Cybersecurity & Tech
North Carolina’s electronic voting system in 2016 was hacked. The way hackers got in was through the company that provided the poll book- the electronic data that allows voting personnel to verify voters.
What changes we will we see to election procurement:
NPR | Russian Cyberattack Targeted Elections Vendor Tied To Voting Day Disruptions
71 % of health care organizations budget for cyber security
The majority say cybersecurity is more than 3% of their budget
A majority have hired a chief information security officer or other executive level cybersecurity position
75% do regular cybersecurity testing
80% of US healthcare orgnaizations will increase cybersecurity spending in 2017
Healthcare Dive | HIMSS survey: Hospitals ramping up cybersecurity efforts
Michigan created a volunteer public private task force to step in at a moment’s notice to resolve a cyber attack on state systems.
What is the group called? Michigan Cyber Civilian Corps, MiC3
Has Michigan Cyber Civilian Corps, MiC3 been deployed? No
How does it function? Like a volunteer fire department
Who has volunteered? cybersecurity experts from government, education and private industry
Has any other state done this? No.
Governing | Michigan’s Volunteer-Based Cybersecurity Strategy Catches On
GCN | Why state and local government still struggle with cybersecurity
Missouri tests its state employees with its own phishing scams to keep state employees laser focused on cybersecurity.
Government Technology | In Illinois, Cybersecurity Training for State Employees Now Required by Law
Illinois HB 2371 requires every state employee to complete annual cybersecurity training. The Department of Information resources may offer a video in lieu of training.
By every employee, the Legislature managed to exclude these employees:
Government Technology | In Illinois, Cybersecurity Training for State Employees Now Required by Law
Johnson Co. Kansas relies on big data to address public safety and mental health concerns. The use of bug data has saved the local government:
How did Johnson Co. do it? By cross referencing 2 databases- county wide criminal jsutice database and a health and human services database that notes mental health issues.
State Tech | Johnson County (Kan.) Calls On Big Data to Link Public Safety and Mental Health
As schools place a greater concern on ensuring parents that student data is protected, schools are asking their edcation vendors more about data security.
Ed Tech | 3 Tips to Keep Parents Assured that Student Data Is Protected
A tech researcher visiting DefCon Voting Village in Las Vegas, hacked a U.S. styled voting machine within 2 minutes.
Companies are finding cybersecuity weaknesses in employees by sending faux phishing emails and seeing which employees bite.
Corporate test data shows cyber literacy training reduces the number of employees who fall for phishing scams.
How many years until there are cyber literacy requirements in public education? in state contracts?
SC Media | Diagnosing employee phishing weaknesses key to improving email security
Taxpayers for Common Sense is ahead of the curve by creating a database to track federal cybersecurity spending.
The cybersecurity spending database is organized by agency and tracks spending for last 10 years.
The Consumer Tech Association filing with the Commerce Department recommends government action on cybersecurity/datasecurity policies for education because there are so many differnt players in education.
The recommendations that we may soon see in Education Procurement Contracts:
Your Roomba is mapping your house and collecting data. Let’s repeat, your Roomba is colelcting data about how to get around your house and what is in your house.
Better yet, the company hasn’t asked you whether they can keep the data, store the data or sell the data. What retailer wouldn’t want to buy data that says you have no loveseat? or only 1 sad and lonely dining chair?
This type of private property data is screaming for legislation. Legislation about disclosure of the data, sale of the data, consent to store the data, and how protected is the Roomba from hackers?
USA Today | Your Roomba already maps your home. Now the CEO plans to sell that map.
Congress’ H.R. 3170 tackles cyber security in small businesses by requiring cyber security training for small business devleopment centers.
In 2016, California created the State Innovation Lab.
California maintains an Office of Digital Innovation.
The policy goal in California is to “create novel, deployable technologies that address needs identified by state entity partners — with a particular focus on open-sourced technology.”
State Tech | How Innovative States Stay Ahead of the Tech Curve
Body cameras- love them, hate them- they collect data and a lot of data.
Lots of people support body cameras:
Body cameras are everywhere in law enforcement, so how are counties handling all that data?
