Blog

Screens showing systems protected after a hacker's ransomware attack is denied
Rise of RaaS: Consolidating the Vendor Risk Factor 736 310 Team DataMotion

Rise of RaaS: Consolidating the Vendor Risk Factor

In the first part of our Rise of Ransomware as a Service series, we learned RaaS enables organizations to purchase ransomware and gain hacking resources which were not accessible before. With heightened access to malicious software, a rise in ransom attacks has followed. In this second part of our Rise of RaaS series, we will focus on ransomware protection and defense.

This post will review three high-profile cyberattacks that grabbed America’s attention this past year. Understanding how these attacks occurred, and the snowball effect that often follows, allows organizations to build their defenses and implement strategies to thwart similar assaults, as hackers often reutilize techniques. We’ll review some key steps and new security strategies that, when implemented, will ensure your organization is protected, as well as resilient, to ransomware.

SolarWinds Breach

The first attack we want to expound upon is what many know as the hack on the Pentagon and Department of Homeland Security. This recognition is due, of course, to the major security risk this hack imposes to the United States. But the Pentagon and DHS were not the only entities compromised in this attack. Fortune 500 companies, as well as additional government agencies, were also breached. These organizations all had one thing in common: a third-party vendor named SolarWinds, a Texas-based vendor that provides IT management tools for their customers.

It’s unclear how hackers gained access to the SolarWinds infrastructure, but once inside they began work on creating a duplicate of a SolarWinds patch that was due to be released to customers. The replica included the same bug fixes and software updates that SolarWinds had intended it to have, but lines of malicious code were added. At the very last second, right before SolarWinds was set to deploy their patch, the hackers switched the two and the replica patch containing malicious software was released. Customers were then able to download and deploy what they thought was the SolarWinds patch. Once this patch was deployed on any server with Internet access, a backdoor was opened and the attackers made themselves right at home. The intrusions were only discovered when the cybersecurity giant, FireEye, noticed some strange activity in their network and investigated. They traced this activity to the SolarWinds patch and discovered the malicious code.

Without FireEye’s inspection, the hackers could have continued undetected, extending their reach before locking down data and requiring a ransom for restoration. This prompts a frightening question: Could hackers have used the same methodology as the patch swap, or something similar, to gain access to other organizations and have yet to be discovered? We will review ransomware protection tips towards the end of this article, but we think it’s worth mentioning now that a “see something, say something” approach is of critical importance. Many employees may write off suspicious activity as a glitch or one-off scenario, but a sense of due diligence to investigate these situations caught a breach that affected an estimated 18,000 organizations. Of course, not everyone has the same resources as FireEye, but a log of suspicious activity and when it occurred can give your third-party vendors reason for an additional patch review.

Kaseya Breach

The attack on Kaseya occurred more recently, on the Friday before the Fourth of July weekend. Like the Solar Winds attack, the Kaseya breach affected their customers as well. Kaseya provides IT management solutions for managed service providers (MSPs) and IT teams. The managed service providers who utilized Kaseya‘s products provide security and management services to their customers. This management integration caused a snowball effect and allowed hackers within the affected MSPs to gain access to Kaseya’s customers’ infrastructures as well. This led to the breach reaching about 1,500 companies.

The attack occurred when hackers from REvil, the Russian based cybercrime group, found a zero-day vulnerability, or a vulnerability that has just been discovered, in Kaseya’s VSA servers which allowed them entry. From here, REvil hackers scanned the internet to find any of Kaseya’s customers utilizing this software in order to exploit the vulnerability and access their infrastructure as well. REvil demanded $70 million dollars in exchange for a key to decrypt their environment. As mentioned in the first part of this series, REvil has since taken down their site and did so without providing any decryption keys for those, like Kaseya, still in negotiations. Kaseya has stated that they have since obtained a universal decryptor from a third party.

Accenture Breach

The last and most recent breach we’ll touch upon is the attack on Accenture. This attack happened on Tuesday, August 8th when the cyber-crime organization, LockBit, encrypted data on Accenture’s infrastructure and seemingly exfiltrated the data offline. Lockbit has threatened to release the data to their site if a ransom is not paid.

According to Accenture, they had tactics in place to minimize the impact of this attack. Once suspicious activity was noticed, their team worked quickly to trace the activity and lock down their servers to limit what the hackers could access. From there, they were able to roll their encrypted servers back to their latest backup or snapshot version. This rollback method is effective and a route many organizations have taken in the past. Rolling your servers back may cause you to lose any changes made from the time the last backup or snap was taken to the time of the rollback, but allows organizations to get their infrastructure up and running quickly, without paying a ransom.

In the next section, we will provide tips to protect against ransomware, as well as techniques to make your environment resilient if an attack does occur. However, we want to emphasize the importance of backing up your servers, as we’ve seen in this example. Doing so frequently will minimize the data lost and allow for easy and seamless disaster recovery in the wake of an attack. It’s also good practice to store backups in a separate location so if one server is destroyed or compromised, the backup is not lost with it. Now, let’s jump into some additional steps you can take in order to be both protected and resilient.

Ransomware Protection and Resilience

A new cyber security practice rising with RaaS is vendor consolidation. As the examples reviewed in this post have shown, companies both large and small can fall victim to ransomware through their third-party vendors. With this revelation, many organizations are taking preemptive measures to protect themselves and limiting vendors will help reduce your attack surface. The vendor consolidation strategy involves using one vendor to fulfill as many tasks as possible and building in-house solutions to replace software that’s currently contracted out.

One step to implementing this strategy is to understand the full reach each vendor has, which can allow you to utilize them for multiple needs. You may need to do your research and ask about other products your trusted vendors provide. It’s common for vendors to fulfill multiple needs and not get to market each of their products to you, so you might not know the full capabilities one vendor has. For example, DataMotion, Inc. is best known for our secure messaging technology, but we are also a Health Information Service Provider (HISP). This is a separate product and therefore may not come up when searching and researching about our secure messaging APIs. However, with a quick inquiry into our full product list found either on our website or through a sales representative, this can be easily discovered.

In addition to the vendor consolidation strategy, it’s also important to ask your vendors what their security stack looks like, and which companies they work with. Have this conversation not only while searching for a vendor, but also with current vendors. As industry leaders learn more, new security best practices, techniques and strategies will be developed (such as vendor consolidation) and it is important that you and your vendors work to implement them.

MFA is another great way to prevent a breach. A password is a mere speed bump that is one successful brute force attack away from being broken. The more complex a password is the longer the brute force may take, but it will still be hackable. Once a password is cracked, a second layer of defense is required. Most multifactor authentication strategies require the user to type in a code they receive from a text, email or authentication app that is only valid for a short period of time (so the code can’t be brute forced as well).

Finally, a resilient infrastructure is extremely important. You can do everything correctly on your end to protect your company against ransomware, but a vulnerability in a vendor’s product or system can still leave you open to a breach. Therefore, you must ensure that you have internal security measures in place to minimize damage if a breach does occur. This is why a least privilege model (LPM) or zero trust is essential.

The least privilege model ensures each system and user only has access to what they need to do their job, and no more than that, thus limiting any access to a hacker if they gain network entry. Similarly, zero trust treats an internal network just as it would traffic coming from outside the network; users and devices are not trusted simply because they have joined the network. They must be verified, just as a user from outside would be. Those who implement zero trust also utilize LPM, encryption and MFA within their internal network. The use of either model means if any user or system is compromised through a zero-day vulnerability or phishing attack, the data the hackers can open is limited by the access available. A zero trust approach is something DataMotion has implemented since the early stages of our development.

The encryption factor of zero trust is one we especially advocate for. Encrypted data on file servers, as well as any sensitive emails and messages, will help protect data from intruders within your environment. Hackers will not be able to open or read encrypted data in folders and messages. In the same vein, if encrypted data is exfiltrated from your environment, and the attackers threaten to decrypt your data and post it for all to see you don’t have to worry.  Your encrypted data will be unreadable. Windows file servers make it easy to encrypt sensitive data, and a tool like DataMotion makes it easy to send and receive encrypted messages and know they are backed up on our messaging portal.

