Noah Webster / en Ransomware on the Rise /resources/blog/july-2021/ransomware-rise <span>Ransomware on the Rise</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Sat, 07/17/2021 - 23:10</span> <a href="/taxonomy/term/31" hreflang="en">Trends</a> <a href="/taxonomy/term/45" hreflang="en">Noah Webster</a> <article><img loading="lazy" src="/sites/default/files/2021-08/shutterstock_381764248.png" width="1400" height="700" alt="dollar bill in the shape of an upward arrow" typeof="foaf:Image" /></article><p><span><span><span>Ransomware cripples the target company’s operations, making it much different from an attack that steals data.  The implication of this became clear as I developed a contingency plan to pay a ransom.  Before thinking through the issue, I pictured the payment as a get-out-of-jail-free-card.  My team does all it can to secure our systems; if we get hit, we can pay and continue operations.  But that simply isn’t the case.  You need a better plan.  </span></span></span></p> <h2><span><span><span><strong>Ransomware on the Rise</strong></span></span></span></h2> <p><span><span><span>Ransomware blocks access to systems or data until you pay.  It takes what would once result in a breach or data loss through phishing email or an exposed security vulnerability, and systematizes how the attacker monetizes the attack.  After the attacker gains control, they threaten to keep you locked out or to disclose your data unless you pay.  </span></span></span></p> <p><span><span><span>A recent attack on Kaseya shows how ransomware presents a threat to both a Managed Service Provider (MSP) <em>and</em> the end customer.  The attacker uses the MSP to gain access to the customers.</span></span></span></p> <p><span><span><span>Given the financial incentive, everything about ransomware has exploded.  In 2020, ransomware attacks increased by approximately 400% in developed nations, with a reported <a href="https://www.nytimes.com/2021/06/03/us/politics/ransomware-cybersecurity-infrastructure.html">65,000 successful</a> attacks which is an average of one every eight minutes.  The <a href="https://www.youtube.com/watch?v=UvrvImxxjNc&t=1s">FBI observes</a> that, in 2013, ransomware focused on one PC at a time, now it targets entire networks or industries.  A ransom demand had been hundreds of dollars, then thousands, now millions.  Where previously a gang often worked alone, Ransomware attackers now coordinate as larger cartels, sharing information and techniques more broadly.  </span></span></span></p> <p><span><span><span>The threat has become so serious that the U.S. government now offers a <a href="https://www.nytimes.com/2021/07/15/us/biden-reward-ransomware.html">bounty</a> up to $10M for information that leads to the arrest of a ransomware gang.  The government has also established a <a href="https://www.cisa.gov/stopransomware">stopransomware site</a> to keep you informed and encourage victims to report attacks.  </span></span></span></p> <h3><span><span><span><strong>Paying the Ransom, Not a Good Option</strong></span></span></span></h3> <p><span><span><span>There are several reasons why you cannot depend on being able to pay your way out of a ransomware incident:</span></span></span></p> <ul><li><span><span><span><u>No guarantee of honesty</u>.  Despite stories about the illicit dark web running like the Amazon store, where even the bad guys must maintain a reputation for honoring commitments, you can’t be sure that your system will be restored after you make payment.  Even if your attacker wants to restore your system, the restoration process may not work or the attack may have been irreversibly destructive.  You can also have no expectation that any restoration will happen immediately.  </span></span></span></li> <li><span><span><span><u>Government prohibitions</u>.  On October 1, 2020, the Department of Treasury’s Office of Foreign Assets Control (OFAC) issued <a href="https://home.treasury.gov/system/files/126/ofac_ransomware_advisory_10012020_1.pdf">an advisory</a> that ransomware payments encourage malicious activity, and could thus threaten national security.  On this basis, OFAC can impose penalties for making ransomware payments.</span></span></span><br /><br /><span><span><span>In a development that may hit closer to home for an MSP, states are in the process of passing laws that draw this same line.  Specifically, states are evaluating bills that prohibit ransomware payments and require reporting of ransomware attacks.  MSPs that serve state and local government customers will be directly impacted.  Louisiana is first, with its law effective February 1, 2021.  </span></span></span></li> </ul><h4 style="padding-left:60px;"><span><span><span><em>Effective Law</em></span></span></span></h4> <ul style="padding-left:90px;"><li><span><span><span><a href="https://legis.la.gov/legis/BillInfo.aspx?s=20RS&b=SB273&sbi=y">Louisiana</a> (Requires registration of MSPs that service Louisiana government entities and for registered MSPs to report cyber incidents and ransomware payments) </span></span></span></li> </ul><h4 style="padding-left:60px;"><span><span><span><em>Bills</em></span></span></span></h4> <ul style="padding-left:90px;"><li><span><span><span><a href="https://www.nysenate.gov/legislation/bills/2021/s6806">New York</a> (Bans the payments of ransom in cyber-incidents by a New York government entity or by another entity on their behalf.  