":["eagle associates staff"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/","url":"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/","name":"Cyber Extortion | Eagle Associates News","isPartOf":{"@id":"https:\/\/eagleassociates.net\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/#primaryimage"},"image":{"@id":"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/#primaryimage"},"thumbnailUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2018\/04\/cyber-extortion.jpg","datePublished":"2018-04-26T11:20:33+00:00","author":{"@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/ed0338105c6f7bd7e7014934db2b97f9"},"breadcrumb":{"@id":"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/#primaryimage","url":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2018\/04\/cyber-extortion.jpg","contentUrl":"https:\/\/eagleassociates.net\/news\/wp-content\/uploads\/2018\/04\/cyber-extortion.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/eagleassociates.net\/news\/2018\/04\/cyber-extortion\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eagleassociates.net\/news\/"},{"@type":"ListItem","position":2,"name":"Cyber Extortion"}]},{"@type":"WebSite","@id":"https:\/\/eagleassociates.net\/news\/#website","url":"https:\/\/eagleassociates.net\/news\/","name":"Eagle Associates News","description":"News and More from Eagle Associates, Inc.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eagleassociates.net\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/eagleassociates.net\/news\/#\/schema\/person\/ed0338105c6f7bd7e7014934db2b97f9","name":"Eagle Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f46663bd04e8c76f12d55caa7ba167ba1e86492b7c8b4bb878cad266fde91a5b?s=96&d=mm&r=g","caption":"Eagle Staff"},"sameAs":["http:\/\/www.eagleassociates.net"]}]}},"_links":{"self":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":2,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/320\/revisions"}],"predecessor-version":[{"id":323,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/posts\/320\/revisions\/323"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/media\/321"}],"wp:attachment":[{"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/media?parent=320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/categories?post=320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eagleassociates.net\/news\/wp-json\/wp\/v2\/tags?post=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}