Final Thoughts

As ransomware continues to rise, cybercrime groups are becoming stronger and smarter. They are learning to target organizations that will enable them to reach as many companies as possible through a single vulnerability. Attacking third-party vendors often creates a snowball effect, allowing the organization’s customers, and in some cases customers’ customers, to fall victim as well. Understanding this risk allows companies to take preemptive steps to help protect themselves. In addition to vendor consolidation, understanding your vendor’s security level and keeping up with security best practices will help prevent a breach. A least privilege model and data encryption will help keep you resilient if a breach does occur.

The final post of this RaaS Series will cover the aftermath of an attack, including the steps often taken to bring encrypted infrastructures back up and running, how victims engage in negotiations, and the legal issues that often follow. Keep an eye out for this installment, as it will also provide additional security tips to help protect your company from a ransomware attack.

If you haven’t already, please visit our recent Danger for Data series, which focused on potential security vulnerabilities in an enterprise’s back-end and business sides, as well as how your team can mitigate these risks. To learn more on how you can take action now and protect your data while in motion, visit https://datamotion.com/tour-services/.

Be Sure to Read the Other Parts of This Series:

Sources and Additional Reference Reads

Hacker in mask reach hand out to steal data superimposed on screen
The Rise of Ransomware as a Service 1024 432 Team DataMotion

The Rise of Ransomware as a Service

From the attacks on SolarWinds to the JPS Meat Packing Company, the threat of a cyberattack has been democratized. Enterprises both large and small, across industries, have reported attacks and ensuing business disruptions, financial losses, and damaged reputations. In this article, the first of a three-part series on the rise of ransomware, we’ll cover what Ransomware as a Service (RaaS) is, the key players, what is being done to combat future attacks, and if your enterprise could be a target. (Hint: The answer is probably yes.)

What Is Ransomware as a Service?

What exactly is Ransomware as a Service (RaaS)? You can think of it as the sinister twin of Software as a Service (SaaS). Just like Salesforce sells its CRM software for customers to utilize, cybercrime organizations are now offering ransomware in a similar vein. In short, organizations that have built malicious software are now offering the technology to others for a profit. Scary, right? With malicious software for sale, groups with fewer technical resources and those who want a solution without the work of building one themselves, are now able to gain the same hacking abilities as the large and sophisticated groups that spent years cultivating software to exploit system weaknesses and lock down network-wide data.

RaaS is Rising. Quickly.

This malicious new industry is on the rise. According to a Gartner report, 27% of all malware incidents in 2020 were a result of ransomware. There are a few possible reasons why. One reason is that this is an incredibly profitable venture–many companies opt to pay their attackers, as this is often the fastest route to get their systems back up and running. Another reason could be that in addition to profit, malicious software is now more readily available through Ransomware as a Service (RaaS). The more organizations with access to malicious software, the larger the number of attacks launched at corporations per year will be.

Who Are the Main Players?

Throughout the years, we have seen many cybercrime groups come and go, often dismantling and regrouping under a new name to avoid detection. Two of the most notorious hacking groups, often in the news today, originate from Russia; REvil and Darkside.

REvil, which stands for Ransomware Evil, was behind the Memorial Day weekend attack on the meat processing company JBS, and the attack that targeted Kaseya VSA servers right before the Fourth of July holiday. Kaseya provides IT management solutions for MSPs and IT teams; many customers of Kaseya with on-premise VSA servers were also affected by the attack.

Darkside has claimed credit for a number of cyberattacks globally, but their most recent claim was the attack on Colonial Pipeline. This attack resulted in major disruptions of US oil distributions to southeastern states, causing gas and oil shortages in the area, and attracting the unwanted attention of the US government.

Both organizations have gone dark since their latest attacks. Darkside shut down their sites due to pressure stemming from the attention of the US government, but uncertainty surrounds the reason why REvil’s sites went down. Experts believe that the two groups will also appear again, next time under new names.

What is Being Done?

As a result of these high-profile attacks, many organizations are investing the necessary resources to train their employees on better security practices, and build their cybersecurity stack. From CASBs, secure data transfer solutions, SIEMs, endpoint protection and more, security is fast becoming a top priority to help combat looming cyber assaults from RaaS. In addition to building their own protection, many organizations are looking to the government for help.

One of the government’s responses to these recent cyberattacks was to create the Ransomware and Digital Extortion Task Force. The goal of this task force is to bring the full weight and resources of the Department of Justice (DOJ) in response to new attacks on US companies. As many other organizations have done, Colonial Pipeline decided to pay the ransom needed to quickly bring their servers back up on May 8th. The task force was able to recover roughly 2.3 million dollars (almost half of the payment made to Darkside) which added to the mounting pressure the attackers were facing.

Who is a Target?

According to the Cybersecurity and Infrastructure Security Agency, DarkSide has publicly stated they “prefer to target organizations that can afford to pay large ransoms instead of hospitals, schools, non-profits, and governments.” Cybercrime groups will also do their diligence to identify corporations with ransom insurance, or finances earmarked specifically for that purpose. While larger enterprises are currently the favorite for cyberattacks, smaller organizations also fall victim; however, the ransom amount demanded of smaller entities tends to be significantly lower than that of larger organizations.

In the next part of the Ransomware as a Service series, we will focus on how ransomware attacks have succeeded in the past, and discuss actionable steps to help protect your organization now and in the future. In the meantime, we invite you to visit our Danger for Data series, which focused on potential security vulnerabilities in an enterprise’s back-end and business sides, as well as how your team can mitigate these risks. We also invite you to learn more about the security-first zero trust strategy, and how DataMotion employs this model to help keep your organization’s data safe from would-be thieves while in transit.

To learn more on how you can take action now and protect your data while in motion, visit https://datamotion.com/tour-services/.

Be Sure To Read the Other Parts of This Series:
Blue pixelated checkmark on a dark blue pixelated background
Choosing an API Company: 14 Points for Due Diligence 736 310 Alex Mushkin

Choosing an API Company: 14 Points for Due Diligence

Technical depth. Benefits. Security. These are a few things that you will have on a checklist when choosing an API company. As we mentioned in part three of the Danger for Data series, taking time for due diligence is essential for your systems security as well as your overall business needs. In this blog post, we’re picking up on the recommendations we made previously and sharing a few questions and points of consideration for your diligence discussions. Consider this a pocket guide to refer back to when evaluating a potential API vendor. We’ve also linked to a few helpful resources for additional points of reference.

Specific Questions to Ask

Below, you will find a list of recommended questions to ask when choosing a potential API company, and a little context as to why these are important points.