State Tech | How Counties Manage the Body-Worn-Camera Video Data Boom
2017 Q2 reflects record spedning by tech giants.
The 10 top issues tech wants elected officials and policymakers to know:
Data Center Dynamics | Tech, data center firms increase US lobbying spend
Arkansas Workforce Services experienced a data breach that exposed the personally identifable details of 600,000 residents and 19,000 employment applications.
The state is seeking new database services.
U.S. News and World Report | Data Breach Has Arkansas Seeking New Vendor
Yes, the California Supreme Court held that the California Medical Board can access private patient records in the state prescription database because the state interest in regulating potent prescription drugs and protecting patients from negligent doctors.
Access to patient records + Texas Medical Board Sunset Review = Patient Privacy vs. State Interest Amendments
Law 360 | Calif. Justices OK Medical Board’s Access To Rx Database
The 2016-2017 Chair of the National Governor Association, Virginia Governor Terry McAuliffe, explains that cyber security directly impacts these policy areas and businesses:
National Governors Association is pushing for state reform of cyber security laws because:
The National Governor’s Association initiative, Meet the Threat, calls for:
Lloyds of London estimates a global cyber attack will result in damages similar to hurricane Sandy, or $53 billion in economic losses from a global hacking of cloud services.
How do the $53 Billion oin costs break down?
Average economic losses $4.6 billion to $53 billion
Actual losses could be as high as $121 billion
$45 billion of that sum may not be covered by cyber policies, because
companies are underinsuring
If operating systems are hacked, average losses range from $9.7 billion to $28.7 billion.
How is Texas regulating the cyberinsurance market?
Washington State University kept sensitive personal information on a backup disk locked in a $159 safe in a small safe in a storage unit.
The WSU storage unit was burlagized, and was the only unit burgalarized.
The takeaway for policy makers: Do not allow state institutions to store personal data in storage units.
Common sense governing. Better late than never.
A poll by Carbon Black reveals the concern level of voters for election integrity.
SC Media | Cybersecurity concerns may stop 59 million Americans from voting in 2018
In August 2016, Maryland officials notices hackers were trying to get to voter information, that set off a flurry of legislator and regulator activity. Here’s where they ended up almost a year later:
Wall Street Journal | How Maryland Contended With Attempted Hack Of Its Voter-Registration System
To avoid the use of stolen personally identifiable information, the uK is seeing a rise in the use of biometric identifiers.
SC Media | Rise in use of biometrics products for cyber-security, report predicts
Oregon’s Senate Bill 90 creates a new position of Chief Information Officer who is responsible for:
Why are Frederick County Public Schools (Maryland) adopting new data security rules? The School experiences a data breach.
5 Elements from the new data breach policy:
Also requires a 3rd party contractor to test the schools’ data security regularly.
Frederick News Post | New FCPS data security policy takes measures to protect student information
How to pass electric grid cybersecurity standards in 2 steps of legislstive logic:
Natural Gas Intel | Senate Energy Policy Reform Bill Revived, Fast-Tracked
A bipartisan, and awkwardly named piece of legislation, the Promoting Good Cyber Hygiene Act, calls for:
1/2 of health care organizations say they are prepared for a data breach.
The American Medical Association proposes these data security incentives:
Health IT Security | Incentivize Cybersecurity Best Practices for Data Security
Automakers say they need flexibility to adapt technology of self driving cars.
What’s known for flexibility? the sarcastic answer: enacted statutes and their ability to keep up with technology
What’s the solution for cybersecurity for self driving cars? According to the American Center for Mobility self imposed rules by industry are the best option.
Automotive News | Cybersecurity push may tie up autonomous-car legislation
Department of Defense is adding cybersecurity standards to its procurement process.
Requirements in the new contracting rules that take effect this fall are:
FedScoop | Pentagon will soon hold contractors to elevated cyber standards
Data Breach at HHSC? No, a box of client records was left in a box unattended by a dumpster in Houston.
The personal information exposed included:
The HHSC response:
SC Media | 2,000 Texas HHSC clients health data compromised
HHSC | HIPAA Notice: Houston-area Accidental Loss of Client Information
Vermont’s Governor signed S135 that will expand economic opportunity for financial technology industries.