Requires reporting.)</span></span></span></li> <li><span><span><span><a href="https://www.ncleg.gov/BillLookUp/2021/H813">North Carolina</a> (Prohibits government entities from making ransomware payments.  Requires reporting.)</span></span></span></li> <li><span><span><span><a href="https://www.legis.state.pa.us/CFDOCS/Legis/PN/Public/btCheck.cfm?txtType=PDF&sessYr=2021&sessInd=0&billBody=S&billTyp=B&billNbr=0726&pn=0829">Pennsylvania</a> (Requires an MSP “in the service” of Pennsylvania to report “discovery of ransomware or of an extortion attempt involving ransomware within one hour of the discovery.”  Taxpayer money must not be used to make a ransomware payment, except in circumstances of a declared emergency.)</span></span></span></li> </ul><p> </p> <ul><li><span><span><span><u>Reputation</u>.  Ransomware payments can become public, and your reputation may suffer.  Moreover, the bad guys will know you pay, putting you on the radar for subsequent attacks. </span></span></span></li> </ul><p><span><span><span>As you consider whether to pay, your operations and those of your customers are at a standstill.  Rather than be left in a no-win situation of choosing between watching your business perish or making a desperate payment that may only make things worse—have a backup plan.</span></span></span></p> <h3><span><span><span><strong>Establish a Backup Plan</strong></span></span></span></h3> <p><span><span><span>First off, implement appropriate safeguards to secure yourself against and detect cyberattacks (e.g., two-factor authentication, phishing training, access management etc.).  </span></span></span></p> <p><span><span><span>Then for Plan B, establish a ransomware response plan that includes backup and restore capabilities.  Such capabilities assist not only in a ransomware situation, but apply in the case of any destructive event that effects your data or systems, events such as malicious insider activity, an honest mistake, or natural disaster. As an MSP, your plans should account for customers, as well as your own systems.  </span></span></span></p> <ul><li><span><span><span><span><u>Backup and Restore</u>.  If you have a working backup, you can sidestep the ransomware attack and get back to work as soon as you restore. So create backups for your systems and data, focusing on high value data.  </span></span></span></span></li> <li><span><span><span><span><u>Segregation</u>.  Segregate the backups so an attacker can’t access them after compromising your systems. </span></span></span></span><br /><br /><span><span><span>Segregate parts of your systems.  This enables you to pull-the-plug on an infected area, protecting the rest of your systems. </span></span></span></li> <li><span><span><span><span><u>Know where the copies are</u>.  Review your systems to locate where distinct copies of data reside, even if it isn’t a formal backup copy.  You can make use of such copies during a crisis. </span></span></span></span></li> <li><span><span><span><span><u>Have a plan</u>.  Have an incident response plan, specific to ransomware, and periodically test it. Table-top exercises with your principal executive decision-makers are helpful, and so is testing of your backup and restore capabilities.</span></span></span></span></li> <li><span><span><span><span><u>More tips</u>.  Here are suggestions for what your plan can cover:</span></span></span></span> <ul><li><span><span><span><span>Replacing infected hardware, like employee laptops.  </span></span></span></span></li> <li><span><span><span><span>Claiming insurance.  Check your coverage. </span></span></span></span></li> <li><span><span><span><span>Following applicable law.  Monitor the changing legal landscape.  </span></span></span></span></li> <li><span><span><span><span>Cooperating with the government.  Consider whether, and under what circumstances, you will report a ransomware attack to the government or seek assistance.  The <a href="https://home.treasury.gov/system/files/126/ofac_ransomware_advisory_10012020_1.pdf">OFAC advisory</a> and <a href="https://www.cisa.gov/stopransomware">stopransomware site</a> provide contact information.  OFAC may show you leniency for cooperative reporting, if you end up making a prohibited ransomware payment.</span></span></span></span></li> <li><span><span><span><span>Renewing your commitment to security, especially closing the specific vulnerabilities that were exploited.  </span></span></span></span></li> </ul></li> </ul><p><span><span><span>After you implement these steps, you’ll have another layer beyond cybersecurity to protect you and your customers’ business operations.  You won’t need to consider making the payment, because back-up and restore will be your get-out-of-jail-free card.  </span></span></span></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Sun, 18 Jul 2021 04:10:43 +0000 admin 417 at Noah Webster /noah-webster <span>Noah Webster</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Wed, 03/24/2021 - 15:40</span> Chief Legal Officer <p>Noah F. Webster has served as our Chief Legal Officer since June 2018. Mr. Webster has over 15 years of legal experience in negotiating agreements, security, compliance and intellectual property. Prior to joining Ƶɫ, Mr. Webster worked for eight years at BlackBerry, serving most recently as General Counsel, Mobility Solutions, and holding other legal roles involving privacy and anticorruption legal compliance, M&A, and patent litigation. Before BlackBerry, Mr. Webster worked for Kirkland & Ellis in Chicago, where he represented and advised clients in patent litigations, trademark infringement and general intellectual property matters. Mr. Webster earned his Juris Doctorate degree from the University of Illinois College of Law and clerked with the U.S. District Court for the Eastern District of Michigan and the High Court of American Samoa. He began his career serving as a U.S. Army Engineer Officer. He is a graduate of the U.S. Military Academy, where he earned an undergraduate degree in mechanical engineering. Mr. Webster is a member of the bar for the states of Texas and Illinois. He also holds certification as a Leading Professional in Ethics & Compliance and is registered to practice before the United States Patent and Trademark Office.</p> <article><img loading="lazy" src="/sites/default/files/2021-03/IgMV1UlA.jpeg" width="1894" height="1536" alt="Noah Webster" typeof="foaf:Image" /></article><p><strong>I grew up in: </strong>Limerick and Sligo (Ireland) & Schaumburg, Illinois (USA)</p> <p><strong>Previous and Present Roommates:</strong> My wife, two kids, and a Portuguese Water Dog</p> <p><strong>When I am not at work you can find me: </strong>Playing hide-and-seek with the kids</p> <p><strong>Always in the mood to eat:</strong> Ice Cream</p> <p><strong>Something you won’t find in my bio: </strong>I’ve surfed places like: Bali, American Samoa, Lake Michigan, and Cornwall</p> <article><img loading="lazy" src="/sites/default/files/2021-03/N2-g3_e8.jpeg" width="1786" height="1536" alt="Noah Webster" typeof="foaf:Image" /></article><a href="https://www.linkedin.com/in/noah-webster-86465510/">https://www.linkedin.com/in/noah-webster-86465510/</a> <div about="/taxonomy/term/45"> <h2><a href="/taxonomy/term/45"> Noah Webster </a></h2> </div> Wed, 24 Mar 2021 20:40:18 +0000 admin 158 at Email and Communications Archiving: Best Practices 101 /resources/blog/may-2021/email-and-communications-archiving-best-practices-101 <span>Email and Communications Archiving: Best Practices 101</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Fri, 05/14/2021 - 18:46</span> <a href="/taxonomy/term/15" hreflang="en">Archive</a> <a href="/taxonomy/term/45" hreflang="en">Noah Webster</a> <article><img loading="lazy" src="/sites/default/files/2021-05/best_practices_thumb.jpg" width="940" height="450" alt="scales of justice figurine" typeof="foaf:Image" /></article><p><strong><em>Co-Author: <span><span><span>Madison Arcemont </span></span></span></em></strong></p> <p>The word archiving conjures up images of an infinitely large room of books or computers that have been storing information forever. This image is dated and, in the age of digital transformation, it is critical to think about simplifying the process of archiving electronic data. There is a fear associated with archiving that your data will be held forever, creating budget and resource pressure. But, with the right processes and tools, you maintain control over your data and retention policies while creating a structure that satisfies internal business processes and external legal requirements.</p> <h3>What data are you required to keep?</h3> <p>There are several reasons to maintain your company’s data: you may be required to keep those documents and communications by law, or it may be beneficial to reference in your regular course of business.  Depending on whether you need to reference data for compliance, anticipated or ongoing litigation, investigation, or operational needs, you will need to maintain different kinds of data.  When building your retention policies, you should start by running an audit to determine what data you create and how long it needs to be maintained.</p> <p><strong><em>Compliance</em></strong></p> <p>Several laws and regulations require companies to retain certain document types. For example, most companies will be covered by the Internal Revenue Service (IRS) tax audit procedures, employment laws like the Fair Labor Standards Act (FSLA), the Employee Retirement and Income Security Act (ERISA), and mandates by the Occupational Safety and Health Administration (OSHA).</p> <p>There are also industry-specific requirements. Some of these laws include the Health Insurance Portability and Accountability Act (HIPAA) for organizations handling medical information, the Bank Secrecy Act and the Equal Credit Opportunity Act (among many others) for banking institutions, and the EU’s General Data Protection Regulation (GDPR) to serve customers in the European Union.