  1. Is the API documentation available publicly, and does it cover methods and error codes? Documentation makes it easy to integrate your workflows with the API. Essentially, this is the blueprint detailing how to use the vendor’s API. The documentation should include information such as BaseURLs, HTTP methods, header values, request body parameters, error codes and more. DataMotion offers a comprehensive knowledge base and ample documentation for all of our services. Our knowledge base covers all bases, giving devs the information that they need at their fingertips. Here is an example of what you should expect from your vendor.
  2. Does the company offer a pre-production sandbox environment, or other means to try the API before purchasing? You will want an opportunity to test the API before you buy. Having this option, or some other pre-production sandbox, will give you an idea of ease of use, and how to best integrate into your existing workflow without disrupting day-to-day operations.
  3. What kind of purchase plans are available, and is billing a flat rate, or related to use? Your usage needs are likely going to fluctuate, perhaps on a daily, weekly, or monthly basis. Companies will offer a variety of pricing models for you to choose from, but you should ask about tiers, and what the company offers if you do not use all of the API calls in a package. Ask what happens if they have a flat rate, and you go over the ceiling. Are there additional fees, or will these retain the same rate?
  4. What kind of rate limits does the company have? Having the right limit helps ensure that your API continues to provide a consistent experience, even as usage increases. In addition, rate limits can protect your systems against DoS attacks and improve your application’s end-user experience.
  5. What kind of consulting and support do they provide? As your organization evolves, your needs will as well, and your vendor should be prepared to consult on new solutions, or adjust to meet your changing needs. Additionally, an evolving business means evolving support requirements. Ask not only about their overall support availability, but if support scales based upon your package.
  6. What is their escalation process like? If there is an emergency in the wee hours, you will want to know exactly who is responsible for what, how you can reach support, and how long it will take for updates and fixes. This question, in addition to Question 5, should be part of a comprehensive discussion about support, and what will be available to you.
  7. What kind of monitoring and reporting is offered? You will want to know in real time how your API is functioning and if there are any service interruptions or other operational issues. You will also want to have reports on your users’ activity for audit tracking purposes. DataMotion recognizes the critical nature of this area and offers 24/7 activity monitoring of the DataMotion API platform, whether deployed as a public PaaS or on our customers’ private instances managed by DataMotion. A wide range of built-in reports that cover key aspects of system functionality and users’ activity are also available.
  8. Does the company offer an API that uses OAuth or SAML authentication for Single Sign On (SSO)? To keep your systems secure, it’s important to select an API that follows the proper security precautions. Choosing an API company who uses an identity provider such as OAuth or SAML allows you to verify who is making an API call without revealing their credentials.
  9. Is there an SDK? The SDK is a getting-started point when integrating the API into your workflow, so if this, or any helper libraries are offered, you will want to ensure that that they align with your programming language.
  10. What kind of internal security model does the provider use? You should approach this exercise with a security-first mindset, and ask the provider about their security architecture. We recommend asking if the provider uses the zero-trust model, or any of its aspects. As part of this, ask about separation of duties, who can see what, who has access to the servers, and who is able to physically access any data centers.

Additional Points of Consideration

  1. Encryption for Data in Motion: As we’ve discussed in previous blog posts, a data breach is a matter of when, not if. Encrypting your data while in motion acts as an insurance policy. If your system is compromised, encryption makes your data and documents unreadable, and therefore useless to would-be thieves. If your solution will be exchanging any type of sensitive data, you need to choose an API that encrypts the information exchanged from one endpoint to another.
  2. Breadth and Depth: The greater the depth and breadth of an API, the more control you have over various aspects of how it interacts with your app. You will want to look for multiple types of APIs that operate at varying levels. DataMotion offers exactly this, including secure messaging, administrative, and provisioning APIs. You can read more about this in the blog “3 Things to Look for When Selecting Email Encryption APIs”.
  3. Verifiable Compliance Certifications: Any reputable API company should operate with security and compliance top-of-mind. A good indicator of this is their verifiable compliance certifications. Ask what kind of certifications the company has and where this documentation is available. By visiting our homepage, you can learn more about DataMotion’s certifications including:
      • DirectTrust/EHNAC RA, CA, HISP 
      • ONC-HIT 2015 Edition Health IT Modular Certification 
      • Using SOC 2- and FedRAMP-certified cloud service provider to deploy DataMotion PaaS
  4. Internal Security: To reiterate Question 10, the importance of internal security cannot be stressed enough. Ask about the company’s internal methods to keep your enterprise’s data safe when in motion. For instance, do they follow a zero-trust strategy or a similar type of security model? Get specific and granular – the vendor should be candid about their security practices.

We hope that you found these recommendations helpful. We invite you to tour DataMotion services and explore the self-service portal to learn about and trial our APIs. If you have any questions, we are happy to assist – please feel free to contact us.

Four blue closed padlock and one white open padlock symbols on dark grey alphanumeric code pixelated background.
Danger for Data, Part Three: Remedies for Risk 736 310 Bob Janacek

Danger for Data, Part Three: Remedies for Risk

In the first two installments of our “Danger for Data” series, we covered the risks of data breaches and where they live in an organization, focusing on both the IT side and the business side.  It’s clear — the question isn’t whether a breach will occur but when. Our mission now is to equip you with the tools to safeguard your data fortress.

In this third installment, we’ll reveal various strategies, outlining how to prevent a data breach, shield your company from security threats and, in some cases, significantly improve efficiency in existing workflows and daily tasks. Discover bring your own device (BYOD) security best practices and why due diligence is critical to your security strategy.

How to Protect Your Company From Cyberattacks

You can prevent security threats and defend your business with various effective strategies, from securing legacy systems to prioritizing security measures at every stage to outsmart potential breaches. By adopting these approaches, you empower your defense against cyber perils, fortify your data fortress and ensure your business’s safety and success.

Employee Training and Awareness

Your employees are the first line of defense against cyber threats. It’s essential to equip them with the knowledge and awareness to identify and respond to potential risks. Employee training and awareness programs help cultivate a security-conscious workforce that recognizes phishing attempts, practices safe browsing habits and understands the importance of safeguarding sensitive data.

Regular training sessions and interactive simulations make your team a formidable barrier against data breaches. By nurturing a culture of vigilance and accountability, you foster an environment where every staff member actively contributes to protecting your company’s digital assets. Employee training and awareness prevent breaches and elevate your organization’s cybersecurity posture.

Fortifying Legacy Systems

Navigating the challenges of legacy systems doesn’t have to be a puzzle. While replacing them entirely might seem overwhelming, there are effective ways to safeguard your aging infrastructure. These systems, often resistant to change, require tailored approaches for security. The first thing to do is patch the legacy system to bring it up-to-date and fix known vulnerabilities.

Consider secure data exchange platforms to integrate legacy systems seamlessly into modern workflows or quarantine them to minimize network exposure. While this is certainly not an exhaustive list of your options, it does provide an excellent place to start so you can begin formulating your strategy to safely extend the value of these systems.

Smart Permissions and Protocols

Permissions and protocols are critical throughout an enterprise on both the IT and business sides. By establishing expectations and guidelines, leaders in any department can mitigate the risk of a data breach from several factors, including malice and carelessness.

Consider your development team’s data permissions — a pivotal aspect that’s often underestimated. While granting broad access may seem expedient, this leniency can backfire. All it takes is just one employee making a mistake or one intelligent thief sneaking in. Opt for a “need-to-know” approach, assigning permissions only to those essential to specific folders. Regularly audit and update permissions, ensuring restricted access remains a constant practice. Additionally, organize your data so the folders match people’s roles, ensuring only the necessary data is exposed to them.

What’s outlined above is very similar to a strategy called “zero trust.” At its core, zero trust is an internal-facing security strategy focused on hypervigilance around systems, information access and who is on your systems. A good example is White House security — someone might be a vetted, trusted entity, but that doesn’t mean they should have full access to your networks or systems.

Similarly, in a BYOD setup, strict expectations and security measures must be woven into a comprehensive policy. Determine eligibility, acceptable devices — such as laptops, desktops, smartphones and tablets — data access rights and ownership protocols to create an airtight defense. Still, it’s important to note that applying BYOD policies have pros and cons. This policy may reduce business costs and increase employee efficiency. However, it can also make your enterprise vulnerable to a data breach if you do not put forth expectations and appropriate security measures as part of a comprehensive policy.

Here are a few things to consider when embarking upon a BYOD program:

  • Who is eligible to participate?
  • What are the recovery procedures if the device is lost/stolen?
  • What are acceptable devices and operating systems?
  • Who has access to what company data?
  • What is the ownership of information on each device?
  • What constitutes appropriate use?
  • Adopting a zero-trust strategy.

Thorough Due Diligence

In cybersecurity, taking the time for meticulous due diligence is a non-negotiable step toward safeguarding your company’s digital landscape. Whether you’re integrating an API into your solution or evaluating potential vendors, each decision carries weight in fortifying your defense against data breaches.

Suppose you’re considering using an API as part of your organization’s solution. In that case, you’ve likely already done some research to determine the type of API you need, potential vendors and whether or not they have ample documentation. You may have even looked into the security of the APIs you’re considering using — and if you haven’t, you should.

As I mentioned in part one of this series, choosing an API with SSO authentication, strong encryption and rate limits are a few good factors to look for that will reduce your risk of a breach. However, it’s equally vital to scrutinize the level of support you’ll receive. Probe into the specifics and ask questions like:

  • What kind of support will they provide?
  • Who is responsible for updates and bug fixes?
  • Can you try a free version of the API to see how it works with your existing systems before committing?