Arizona’s Governor signed HB2417 that recognizes blockchain signatures and smart contracts
Buckley Sandler | Vermont Governor Enacts Law Including Blockchain Application
GOP Data Firm, Deep Root Analytics, stored personal details of roughly 198 million citizens unprotected and publicly assessible.
A cybersecurity firm says potentially all of America’s 200 million registered voters were exposed, including names, dates of birth, home addresses, phone numbers, and voter registration details.
The complaint: McAleer v. Deep Root
SC Media | No recourse, perhaps, for 200M affected in breach of RNC database, attorney says
21 States responded to President Trump’s repeal of Obama era internet privacy regulations, by offering state regulations for internet privacy. Let’s take a peak.
In California, one internet service providfer, AT&T, has spent $2.71M in the last year.
Federal preemption isn’t a concern because the FCC laws and rules share duties with the states and there is no explicit preemption.
NCSL | PRIVACY LEGISLATION RELATED TO INTERNET SERVICE PROVIDERS
The Recorder | Calif. Pushes Internet Privacy Rules That Trump Repealed
21 States responded to President Trump’s repeal of Obama era internet privacy regulations, by offering state regulations for internet privacy. Let’s take a peak.
In California, Assembly Bill 375, will:
Federal preemption isn’t a concern because the FCC laws and rules share duties with the states and there is no explicit preemption.
NCSL | PRIVACY LEGISLATION RELATED TO INTERNET SERVICE PROVIDERS
The Recorder | Calif. Pushes Internet Privacy Rules That Trump Repealed
Some say hospitals that get hit by a ransomware attack need not disclose the ransomware data breach.
The question- If data is held hostage/accessed but is not taken must that be disclosed?
The supporters for disclosure say: More mandatory reporting.This regulatory gap limits the health-care system’s ability to fight cybercriminals.
Who is counted among supporters of disclosure? Congressman Ted Lieu, a California Democrat who along with Congressmen Will Hurd, a Texas Republican
What do hospital lawyers say? Hospitals have financial and competitive incentives to avoid all but required reporting
WallStreet Journal | Why Some of the Worst Cyberattacks in Health Care Go Unreported
Cyber security is becoming an element in analysis for bond markets.
Is this shift a result of a catalyst? Yes, the use of malware toward local governmental entities
Does this follow inthe footsteps of other entities disclosing cyber protections to investors? Yes, utilities and hospitals are starting to disclose any information to potential investors in bond documents about cyber risks or defenses
Reuters | U.S. muni market slowly starts paying heed to cyber risks
State: Illinois
Illinois’ Solutions to prevent election hacking in the 2018 mid term elections:
Politico | LAND OF LINCOLN PREPS FOR 2018
WGN | Illinois among 8 states investigating Russian hacking of its elections
Virginia Gov. Terry McAuliffe, Chair of the National Governor Association, urges states to:
Fitness Tracker data storage in the cloud leaves individuals subject to the following data privacy issues:
Irish Times | Fitness trackers run into resistance over data security concerns
The Securities Exchange Commission has issued a warning investment advisers that they need to be more proactive in data security by:
Reuters | SEC identifies adviser cyber security flaws
Reuters | Exclusive: New SEC enforcement chiefs see cyber crime as biggest market threat
Has a US city had its credit rating downgraded after a cyber attack? No
Do financial industry analysts think it possible to downfgrade a city’s credit rating after a cyber attack? yes
What factors can play into whether a local governmental entity’s credit rating could get downgraded?
Governing | Can a Cyberattack Cause a Credit Rating Downgrade?
State: California
The legislation: Assemblyman Matt Dababneh sought to apply the standard applied to business of requiring 1 year of ID theft protection services for anyone who is impacted by any government breach in California. AB 241 (2017)
The Opposition is winning as the bill stalls. The loyal opposition includes California State Assn. of Counties, the Urban Counties of California, and the League of California Cities
Opposition arguments:
Government Tech | New Legislation Pressures California Lawmakers to Strengthen Data Security
The federal HEALTH CARE INDUSTRY CYBERSECURITY TASK FORCE released 27 recommendations in its June 2017 report, and set forth these 5 future regulatory issues for health care cybersecurity:
Develop a cohesive plan for implementing this report’s recommendations and develop appropriate metrics to measure data security implementation progress.