</p> <p>In general, your company is  required to retain corporate records like: accounting records, <a href="https://www.aicpa.org/content/dam/aicpa/interestareas/employeebenefitplanauditquality/resources/planadvisories/downloadabledocuments/ebpaqc-plan-advisory-retaining-and-protecting-plan-records.pdf" rel="nofollow">employee benefit plan records</a>, insurance records, <a href="https://www.eeoc.gov/employers/recordkeeping-requirements" rel="nofollow">personnel records</a>, and <a href="https://www.irs.gov/businesses/small-businesses-self-employed/how-long-should-i-keep-records" rel="nofollow">tax records</a>. Click <a href="https://www.icpas.org/docs/default-source/tax-practice-procedures-files/records-retention-guidelines1a841fdf38106fba827cff0000493078.pdf?sfvrsn=dd94701d_0" rel="nofollow">here</a> for a more detailed list of the documents that fit in each of those categories(compiled by a state CPA Society).</p> <p>In addition to corporate records, the SEC requires certain companies, like broker-dealers, to retain business-related communications (including work-related social media, like Slack, GroupMe, and WhatsApp).  These requirements vary based on your individual industry and company, so consult with your HR, legal, tax, and finance advisors to ensure you are retaining records for the proper length of time.</p> <p><strong><em>Operational needs</em> </strong></p> <p>Beyond legal compliance, data retention can support your business operations. For example, it may be beneficial for your company to maintain sales and product development reports  to improve products going forward.  Any documents that your teams refer to regularly should also be maintained, which is dependent on your company's needs.</p> <p><strong><em>Agreements</em></strong></p> <p>Customer or partner agreements should be maintained for at least the duration of the contractual period and a reasonable time afterwards.  Your retention practices should align with what your agreements require, especially where you provide services to customers and are responsible for holding their data.  These documents and their requirements are important not only if any contractual issues arise, but also to reference necessary information to provide service to the customer.</p> <p><strong><em>Anticipated or ongoing litigation or investigation</em></strong></p> <p>If incidents occur within the company, internal or external, relevant documents or communications can be useful in helping to understand the scope of the incident. For an internal investigation, relevant documents and communications can help  by providing evidence of the event. For a legal incident that brings about litigation, your company will be required to produce relevant documents and communications to help the Court understand the scope of the incident. </p> <p>If a company loses or destroys evidence that is relevant to the case, it can be sanctioned for spoliation.   For example, when a company received a significant number of product complaints and destroyed the relevant documents after only three years, a court determined that spoliation had occurred.  On the other hand, a court held that documents destroyed in the ordinary course of business relating to a 35-year-old product (that had never been in litigation) was not spoliation.</p> <p>The Court’s decision often comes down to whether the party knew that litigation was coming, and whether a company’s data archiving policies are a factor in data deletion or retention.</p> <h3>What is a litigation hold?</h3> <p>During a litigation hold, a company takes steps to appropriately preserve documents needed for  anticipated or initiated litigation.  The litigation hold directs your company to preserve data that could be relevant evidence to the case.  This means that if you have an automatic deletion or archiving program in place, that program will be paused so relevant documents are no longer deleted.  Additionally, all employees involved will be directed not to delete documents or communications that may be relevant to the case.  </p> <p>If litigation does arise or is anticipated, it is prudent to work with legal counsel to initiate and maintain a litigation hold on the company.</p> <h3>What data can you get rid of? </h3> <p>It is not necessary to retain indefinitely every piece of data that your organization has, and while it might theoretically be possible to attempt to keep your data forever, it could often be very costly and burdensome. Additionally, the older the data is, the less useful it becomes; therefore, it is not worth the cost of keeping.</p> <p>There are also times that the law requires you to delete certain data. Some compliance requirements, related to privacy or security for example, require the deletion of certain information when no longer necessary or after a certain period of time.  For example, if you serve customers located in the European Union, GDPR provides certain rules that require companies to delete personal data once it has fulfilled its purpose.