Exploring these dimensions ensures a well-rounded understanding before you commit.

Protect Your Data in Motion

When evaluating the security of your organization’s data exchange solutions, internal and external threats pose challenges that demand a united front from your IT and business teams. In an era of heightened security stakes and evolving compliance demands, aligning your organization’s goals with IT-driven secure exchange solutions becomes imperative.

Here are a few examples of why the business should work with IT for better secure exchange solutions:

  • The ghost in the fax machine: Traditional fax machines may seem innocuous, but they harbor a lingering risk. Confidential client data and critical account information can be easily accessed from their memory, posing a perpetual threat. And the “private” data you send often sits in plain view in the middle of the recipient’s office.
  • “Confidential” is a canard: Consider this — you send an email or receive an automated message after a client updates their account. It might have had a bold “Confidential” in the subject and a promise of confidentiality in the signature. But these so-called “security measures” are akin to those “Do Not Remove Under Penalty of Law” tags on new pillows — ineffective. Unless you sent that information via an encrypted, secure exchange method, your message is anything but secure or compliant. Encryption can make your information truly confidential and therefore useless to a potential thief, who would have been better off stealing pillows.
  • Stumbling around security: A clunky interface or the requirement of more than a couple of steps to exchange information securely is a surefire way for your security system to hinder productivity and for people to bypass it to get work done. This causes well-meaning employees to lead the business into a nasty data breach.

There are simple, secure exchange options that won’t burden your development team or blow your budget — with some even designed to accelerate your business. For example, to provide a seamless, productive and secure experience for your customers, clients and employees, consider adding secure exchange into the systems they already use. With modern REST APIs and secure protocols, your development team can quickly embed message center functionality to allow easy, secure digital exchanges between your customer-facing apps and internal customer service systems.

For a turnkey option, consider implementing a pre-built secure mailbox. With a secure email content filter, you’ll have a secure system that scans every email and attachment your organization sends for sensitive information. The filter will automatically encrypt messages when necessary — thus, protecting your enterprise against human errors.

Or going back to those legacy systems that send out automated emails and documents containing sensitive customer information — remember to protect those exchanges with integrated secure message delivery functionality. The best part about all of these options? None involve rip-and-replace or require building a secure exchange solution from scratch. Simply evaluate your current solutions and processes, determine what kind of solution is best for your organization and then adopt your chosen solution where necessary.

Prioritize Security From the Start

Simply put, when your organization deals with sensitive customer, client or patient information, security should always be top of mind. In fact, in recent years, there’s been a push for developers to “shift left” and move security testing earlier in software development cycles.

According to Google, this concept’s rationale is that a security flaw typically results from several interacting factors rather than a single error. By moving security testing to the beginning and throughout the development cycle, developers can detect faults earlier and fix them in smaller batches rather than en masse at the end of the process. In short, operating with a “security-first” mindset results in secure systems and better efficiency.

This mindset extends to your enterprise’s business side, encompassing staff security training and multifactor authentication (MFA). MFA, which includes robust passwords and additional authentication steps, is the primary defense for safeguarding critical data stored in employee emails, messaging systems and other accounts.

Training your staff on creating a password is a big step toward improved security. Staff should create strong passwords that mix numbers, symbols and upper and lower-case letters — ideally avoiding commonly-known cues such as a birthday or a pet’s name. Here are a few tips on creating — and remembering — strong passwords.

Regular Security Audits

Regular security audits are like giving your company’s data a protective shield. These audits involve systematic reviews of your systems, processes and protocols to identify vulnerabilities and potential weak points. By doing so, you can proactively detect and address security gaps before they become entry points for cyber attacks.

Think of security audits as your digital insurance policy. They ensure that your organization’s defenses remain up-to-date and effective against evolving threats. Regular checks provide valuable insights, helping you stay ahead in cybersecurity.

Safeguarding Your Data With DataMotion

In the dynamic landscape of data security, knowing how to prevent security threats is a necessity. Throughout this series, we’ve unveiled actionable remedies to fortify your defenses and navigate the complex realm of cyber threats.

Take control and champion a security-first approach with DataMotion’s secure exchange solutions. We reduce complexity and costs, providing you with a secure communication experience tailored to your needs. Our mission is to empower your business and ensure we handle your data with the utmost care.

Safeguarding sensitive information is no longer a daunting task — it’s an opportunity to enhance your organization’s efficiency and customer satisfaction. With the new DataMotion app, you can securely scan and share documents on the go.

Be sure to read the other parts of this series:

Updated September 8, 2023

Person typing on laptop while checking calendar
The DataMotion Hot List 736 310 Team DataMotion

The DataMotion Hot List

Greetings, readers! We hope that this inaugural “Hot List” round-up post finds you well and at the end of a productive week.

The DataMotion Blog has recently hosted a variety of thought leadership topics, including an in-depth look at the zero trust model (and how DataMotion’s own zero trust strategy keeps our customers’ data secure), a glimpse at the data breach risks lurking within your enterprise on both the IT and business sides, and some takeaways from June’s DirectTrust Summit. We’ve also included a few recommended reads from ‘round the web we think you’ll find to be of interest. (Some stories may require a subscription.)

We hope you find these items to be of interest! If you have questions about DataMotion and how we can help your enterprise, please visit us at datamotion.com.

What You May Have Missed

Danger for Data, Part One: Five Back-End Breach Risk Factors Whether your enterprise will experience a data breach is a matter of when, not if. In this first installment of a three-part series, DataMotion CEO Bob Janacek offers insights on where risks lie within your IT infrastructure.

Danger for Data, Part Two: Seven Pain Points in Your Processes In the second installment of this three-part series, Bob Janacek continues the conversation and discusses where risks for a data breach live on the business side–specifically, concerning your enterprise’s people and processes.

DataMotion: A Zero Trust Model You Can Trust You’re likely familiar with the trust but verify strategy, but what about zero trust? In this entry to the DataMotion Blog, Bob Janacek speaks to the benefits of a zero trust strategy, and how we use zero trust to enhance our customers’ experience—and the integrity of their data in motion.

Directly Speaking: The 2021 DirectTrust™ Summit We were pleased to participate in the DirectTrust Summit, which took place June 9th and 10th. In this post, DataMotion’s Business Development Director, Doug Rubino, shared some of his event takeaways.

Reads from ‘Round the Web

Cybersecurity as a culture, schools as ransomware targets, and European privacy regulations are some hot topics we’ve rounded up for you:

From Forbes: Cybersecurity Is A Culture, Not A Product

From MSN: The Cybersecurity 202: Schools are another prime ransomware target (msn.com)

From WSJ Pro: European Privacy Regulators Take Aim at Firms’ Cybersecurity Failures (wsj.com)

Hungry for More?

We have your fix—subscribe for our monthly newsletter, and visit us on LinkedIn, Twitter, Facebook and Instagram.

Hand touching laptop with blue data points on screen
Danger for Data, Part Two: Seven Pain Points in Your Processes 786 310 Bob Janacek

Danger for Data, Part Two: Seven Pain Points in Your Processes

As the old saying goes, there are two certainties in life: death and taxes. And if your organization deals with exchanging sensitive information, you can add data breach to that list.

Data breaches occur at an alarming rate, their causes ranging from high-profile cyberattacks, to breakdowns in workflow, to simple human error. No matter the cause, the effects of a breach can be disastrous to an organization and careers alike. While most modern, high-profile breaches are tech-heavy, a breach is not solely the IT department’s problem. To the contrary—according to a Gartner report, it is predicted that by 2024, 75% of CEOs may be held personally liable for a data breach. While a CEO may not be directly responsible for a breach, per se, this is an instance of a one-way train ticket to Accountability-ville. All aboard, including senior management! *train whistle, leaves the station*

While not every breach will make front page headlines or the 24-hour cable news cycle, organizations should expect a breach at some point and plan a defensive strategy. As I mentioned in the previous installment of this series, it is not a question of if a breach will occur, but rather, where and when.