Conduct a risk analysis, similar to the National Infrastructure Protection Plan, with an overlay for health care cybersecurity and privacy. Based upon the analysis, develop a comprehensive cybersecurity roadmap for the HPH Sector.
Establish an ongoing public-private forum, similar to this Task Force, to further the discussions of health care industry cybersecurity as the industry evolves. The Task Force members found this engagement with federal partners beneficial to understand our common cybersecurity challenges and concerns.
HHS leadership should partner more closely with existing DHS efforts with the insurance industry in helping identify a roadmap to enable private insurance approaches in the health care industry. The sometimes-conflicting roles of HHS as a regulatory body and facilitator for improved security could be mitigated by encouraging an industry-based insurance market.
Enable an ongoing conversation and develop strategies to identify resources and incentives that would help to overcome the barriers faced by small and rural organizations.
Create a cybersecurity leader role within HHS to align industry- facing efforts for health care cybersecurity.
Establish a consistent, consensus-based health care-specific Cybersecurity Framework
Require federal regulatory agencies to harmonize existing and future laws and regulations that affect health care industry cybersecurity.
Identify scalable best practices for governance of cybersecurity across the health care industry.
Explore potential impacts to the Physician Self-Referral Law, the Anti-Kickback Statute, and other fraud and abuse laws to allow large health care organizations to share cybersecurity resources and information with their partners.
Secure legacy systems.
Improve manufacturing and development transparency among developers and users.
Increase adoption and rigor of the secure development lifecycle (SDL) in the development of medical devices and EHRs.
Require strong authentication to improve identity and access management for health care workers, patients, and medical devices/EHRs.
Employ strategic and architectural approaches to reduce the attack surface for medical devices, EHRs, and the interfaces between these products.
Establish a Medical Computer Emergency Readiness Team (MedCERT) to coordinate medical device-specific responses to cybersecurity incidents and vulnerability disclosures.
Every organization must identify the cybersecurity leadership role for driving for more robust cybersecurity policies, processes, and functions with clear engagement from executives.
Establish a model for adequately resourcing the cybersecurity workforce with qualified individuals.
Create MSSP models to support small and medium-size health care providers
Small and medium-sized health care providers should evaluate options to migrate patient records and legacy systems to secure environments (e.g., hosted, cloud, shared computer environments).
Develop executive education programs targeting Executives and Boards of Directors about the importance of cybersecurity education.
Establish a cybersecurity hygiene posture within the health care industry to ensure existing and new products/systems risks are managed in a secure and sustainable fashion.
Establish a conformity assessment model for evaluating cybersecurity hygiene that regulatory agencies and industry could rely on, instead of a diversity of auditors.
The NIST Baldrige Cybersecurity Excellence Builder, should be further developed: 1) specific to health care, and 2) specific to the types of health care operations that are widely deployed across the industry and have limited access to cybersecurity resources (e.g., small hospitals or practices, rural locations with limited access to security resources).
Increase outreach and engagement for cybersecurity across federal, state, local, tribal, territorial, and the private sector partners through an education campaign including meetings, conferences, workshops, and tabletop exercises across regions and industry.
Provide patients with information on how to manage their health care data, including a cybersecurity and privacy grading system for consumers to make educated decisions when selecting services or products around non-regulated health care services and products.
Develop guidance for industry and academia on creating economic impact analysis and loss for cybersecurity risk for health care research and development.
Pursue research into protecting health care big data sets.
Tailor information sharing for easier consumption by small and medium-size organizations who rely on limited or part-time security staff.
Broaden the scope and depth of information sharing across the health care industry and create more effective mechanisms for disseminating and utilizing data.
Encourage annual readiness exercises by the health care industry.
Provide security clearances for members of the health care community.
HEALTH CARE INDUSTRY CYBERSECURITY TASK FORCE REPORT | June 2017
The Hill | Federal task force: Here’s how to fix healthcare cybersecurity
The State Legislature that created the Office of Cyber Defense Coordination: Nevada
Within which state agency will the Office live? Nevada’s Department of Public Safety
The Legislation creating the office: Nevada’s AB 471 (2017)
What do these cyber offices look like in other states?
New Jersey Cybersecurity and Communications Integration Cell
Georgia has its State Government System Review Board, under the direction of Georgia’s CIO.