</p> <p>If your company has data that doesn’t fit into any of its legal obligations, whether compliance or anticipated litigation, or its operational needs, the data can be deleted.</p> <p>It is best practice to describe your company’s approach to retention in a documented retention policy to manage retention in a disciplined way.  You can use this type of policy to respond to third-parties if you are ever required to explain why you don’t have certain documents. </p> <h3>What are the benefits of using technology to manage data retention?</h3> <p>While the hope is always that nothing goes wrong and litigation and investigations never arise, using technology to manage your retention will save you time and resources if problems do come up. A retention policy can be executed using a variety of technologies, such as an archiving program.  With an archiving program, company admins can set up an archiving and deletion policy that will automatically move items to a user’s archive mailbox and delete items from that mailbox after a designated time. The admin places a retention time on messages to be moved to, then permanently deleted from, the archive.</p> <p>Having an archiving program in place is one way to avoid spoliation if your organization ends up in litigation. Courts expect you to produce documents “in anticipation of litigation.” So, if you have a regular archiving policy in place, courts typically will not expect you to retrieve documents handled according to that policy before you anticipated litigation. Spoken in another way - If you practice a data retention policy (i.e., deleting emails that reach a certain age) and do not yet know about the complaint or the litigation, courts generally will not hold you liable to produce the information ...and its deletion during that time will generally not be considered spoliated.</p> <p>Archiving technology can also simplify the process of putting a litigation hold in place. If you do anticipate litigation (for example, because an incident has occurred, a complaint has been received, or legal action has been taken), the company’s admin can place a simple litigation hold that will stop the deletion of data.</p> <p>When litigation arises, having an archiving solution will create efficiencies for your team, saving you time and resources.   You can easily access everything you (and the court) need without the burden of maintaining data forever. Click <a href="/sites/default/files/2020-08/Ƶɫ_Information-Archiving_DataSheet.pdf" rel="nofollow">here</a> for more information on information that Ƶɫ can archive on behalf of your organization.</p> <h4>Also recommended for you:</h4> <p><a href="/resources/white-paper/why-you-must-archive-all-your-business-records" rel="nofollow">Download white paper from Osterman Research “Why You Must Archive All of Your Business Records”</a></p> <p><a href="/resources/infographic/virtual-workplace-risk-shift-proactive-compliance" rel="nofollow">Download Infographic “The Shift from Reactive to Proactive Compliance”</a></p> <a href="/resources/blog/secure-modern-workplace" hreflang="en">Secure Modern Workplace</a> Fri, 14 May 2021 23:46:07 +0000 admin 394 at Reaching Maturity: Using Feedback to Strengthen Your Compliance Program /resources/blog/february-2020/reaching-maturity-using-feedback-strengthen-your-compliance-program <span>Reaching Maturity: Using Feedback to Strengthen Your Compliance Program</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Tue, 02/25/2020 - 15:37</span> <a href="/taxonomy/term/64" hreflang="en">Thought Leadership</a> <a href="/taxonomy/term/45" hreflang="en">Noah Webster</a> <article><img loading="lazy" src="/sites/default/files/2021-03/Compliance.jpg" width="940" height="450" alt="man using laptop" typeof="foaf:Image" /></article><p><strong>This is the third article in a three part series on building effective compliance programs.</strong></p> <p>Getting your compliance program up and running is a huge accomplishment. It’s also just the first step in an ongoing process. In prior posts on building effective compliance programs, we wrote about <a href="/Resources/Blog/May-2019/Taking-the-First-Steps-Toward-Compliance" rel="nofollow">the importance of committing to compliance</a> and <a href="/resources/blog" rel="nofollow">defining your program</a>. After you’ve defined your program, don’t assume it is perfectly designed. In fact, you should do just the opposite.</p> <p>No program is perfect, and all require improvements and updates as your company grows, regulatory rules change, and the cybersecurity landscape evolves. To “mature” your company, you need to provide oversight and monitor your compliance activities.</p> <p>The thing that distinguishes an advanced, mature compliance program from a basic one is the presence of a feedback loop — a method to effectively iterate on the program over and over again. Somewhat ironically, compliance programs improve significantly once companies admit that they’re imperfect and regularly in need of adjustment.