In this installment of the Risk of a Data Breach series, I’ll focus on costs of a potential breach, and where analysts and operations can evaluate potential risks within their business, notably the people and processes associated with the exchange of sensitive data and documents.

School is in Session

Let’s start with the definitions of a hack versus a breach. The two may seem like the same thing, but there are important nuances. A hack is an intentional, malicious attack against your IT systems by a third party with the intent of stealing and selling information, blackmail, or some other self-serving use. A breach (which can result from a hack) occurs when information is left unsecured, exposing your data and documents to unauthorized viewers both internally and potentially the outside world. This article will focus on the latter.

The Business End of a Breach

The average cost of a breach is in the millions, with healthcare leading the way in bearing the highest breach-related costs, $7.1 million on average. The cost of a data breach for a business extends well beyond additional budgeting for the IT department. Immediate costs include enormous legal fees and regulatory fines (particularly for issues such as a HIPAA violation). Additionally, costs add up over time with the risk of lost current and future revenue stemming from bad PR and a loss of customer trust. You might think you are covered with insurance, but think again. Insurance payments typically only cover $500,000-$5 million per incident. If costs exceed your coverage limit, the business is responsible for the rest. Case in point:  check out the fines associated with GDPR violations. Google doled out a cool 50 million Euros in 2019 for GDPR violations. That might be pocket change for an entity such as Google, but it is still a significant amount for most companies. To add insult to financial injury, after a particularly high-profile breach, a company might be associated with the breach rather than for the products and services they offer. Two examples of this are Target and Uber.

With high stakes for your reputation and bottom-line, as well as for the overall ethics of keeping sensitive data protected, reducing your business’ risk of a data breach is an enterprise-wide responsibility.

The Root of the Matter

A data breach has causes other than sloppy code, network loopholes, or poor defenses against malware. There are many other ways that data can make its way out of your organization and into public view. Knowing the processes that exist in your business that are at a greater risk of a data breach is step one towards increasing your organization’s security.

Unsecure Exchange Methods Some of our most tried-and-true communications methods no longer cut it. One example is the fax machine. Faxing may have been cutting-edge technology back in 1843 when Alexander Bain developed the first prototype, but no more. Not only do fax machines transmit unencrypted data over a public network, but their output is often in the open. Another example is your organization’s not-entirely-secure enterprise email system. Yes, access to mailboxes is password-protected, but does it encrypt sensitive messages and documents in ways that your employees and customers want to use?

Password Factors Password protection is great, except when it isn’t. While weak passwords are a problem, according to Windows Central, the majority of account hacks result not just from weak passwords but also from the lack of two-factor authentication. Essentially, because a password was the only line of defense, a hacker was able to grab that password and access a system because they only needed one form of identification.

Access Who should have access to your data and who really does? If you’re not employing a Zero Trust policy, you may be leaving the vault door wide open for stolen or compromised data, whether in the case of malicious intent or simple human error.

BYOD Policies Even before the meteoric rise in employees clocking in from home, a number of organizations allowed staff to use their own devices in addition to (or instead of) company devices—often with no accompanying user policy or documented expectations. Any device where employees conduct both personal and company business can compromise security, including that of sensitive data and documents. In addition to company-sanctioned devices, auxiliary devices, such as thumb drives, may be compromised, offering another hole for your data to escape.

Human Error People make mistakes—it’s a fact of life. An unattended laptop may result in device theft and access to data—especially if data was saved locally. Sometimes, a document is sent to the wrong email address or fax number. Speaking of common errors, who among us has never left a faxed/copied document on the machine, allowing others to see that confidential data? (And people look. Even if they say otherwise.)

Easy Way Around Security In addition to the common human errors I just described, employees may engage in less-than-secure practices to save time. For instance, if an employee has a full plate and deadlines, they may opt for the path of least resistance, particularly if your organization’s secure exchange and storage methods have a clunky interface. You can bet on shortcuts if exchanges require additional steps such as logging into separate portals.  Like the sand in an hourglass, so slips security protocol.

“But We’ve Always Done it this Way”

The above phrase is highly dangerous to an enterprise for a myriad of reasons. In addition to stifling new ideas and workflows, resting on your BWADITW laurels can set your organization up for terrific security failures. This attitude enables the above risk elements I described;  in particular, continuing with exchange methods that are not secure or inconvenient, such as regular emails simply marked “confidential” and multiple portal logins for secure message and document exchange. Resting on laurels might indicate that management is asleep at the wheel, not anticipating or planning for potential human errors and breakdowns in workflow. BWADITW invokes the meme of the dog surrounded by flames, sipping on coffee and saying “this is fine”.  This attitude impedes the case for research and investment in systems upgrades, including a secure exchange system that does more than just tick a compliance checkbox and actually gets used.

This approach to cybersecurity is a whole lot o’ nope.*

Just because your organization hasn’t had a data breach yet doesn’t mean the risk isn’t there. Integrating data protection in ways that are most natural to your employees, systems, customers and partners ensures that your information security strategy becomes part of your data exchange workflows. While a secure exchange method might not prevent a breach, implementing one that gets in the way of workflows, productivity and customer experience will elevate the chance that simpler, non-secure methods of exchange will be used, greatly increasing your risk of a hack or data breach. If hackers and thieves cannot decipher the content, then they cannot use or sell the data, making it useless.

We’ve now discussed where the risks of a data breach lie within your organization, both on the IT and business sides. In the next installment of this series, we’ll explore how your organization can improve secure exchange practices and avoid both the risk of a data breach and the compliance nightmares that can accompany these events.

Be Sure To Read the Other Parts of This Series:
A light blue security lock with data pixels flying to the right side on a dark blue background
Danger for Data, Part One: 7 Back-End Breach Risk Factors 786 310 Bob Janacek

Danger for Data, Part One: 7 Back-End Breach Risk Factors

According to the Identity Theft Resource Center’s 2022 Data Breach report, 1,802 data compromises were reported in 2022 in the United States, just 60 shy of 2021’s total. That number of data compromises translates to over 422 million affected individuals. Additionally, the average cost of a data breach worldwide in 2023 rose from $4.35 million to $4.45 million.

As such, many organizations want to know how they can reduce their data breach risks and which of their current processes put them most at risk. In the first part of this blog series, we will cover the top five risk-prone areas that developers and software engineers should be aware of. We’ll also discuss the causes and different types of data breaches that can occur within organizations.

In parts two and three, we’ll focus on people-oriented processes that put you at risk of a breach, following up with actionable tips, recommendations and data breach prevention tools for organizations to protect themselves and their customers’ data.

How Do Data Breaches Happen?

There are multiple ways data breaches can happen, including hacking, phishing, malware attacks, inside threats and weak security measures.

Hackers may take advantage of software and system vulnerabilities to gain unauthorized access to important information. Malware, such as viruses or ransomware, can infiltrate systems and steal data. Social engineering tactics, like phishing and baiting, involve deceiving individuals into revealing their login details. Insufficient physical and network security measures, weak passwords and unpatched software can also lead to data breaches.

A minor vulnerability can turn into a major data breach catastrophe in the digital realm. Whether you’re a business, government entity or individual, the exposure of sensitive information can lead to costly complications.

Often, individuals underestimate the prevalence of modern security threats due to a lack of awareness. As such, it’s crucial to understand the different types of data breaches:

  • Ransomware: Malicious software encrypts user data, demanding payment for decryption.
  • Malware: Harmful software infiltrates systems to access, steal or manipulate data.
  • Phishing: Deceptive emails or messages trick users into revealing sensitive information or clicking on malicious links.
  • Password guessing: Hackers use trial and error to uncover weak passwords and gain unauthorized access.
  • Stolen information: Cybercriminals physically steal devices or data storage containing valuable information.
  • Recording keystrokes: Malware records user keystrokes to capture login credentials and sensitive data.
  • Distributed Denial of Service: Attackers flood a network with traffic, overwhelming it and causing service disruption.
  • Unauthorized access: This can occur due to weak passwords, compromised credentials or vulnerabilities in software.
  • Insider threat: This can occur when disgruntled employees misuse their credentials to compromise and steal data.
  • Physical theft or loss: This is associated with the physical theft or loss of devices such as laptops, smartphones or storage media.
  • Third-party breaches: Security vulnerabilities in third-party vendors, suppliers or services can expose your organization to data breaches.
  • Shared accounts: Sharing credentials or using shared service accounts makes it challenging to trace actions back to specific individuals, increasing the risk of breaches.
  • Structured query language injection: One of the most common types of data breaches is when an attacker injects malicious code that allows them to manipulate the database query and gain access to sensitive information.