California’s Cybersecurity Integration Center is housed within the California Office of Emergency Services
Idaho lawmakers approved the Cybercore Integration Center on the Idaho National Laboratory campus
Oregon has pending legislation for the consolidation of cybersecurity powers under the state CIO, as well as establishing the Oregon Cybersecurity Center of Excellence and the Oregon Cybersecurity Fund.
Government Technology | Nevada Governor Signs Bill to Create Office of Cyber Defense Coordination
State: Massachusetts
The highest level Massachusetts government position created: Secretary of Technology
The MA Secretary of Technology would be tasked with hiring:
Originator of the MA Secretary of Technology post: The Massachusetts Governor
Data and cyber positions are gaining power insisde and outside government.
Greenfield Recorder | New Baker bill creates Cabinet position for technology
The brainchildren behind Intelligent Transportation Cybersecurity Task Force: Intelligent Transportation Society of America & nonprofit Cyber Future Foundation
Which stakeholders are involved? auto manufacturers, government leaders and transportation officials
What will the task forces study? cybersecurity issues- legal and liability issues and policy, regulation and legislation- to esnusre the highest elevel of safety and privacy in a connected transportation environment
Politico | Morning Cyber Security | NEW TRANSPORTATION THINKING
Healthcare Dive | What happens to telemedicine if we lose net neutrality?
Background: The FCC in 2017 overturned internet privacy
What is Congress Doing in Response? Congresswoman Marsha Blackburn, R-Tenn., chairwoman of the Communications and Technology Subcommittee, filed a bill to return the power to regulate the internet back to the FTC.
What do privacy advocacy rights advocates say about this bill? 17 states have bills to protect state resident data privacy. The federal bill by Congrresswoman Blackburn would preempt those state laws.
Improving the Outcomes of Government IT | Internet Privacy Bill Would Override State Laws
Nevada Senate passed an internet security bill that will:
Why are states passing internet security bills?
A court in Vermont ruled that the State Agency of Education must release school bullying information it has collected under the public information act.
Amendments to Congressman Tom Graves’ Active Cyber Defense Certainty Act include:
Politico Morning Cyber Security | Scoop: ‘Hack back’ bill gets version 2.0
State: Florida
The data breach: Department of Agriculture and Consumer Services online payment system was hacked and the following information was obtained:
What steps did Florida take? Ordered a review of the department’s cyber security measures & offering free credit monitoring
What was the reaction of gun owners? “ too little too late”
WWSB ABC 7 | Concealed weapons permit holders targeted in massive data breach
Satte Attorneys General reached an $18.5 Million settlement with Target.
Law 360 | State AGs Set Data Security Bar With Record $18.5M Pact
AG Paxton Announces $18.5 Million Settlement with Target to Resolve 2013 Data Breach
Country: Germany
The protections that Germany seeks to combat election hacking:
SC Media | Lawmakers in Germany push for encryption-busting trojan in lead up to election
Who is proposing a cyber national guard? Congressman Will Hurd, Chair of the House’s information technology subcommittee
Why push for a cyber national guard? to help recruit stronger talent to fill cybersecurity roles in the federal government
How does the private sector factor in? a cyber nataional guard would “allow industry professionals to bring innovative ideas back into the federal government without the government having to keep up with the salaries available in the technology community.”
The Hill | House IT chair eyes ‘cyber national guard’ as next legislative push
The GAO has issued a warning about the economic impact of data breaches & the economic boon of the Internet of Things, inter conencted devices.
The economic impact as a result of a data breach is tempered by the economic benefits of health care adopting connected devices (IoT technology). The numbers:
Health Care Dive | GAO warns about IoT security, privacy and safety issues
4 ways mortgage companies can up their game and push back regulatory fines:
Housing Wire | Mortgage data isn’t secure: Here’s why and how to fix it
State: Delaware
What is HB 180 in Delaware trying to do?
If passed, Delaware would be state #2 to require ID theft services after a breach.
Legislative body is located where? Australia
What triggers licensing issues when failing to meet data security standards?