These breaches exploit vulnerabilities to steal personal and confidential information or hold an organization hostage to extract a ransom. Data breaches ultimately lead to financial loss and reputational damage.

Back-End Processes Putting You at Risk

Your organization may be at risk of data breaches due to various system and application vulnerabilities. Some of the examples of these security vulnerabilities include:

1. Outdated, Legacy Systems

Legacy systems are tremendously costly. These systems often operate on outdated hardware and software, which can be challenging and expensive to maintain. The cost of finding replacement parts, skilled personnel and compatible software can add up quickly.

Costs aside, legacy systems pose an elevated risk of a data breach due to outdated code, obsolete standards and outdated methods and procedures. An example of this is the use of passwords in clear text and relying on a common service account for operational tasks. These vulnerabilities, combined with a scarcity of qualified personnel to maintain them, create an ideal environment for hackers to exploit.

Despite the risks, many organizations continue to rely on these outdated systems. The reluctance to update or replace isn’t from nonchalance — this is usually because the systems were created for a specific purpose. Removing them could lead to data loss or an inability for an organization to execute critical processes.

2. Vulnerable Data Access

Would you give the keys to your house to just anyone in your circle? Probably not, because you understand not everyone should have that kind of access. There is no reason for your college roommate to have your keys or your third cousin. If you wouldn’t give everyone unlimited access to your house, why would you grant every employee access to all the data in your organization?

Just as giving away house keys opens the door to serious problems, playing fast and loose with data permissions is risky, too. This isn’t merely because of the risk of malicious intent by insiders — which costs organizations an average of about $4.90 million in 2023, or 9.5% more than the average $4.45 million cost of a global data breach — but rather the much higher risk of sensitive data being mishandled internally.

So, just as you carefully limit access to your home, data permissions demand similar vigilance. Access control levels (ACLs) are crucial for granting appropriate access. Your team may need higher access levels, but sensitive data should remain off-limits to others.

It is important to periodically review access levels and question the necessity of those levels to minimize the risk of unauthorized access resulting from ACL misconfigurations, oversight or mishandling. These reviews should be conducted by a third party who is not involved in the security process.

3. Sloppy Code and Insecure APIs

As a developer, you are notoriously busy. There is almost always a new product or update to release in a tight timeframe while simultaneously fixing bugs and improving performance. High stress and low bandwidth can lead to errors slipping under your radar. If you aren’t given the time to rigorously test your code, your organization runs the risk of releasing a project with security holes, thus increasing the number of vulnerabilities and the risk of a data breach.

Vulnerabilities in your codebase and poorly secured APIs create opportunities for cyber assailants. These weaknesses could range from inadequate input validation to a lack of proper encryption. Flaws in your code and APIs can lead to unauthorized data access, manipulation or even full-scale breaches. The cost isn’t just financial — the aftermath might entail reputational damage and regulatory penalties. There are several real-life examples of data breaches due to insecure and unregulated APIs.

Knowing that big development projects are time-consuming and typically involve features outside of your bandwidth, you might consider using third-party APIs. This option can help curtail the time and financial burden associated with building a project from scratch, while you benefit from the expertise the API company brings. But don’t gamble on your data security — do your diligence and research your vendor and the API you’re planning to use before coding them in.

In short, selecting APIs that follow proper security measures is critical. APIs that use OAuth or SAML authentication, strong encryption such as AES 256 and TLS, and those with rate limits all reduce the risk of a breach. Choosing an API that uses a zero-trust model, while unfortunately rather rare, is also another best practice to enhance the security of your project.

4. No Protections for Data in Motion

Most people understand the risks associated with sending an email, including phishing, malware and ransomware, to name just a few. The topic of inbound email security is frequently discussed, but we’ll examine a less-discussed risk — sending sensitive information in an outbound email.

When you send an email, that message passes through many systems and network locations. Think of the process as traveling abroad. As a tourist, you would carry your driver’s license, insurance card, credit card and passport. If you are marked as a tourist, an experienced pick-pocket can steal these items without anyone noticing. But by taking steps to secure your belongings, such as with an RFID wallet clipped to your belt, your chances of theft significantly decrease.

Protecting your outbound data is a similar concept. Just as you’d act to secure your documents while traveling, securing any sensitive information sent from your systems is equally important. Like a pick-pocket, a capable hacker can intercept emails and access sensitive information before you even notice a problem.

Taking the proper measures to protect your sensitive data diminishes both the threat and impact of email interception. To enhance the security of your emails and safeguard against phishing and malware attacks, it’s crucial to utilize proper transport layer security (TLS) encryption, end-to-end encryption, S/MIME and secure email gateways. However, it’s also necessary to protect non-email-based data in motion, like electronic data interchange and web traffic. In addition to TLS encryption, you should follow other best practices, including SSL/TLS certificates, HTTPS implementation, virtual private network usage, multi-factor authorization deployment and network segmentation.

For instance, using an email encryption service renders the content in your exchanges useless to hackers, greatly decreasing the chance of a breach. Utilizing options such as secure emailcontent filters and customer channels for secure messaging can lower your risk and accelerate your business.

5. Lack of Encryption Between Frontend and Backend Applications

The seamless interaction between frontend and backend applications is crucial for smooth operations. However, overlooking the encryption of communication between these components can open a gateway for potential data breaches.

Cyber attackers can exploit this vulnerability through man-in-the-middle attacks, intercepting and tampering with the data flowing between frontend and backend systems. Organizations inadvertently expose sensitive information to prying eyes by failing to implement strong encryption protocols.

Unencrypted communications provide a fertile ground for hackers to eavesdrop, steal data or inject malicious code — jeopardizing the confidentiality and integrity of critical information.

6. Unpatched Software

Picture unpatched software as an unlocked door in an otherwise secure fortress — a glaring vulnerability that cyber adversaries are all too eager to exploit. When organizations neglect to apply timely software updates and patches, they inadvertently create a gateway for hackers to infiltrate their systems.

Hackers are adept at identifying known vulnerabilities in outdated software versions. They exploit these weaknesses to gain unauthorized access, manipulate data and even exfiltrate sensitive information. Think of it as a thief finding an unguarded entrance to a vault.

7. Security as an Afterthought

There’s a well-known phrase that says if you fail to plan, you plan to fail. Perfect examples of this include failure to assess overall risk factors and proactively identifying and addressing software vulnerabilities before they become an issue. Another back-end breach risk factor is falsely assuming that your organization is not susceptible to a breach. Building your solutions without security as top-of-mind invites hackers in and you’ll find yourself in a race against the clock to find uninvited guests in your production systems before they gain control of sensitive data.

Make no mistake — it’s not a question of if you’ll suffer a data breach, but rather, a question of when. Being proactive about protecting your systems and data is much better than being reactive.

Fortify Your Defenses, Choose DataMotion for Secure Data Exchange

In an interconnected digital landscape, your data’s safety is crucial. Our exploration of seven back-end breach risk factors underscores the urgency of modernizing data protection. Ignoring these threats may expose your organization to avoidable risks. Don’t let complacency compromise your security.

As you analyze your current practices, remember that prevention is key. Stay vigilant against data breaches by adopting cutting-edge data breach prevention tools. DataMotion offers a comprehensive suite of services — honed by two decades of experience — to fortify your digital ecosystem.

Contact us online for more information on how you can upgrade your data protection.

Be sure to read the other parts of this series:

Updated September 8, 2023

A light blue heart superimposed on a dark blue background with data points and health information technology icons surrounding the heart
Directly Speaking: The 2021 DirectTrust™ Summit 786 310 Doug Rubino

Directly Speaking: The 2021 DirectTrust™ Summit

On June 9th-10th, DataMotion participated in the DirectTrust™ Summit, which hosted attendees and distinguished guest speakers from the healthcare industry. Below is an interview with Doug Rubino, DataMotion Business Development Director, Healthcare, who attended the Summit and kindly shared a quick overview of the event and some of his takeaways.

Q: Doug, we understand there was a lively “Ask Me Anything” (AMA) discussion.  Could you share a bit about the topics discussed and your session takeaways?

Doug Rubino: On the topic of a healthcare provider directory, there were good questions and a related dialogue around the usability and governance components of a single directory, and its applicability to the patient and provider communities.

Another good question asked was on the topic of the usability of health information technology (HIT). The consensus was that who defines what is usable, and what is not usable, is impossible to define. Right now, is not so much certifying usability, but rather knowing that at a minimum, vendors are thinking about usability and can demonstrate such through user groups and other methods of soliciting feedback from their customers.  It sounds like the following will be top-of-mind for the industry in 2021:

  • Portability and patient-centric solutions
  • Telehealth and virtual care
  • Public health reporting and analytics
  • Social Determinants of Health (SDOH) and the use of HIT to address the requirements thereof
  • Patient-facing apps

There were also some excellent questions and dialogue around Trusted Exchange Network and Common Agreement(TEFCA), and collaboration among the government and private sector as we move forward. An example of this would be the implementation, and building on, the ADT Event Notifications.

Q: We’d definitely like to follow up on what’s next for ADT Event Notifications, but for now, what are some of the key takeaways that you have learned about the future of healthcare interoperability?

DR: One of the key themes of the future of interoperability is that of “closing the loop” and providing a truly seamless experience for healthcare providers, payers, vendors, and patients across the board. Over the past 25 years, there has been a tremendous amount of work and success in so many areas of interoperability. It is because of the decades of effort, we are not too far away from healthcare and related organizations, as well as regulatory bodies, becoming truly interoperable. When I say not too far away, I mean that this industry, which is really use-case driven, has considered a number of circumstances where interoperability is critical, and there is a model in mind. For instance, let’s talk about the banking industry. You are a customer at bank A, but if you use an ATM from banks B, C, D, or even E, you may still withdraw money (for a fee, of course) and see your account balances. Interoperability is really the same concept for healthcare—we want a patient, no matter where they are receiving care, to have that doctor immediately be able to pull their medical records from another care provider or organization with the same ease that the patient withdrew money from another bank’s ATM that morning for their coffee shop run. 

Because of the continuing work and innovation by organizations like DirectTrust, Strategic Health Information Exchange Collaborative (SHIEC), HIEs, HISPs, and other key players in the healthcare vertical, we’re not too far away from achieving something with the same ease and at-your-fingertips information gathering as the banking model I mentioned.

Q: What are some challenges people are facing with the healthcare directories?

DR: When it comes down to basics, the challenges shared are really about three areas: governance, ownership, and the national standard.  One challenge cited was about the accuracy of the data, and another challenge concerned the national standard with respect to the endpoint. For instance, one physician may list his personal Gmail address, while another may list his hospital employer, while a third physician may list a Direct Secure Messaging address. This is problematic because it may result in duplicate and overlaid values, and perhaps confusion over who to contact and how, potentially delaying care.

The usability questions mentioned earlier are also applicable with respect to patient use cases, e.g. how do we take the same national provider directory, and make it usable for a patient?  While there were regulations released last year to fix some of the issues, there is still work to be done.

DataMotion, an active participant in DirectTrust, has helped with the endpoint issues in that we ensure that all listed addresses are legitimate, and by promoting the standard that the Direct address is the address at the endpoint. The actual issues, though, go beyond DirectTrust, and lie with the need to establish a true national standard, which is where TEFCA comes in.

Explore More

ADT Event Notifications: What You Need to Know to Comply | DataMotion

The Healthcare Vertical in 2021 | Doug Rubino | DataMotion

Digital Transformation and Clinical Data Exchange | DataMotion

Healthcare Provider Directory Boosts Direct Secure Messaging Value

Q: ADT (Admissions, Discharge and Transfer) notifications took effect in May. What’s next?

DR: What’s next really comes back to something I mentioned earlier—the theme of “closing the loop.” One way this is taking shape is the use of metadata (which is essentially data that gives context around other data) to better-inform the recipient organizations of the reason for a patient’s admission, discharge or transfer.

For example, a patient goes to a hospital with an ailment. After receiving the appropriate care, the patient is then discharged. That discharge notification should go to the patient’s general practitioner, any specialists, and the designated care team. But what’s next takes this a step further for an even more holistic care approach. When the patient is discharged, that notification includes the metadata that I mentioned a moment ago, providing the full context around the reason for the discharge, as well as other relevant information to the care team, so that they may follow up and continue to provide appropriate care. The anticipation is that this change will improve care coordination and thus, result in better patient outcomes.

The second part of this new aspect can go even further—particularly with those in underserved communities.  The goal is to drive deeper penetration into a community via community groups and other human service organizations. Let’s take our recently-discharged patient. His GP and other caregivers have been alerted to his hospital stay, discharge, and the context around it. If our patient is in an underserved community, an outreach group will receive the notifications, and be able to arrange additional services to help with the patient outcome. For instance, securing food delivery from a local pantry, helping with transportation to appointments, and perhaps arranging a wellness check. In addition to medical care, ADT notifications will also help with satisfying basic needs surrounding the alert.

Q: Doug, as we wrap up, is there anything else you’d like to share about the conference or the future of the industry?

DR: Overall, the DirectTrust Summit was an informative and well-executed event. There were excellent panel presentations and some thought-provoking discussions. In addition to the clinical element, there was definitely a layer of inspiration, and examples of the positive change that is already coming out from all of the hard work and care in this area. One shining example of the need for a better patient experience and outcome was illustrated by a speaker, who shared her experience of being diagnosed with cancer at age 11. Now in her early twenties, she voiced how frustrating it was to have to continually share her background ad nauseum with doctors, on top of fighting her disease. Our goal for better interoperability, in short, is for the patient to focus on recovery and regaining health, and not worry about having to continually provide background information to care providers. We want to leave that aspect to the medical professionals, who should be able to access this information as easily as they withdraw cash from any ATM.

I know that I left with a lot of great new information, new perspectives, and excitement over the outstanding work being done in interoperability. There is a lot to look forward to!

Q: Doug, this was really informative, thank you for sharing your takeaways with us.

DR: It was a pleasure speaking with you, I’m looking forward to our next conversation about what’s happening in the industry, and the great innovations taking place.

We invite you to learn more about DataMotion’s Direct Secure Messaging solutions.

Blue lock in shield surrounded by a blue circle and data points
DataMotion: A Zero Trust Model You Can Trust 786 310 Bob Janacek

DataMotion: A Zero Trust Model You Can Trust

It’s a safe bet to say that your organization is concerned about cybersecurity. Your IT team is likely well-staffed and has implemented the latest security tools, and trained non-IT staff on the ills that befall those who click on external links and attachments without checking. Your organization has trusted but verified, perhaps verified then trusted. But is the “trust but verify” standard enough? Are you really operating as safely as you could, or rather, should be in today’s cyber climate?

The answer is no. Let us explain.

A Tale of Two Strategies

I’d like to take a moment to discuss two of the more prominent schools of practice in IT security– “trust but verify” and “zero trust” (or “trust no one”).  To illustrate these examples, let’s draw upon a well-known bastion of high-stakes security—the White House.

“Trust but verify” focuses on a strong external defense through establishing a solid perimeter. The White House employs precisely that—the iconic iron fence, a no-fly-zone, bullet-proof windows (which cannot be opened), monitored alarm systems, and of course, the Secret Service detail. Your organization’s IT security architecture has likely built the equivalent of the White House perimeter, using firewalls, proxy gateways, system alerts, password requirements and vendor training. (Perhaps you also have a no-fly zone!) In theory and perhaps in practice, any external hackers are going to have a rough time accessing your organization’s data or compromising your servers or mainframe.