The goal: Move data security to the forefront with business leadership
Intelligent Insurer | New data breach reporting legislation deemed cyber game changer in Australia
The advocates: Parent Coalition for Student Privacy and the Campaign for a Commercial-Free Childhood
The toolkit for parents to empower them on student data privacy: toolkit
What’s the target: data privacy policies of school districts and ed tech companies
Education Week | New Student Data Privacy Toolkit Encourages Parent Advocacy
The Federal Trade Commission created the website, FTC Small Business.
The goal of FTC Small Business is to:
State agencies to follow…
SC Media | FTC launches cybersecurity site for small businesses
The State: Rhode Island
The New Executive Level Office in Rhode ISland: state cybersecurity officer
The goal of the office: developing and putting into place a comprehensive state cybersecuritystrategy
How did the state cybersecurity officer position emerge? It was a “key recommendation of the governor’s Cybersecurity Commission, established in 2015 with the aim to lay out plans to protect the state’s IT infrastructure as well as grow a thriving cybersecurity industry”
State Tech | Rhode Island Ups Cybersecurity With Creation of CSO Position
the federal legislation: Making Available Information Now to Strengthen Trust and Resilience and Enhance Enterprise Technology (MAIN STREET) Cybersecurity Act
how it helps small businesses: Adds small businesses to the list of things that the National Institute of Standards and Technology must consider when updating its voluntary guidance on how to guard against cyberattacks.
the state commission recommendation: Missouri’s Cybersecurity Task Force recommended increased support for small businesses around cybersecurity threats
The state: Illinois
The election data target: no specific data target, it was a broadly executed hack on the Illinois election system
The hack: Retrieving voter information via voter identification number starting at “000000001 and incrementally adding one” digit
The Hill | Illinois voting records hack didn’t target specific records, says IT staff
The fake statistic: 60 percent of small businesses that suffer a cyberattack will go out of business within six months
The statistic is usually attributed to : National Cyber Security Alliance
What legisaltion has this fake statistic appeared in? HR 2105 & S770
NextGov | HOW A FAKE CYBER STATISTIC RACED THROUGH WASHINGTON
City: Seattle
Seattle’s Broadband Ordinance requires:
Seattle.gov | Seattle issues rule to strengthen broadband privacy for consumers
Cybersecurity Risk Management Audits are a 2 step process:
Bloomberg | “COMMON LANGUAGE” ENVISIONED FOR CYBERSECURITY RISK MANAGEMENT AUDITS
First came New York. Now comes Colorado promulgating cybersecurity rules on their financial sector.
The Colorado proposal will apply to:
The Colorado rules will require securities licensees to:
Bloomberg Law | Colorado Moving to Set Financial Adviser Cybersecurity Rule
The uptick in hacks as connectivity increases:
Smart technology adoption is high, but:
A hypothetical hack of power systems impacting 93 Million in North America would cost:
anywhere from $21 billion to $71 billion in damages.
Harvard Business Review | Smart Cities Are Going to Be a Security Nightmare
South Africa recently enacted a new data breach notification law that requires companies to:
Business Tech | SA companies will soon be forced to tell customers of a data breach by law
City: Newark, NJ
The ransom: 24 bitcoins, or roughly $30,000
the impact to the city: Poilice operations were functioning, but the city’s administrative systems were functioning in safe mode.
The date of the attack: Began on April 21st.
SC Media | City of Newark reportedly hit in ransomware attack
Federal Agency Regulatory Oversight option(s):
4 identified data security areas in fintech:
Balance data security protections with the 3 benefits of fintech:
State: South Carolina
The Cyber Security Executive Level Entity: Critical Infrastructure Cybersecurity Executive Oversight Group
How was the Critical Infrastructure Cybersecurity Executive Oversight Group created? Executive order
The Governor tasked the group with:
State Tech | South Carolina Establishes Cybersecurity Oversight Group
WISTV | McMaster looks to boost state’s cybersecurity through executive order
How the Spring Branch School District school was hacked: with a stolen password
What did the hacker do once in the SBISD computer system: changed grades
Was the hacker caught?
SC Media | Texas 10th grader hacks school network to change grades
When considering legislation to protect state infrastructure and emergency management systems, it has beeen revealed that the hack that led to the triggering of the Dallas emergency alarms was not a computer hack, but a hack of the radio signals.