Reading this, “trust but verify” sounds sufficient on paper. However, the complacency zone is the danger zone, and this is where the “zero trust” concept comes in. You have a strong exterior, but what about your organization’s interior? Like the White House, your most valuable resource is also your biggest risk: people. Which takes us to our second concept, that of “zero trust” or “trust no one.”

Let’s go back to 1600 Pennsylvania Avenue. Once you (lawfully) gain access, you’ll find scores of people milling about, including legislative and household staff, guests from Capitol Hill, tourists, etc. While everyone has gone through a standard security check, ranging from a metal detector to an FBI background check, the Secret Service cannot afford the standard “trust but verify” approach, and must rely on “zero trust” as a consistent, elevated means of security.

Zero Trust is, at its core, an enhanced level of managing access, with hyper-awareness of who is on, and has access to, your network and data. For instance, while a White House intern or assistant has been vetted at hiring, and perhaps passed through a couple of checkpoints for that workday, does it make sense for that intern or assistant to have unfettered access to the Situation Room, or the Residence?  Should a tourist be able to simply walk into the Oval Office? And would just anyone have access to the President? Of course not. Vetting should not equal full access.

Back to your organization. Those who have access to systems, including company email and other communication tools are likely your staff, or trusted third parties, such as vendors and contractors. However, you’re not likely to hand over, say, a master list of security passwords to the Marketing team if they ask. Nor would you give a list of the home addresses and contact information of staff to a software vendor. Sure, you trust these folks, but do they need this level of access to sensitive information? We’ll go out on a limb and say no.

Essentially, trust but verify relies on a strong defense, vetting then trusting people and systems. Zero trust is an internal strategy, focusing on hypervigilance around not only system security compliance, but access.  Here at DataMotion, we abide by both.

Read More

A Service for Secret and Sensitive Information

In the United States alone, statistics reflect as many as 2,500 security breaches daily, with insider activity accounting for up to 58% of this number. (1)  An internal breach has various causes, including BYOD practices, malicious activity, carelessness, or from plain, old-fashioned ignorance or human error. Additionally, 52% of employees surveyed do not feel that sharing login credentials poses a security risk to their employer. (2) Whatever the cause, a zero-trust strategy greatly reduces your organization’s chances of an access-related security lapse.

Like the Secret Service, DataMotion employs the “zero trust” approach (albeit, for us it is sans earpieces and guns—for some of our customers, it’s both). We provide a strong, multi-layered, security-and-compliance-centered strategy for your organization’s secure exchange —here are a few examples of how we apply this concept to keep your data safe:

Zero Visibility We facilitate your secure exchanges, but our team cannot view your messages, data or documents. Ever. They are seen by the sender and the intended recipient; after that, your organization’s protocols come into effect.

Limited Physical Access Only those employed by the data center may access servers running our systems. Any third parties that require access for critical functions are authorized and under contract by the data center.

Key Management The DataMotion system automatically handles encryption key management, creating a secure, easy to use system in which the encryption seeds are unique to each message and megabyte (MB) of document exchanged between users.

Governed Data Access All actions are validated by the data layer before data is accessed. Application servers have no direct access to data tables, and have to ask “may I please” to interact with the encrypted data store. The type and scope of every request must be approved by the data layer, producing a “need to know” environment that greatly reduces the attack surface.

Separation of Duties Data breaches can occur when there is overlap between access to source code and production systems. At DataMotion, developers have access to the code, but not the systems, and our operations team has access to the systems, but not the code. There is no Venn diagram of access, thus greatly reducing risk.

Background Checks In addition to a series of interviews and reference checks, all DataMotion employees also undergo additional background checks when hired.

DataMotion’s zero-trust architecture is only part of protecting your organization’s data.  In addition to the steps we take behind the scenes, each exchange meets your industry’s regulations and requirements, such as HIPAA, GLBA, PCI-DSS, HITECH, GDPR, PIPEDA, FINRA, FERPA, CCPA and CJIS,ensuring that your securely-sent communications are fully compliant.

While we trust no one, we are pleased to be trusted by others, with the following certifications:

We are also, as of this writing, working on HiTrust certification.

DataMotion’s zero trust model helps achieve all these certifications and helps you, the customer, remain compliant with many different requirements and regulations.

Zero Trust in Beast Mode: Exchanging Securely with DataMotion

When the US President travels, he’s not flying commercial, nor driven around in a standard sedan. No, this is where secure transit is employed, including Air Force One and the Beast. And secure transit just happens to be our specialty.

The presidential limousine (dubbed “the Beast”) is no ordinary car—its many security features include eight-inch-thick, armor-plated doors, Kevlar-reinforced tires, a specially-encrypted phone, and a Secret Service driver that is highly trained to be prepared for any driving condition or maneuver. Given this level of security, the President has excellent odds of travelling safely from Point A to Point B and arriving unscathed.

Your organization’s secure data and documents shouldn’t have to fly coach, nor be strapped into a 1960 sedan. DataMotion’s zero trust, security-first design is like the Beast—while we might not use Kevlar tires or armored plates, we do have the technological equivalent in our FIPS 140-2 encryption and our governed core (with need-to-know control and full activity reporting) ensuring that your data and documents in motion and at rest in our system are protected and arrive unscathed on their journey from Point A to Point B.

We know that like the president, your data can travel anywhere at any time, so we have built this same Beast-mode level of secure exchange into our new DataMotion app (available in the Apple App Store).

Security in Plain Sight

Let’s take a final jaunt back to the White House, where members of the First Family will have Secret Service agents tailing them wherever they go. If you are a teenager with a detail, chances are you’re going to try to give them the slip because let’s face it, it’s hard to blend in when you’re followed around by a bunch of serious-looking guys in suits. However, that same teenager will likely be more amenable to having their detail around if the suits are replaced by jeans, khakis and maybe a concert tee shirt. This way, the teen feels more at ease, and there are still layers of security surrounding the teen while they are in motion (or “on the move”) but blending in better.

This principle applies to DataMotion’s philosophy that security that is transparent is used. If it’s clunky or requires several additional steps, no matter how well-meaning or earnest an employee may be, bypassing security protocols might be the easiest way to quickly send documents and data, putting your organization at risk. Unobtrusive, transparent security is the way to go, enabling an employee to easily follow protocol and keep your data secure.  DataMotion’s APIs can easily integrate into any workflow, offering a seamless, frictionless experience for your staff and clients, keeping people productive and data secure.  By leveraging a zero trust architecture that offers a smooth experience, you have just elevated your organization’s security and productivity. We’d call that beauty and the beast.

There you have it. You’ve likely realized that the trust but verify approach, while providing a high perimeter, doesn’t do anything for your organization’s soft underbelly. We encourage you to leave your cybersecurity comfort zone, learn more about DataMotion, and about how our security-first approach can benefit your organization and clients.

Still have questions? Send us a note.

 

Sources

  1. Insider Threat Statistics on Data Breach (pilixo.com)
  2. Insider Threat Statistics: The seriousness of insider threats, intentional or not (isdecisions.com)
Doctor with stethoscope typing on a smartphone
What’s Happening Next Week? DataMotion is at the 2021 DirectTrust™ Summit 736 310 Team DataMotion

What’s Happening Next Week? DataMotion is at the 2021 DirectTrust™ Summit

On June 9th and 10th (Wednesday and Thursday) DataMotion will be participating in the virtual 2021 DirectTrust Summit.  This year’s Summit features an awesome line-up of health IT and interoperability authorities from around the country, and as always, this event is an excellent opportunity to get the most up-to-date news and info on exchanging health data. If you wish to attend but are not a member of DirectTrust, no problem–you don’t have to be a member to attend.

If you’d like to learn more about Direct Secure Messaging, please visit us at our virtual booth starting Monday, June 7, 2021. Our Direct Secure Messaging services can help organizations meet CMS ADT Event Notification requirements, qualify for value-based incentive programs, improve quality of care, and empower patients. Using DataMotion Direct APIs, you can easily integrate secure exchange within your mHealth app, patient portal, healthcare solution or workflow.

You can register for the event here.  We hope to see you at the Summit!