State Tech | Dallas Reveals Radio Signals, Not Network Hack, Triggered Emergency Sirens
State: Virginia
The breach that triggered legislation: rampant W-2 phishing e-mails that have plagued businesses
Why was a legislative fix necessary? These data breaches and scames cost many states millions of dollars as a result of payments made and investigations conducted on fraudulent tax returns.
The legislative fix:
The survey of utility professionals: Utility Dive’s fourth annual State of the Electric Utility Survey, surveying more than 600 utility professionals
The #1 most pressing issue facing utility companies: cyber and physical security
what you need to know:
Utility Dive | Why utilities say grid security is the most pressing sector issue of 2017
The U.K. Parliament is working to create an election hacking unit that:
SC Magazine UK | Parliamentary committee proposes unit to combat ‘election hacking’
Trendy new exception to data breach notifications: encrypted data
How Tennesee worded the exception in its legislation:
(1) “Breach of system security”:
(A) Means the acquisition of the information set out in subdivision (a)(1)(A)(i) or (a)(1)(A)(ii) by an unauthorized person that materially compromises the security, confidentiality, or integrity of personal information maintained by the information holder:
(i) Unencrypted computerized data; or
(ii) Encrypted computerized data and the encryption key;
The National Association of Insurance Commissioners is being urged to adopt New York’s Cyber Finance Security Rules in each of their respective states.
NAIC will release proposed rules soon
Reuters | New York Regulator Wants Other States to Model Cyber Laws After Its Rules
Refresher on the New York Cyber Security Rules from January 2nd, 2017 informed:intel:
The state upping the ante on data security rules for the finance industry: New York
The new New York rules announced December 28th will:
Business Insider | New York delays new cybersecurity rules for financial firms
Background on the emergency system hack:
Procurement Opportunities for Emergency IT:
New York Times | Hacking Attack Woke Up Dallas With Emergency Sirens, Officials Say
An exception to Tennessee’s data notification law is if the data that was hacked was encrypted.
Bloomberg Law | New Tenn. Law: No Breach Notice Needed if Data Encrypted
The Bill: Illinois Right to Know Bill
What does the Right to Know Bill in Illinois do? It allows a person to know what information is collected about the person and to which businesses that information could be sold.
Why is it considered bad for business?
Dispatch Argus | Bill will crush small business, tech investment
Teaching Hospitals.
Johns Hopkins Carey Business School looked at data for data breeches at hospitals:
Health Care Dive | Teaching hospitals at higher risk for data breaches, study finds
75% of adults polled want digital privacy & “would not let investigators tap into their Internet activity to help the U.S. combat domestic terrorism”
Reuters | Most Americans unwilling to give up privacy to thwart attacks: Reuters/Ipsos poll
New York Times | Push for Internet Privacy Rules Moves to Statehouses
A March 2017 GAO highlights flaws with credit monitoring services.
Credit monitoring services do not address these cyberthreats:
State: Ohio
IT Procurement Issue: How to get innovative tech firms to bid on IT contracts, especially for data analytics.
The procurement change: Remove the old school, clunky procurement process
The procurement fix:
Governing | Letting the Little Guy In: How Ohio Expanded Its IT Expertise
What guidance is the FBI giving medical and dental providers on cybersecurity? That file transfer protocols, FTP, transfers csn be accessed by anonymous users without passwords. Cyber secuity measures should be taken to correct server settings.
What speficially did the FBI say about protected health information (PHI) pr personally identifiable information (PII) ? PHI & PII should not be kept on FTP servers allowing for anonymous operation
National Law Review | New FBI Warning for Healthcare Providers: Cybersecurity
No, thank you. Or, thank you, but no.
Microsoft has taken the stand that the only way it will turn over data to the government is if Microsoft is legally compelled to do so.
What is Microsoft saying? Sue me or more politically correct, “”We will not help any government, including our own, hack or attack any customer anywhere,””
SC Media | Microsoft president takes stand against turning over data
The U.S. Chamber of Commerce is making cyber security recommendations for regulators and policy makers, including:
The Hill | Chamber of Commerce urges Trump to get business input for cyber strategy
The data breach: Denton Health Group had thieves steal 7 years of patient data
The cyber theft: The thieves stole physical hard drives which were not encrypted
Encryption & health care:
Thank you for subscribing to our newsletter.
Great things are just around the corner!