</p> <p>Feedback can come from different sources, including what you learn while investigating a report or from proactive monitoring.</p> <p><strong>• Reporting:</strong> You receive feedback on your compliance when you investigate an issue or question raised by an employee or third-party partner. The issue raised is either confirmed or not, and you can use this information to refine aspects of your program. Sources of reports can include:</p> <ul><li>Discussions with HR.</li> <li>“Open-door” discussions with company leaders.</li> <li>Anonymous hotline reporting.</li> </ul><p><strong>• Monitoring:</strong> You receive feedback by looking into issues that you know are risks to your company. These can be issues you identify during a risk assessment. Such monitoring reveals how much the issue threatens your compliance and gives you an opportunity to respond proactively. Most issues will relate to code of conduct topics such as fraud, bribery, or antitrust. Examples of monitoring can include:</p> <p>• Fraud: review records and messages related to marketing spend and expense claims.<br /> • Bribery: review messages involving interactions with customers, especially government agencies.<br /> • Antitrust: review for messages exchanged with competitors.</p> <p>If such monitoring involves personal information, you should notify employees. This can be done through your company handbook or other published corporate policy.</p> <h3><strong>Building a Feedback Loop From the Ground Up</strong></h3> <p>Regardless of whether you decide to rely on investigation or monitoring (ideally both) to look for feedback, you need a source of data to draw on. But a company first establishing a compliance program may not be set up to efficiently collect and review critical data because it exists in informal channels like paper documents, emails, text messages, and social media chats.</p> <p>Technology tools serve as the foundation for efficient investigation and monitoring. This includes automated approval workflows (e.g., Concur or a Salesforce approval process) and advance archiving tools (e.g., <a href="/Resources/Blog/June-2019/Manage-and-Share-Content-with-ƵɫArchive" rel="nofollow">ƵɫArchive</a>) These automatically capture and store the documentation and communication you need in order to confirm you are compliant and understand the risks you face.</p> <p>Email review is critical to most investigations. Archiving provides the tools to understand that data. It can index the contents of messages, complete with metadata, for search and retrieval. Search tools are designed to be intuitive and comprehensive so a user can explore data broadly or deeply — meaning a search can be run internally without the IT team. The right archiving tool can allow you to discretely share findings among different cross-functional teams who are stakeholders in the investigation.</p> <p>To underscore the importance of technology, imagine managing compliance without it. Try tracking down, reviewing, or sharing analysis of months or years of paper files for written approvals. Or try searching an email .pst file containing 10 years of information — the results of such searching are slow, difficult to share and reproduce, and almost impossible to conduct iteratively (i.e., you have to start from scratch when following up on a new issue later).</p> <h3><strong>Keeping the Feedback Loop Constantly Spinning</strong></h3> <p>Monitoring the information inside your archives should be based on risk so you can focus and efficiently direct the use of your limited compliance resources. Reports and investigation are also important. You may be obligated to catch a reported noncompliance and mitigate. When problems are detected, it’s a good sign because it means your compliance program is working.</p> <p>The best programs that are mature and optimized have this feedback loop spinning all the time. The highest levels of the company receive reports on these compliance activities. The compliance team can set the performance metrics based on what they know about the company and the feedback obtained. Moreover, the compliance team can conduct additional periodic reviews of their program, such as by conducting additional risk assessments.</p> <p>As a general rule, it never pays to rest on your laurels when it comes to compliance. These fast-moving and interconnected issues change all the time. Instead of assuming you’re doing everything right, prove it. Ideally, all the evidence you need is inside an archive.</p> Tue, 25 Feb 2020 21:37:59 +0000 admin 91 at Risk Assessment – Laying the Foundation for a Strong Program /resources/blog/february-2020/risk-assessment-laying-foundation-strong-program <span>Risk Assessment – Laying the Foundation for a Strong Program</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Fri, 02/14/2020 - 15:13</span> <a href="/taxonomy/term/64" hreflang="en">Thought Leadership</a> <a href="/taxonomy/term/45" hreflang="en">Noah Webster</a> <article><img loading="lazy" src="/sites/default/files/2021-03/Compliance.jpg" width="940" height="450" alt="man using laptop" typeof="foaf:Image" /></article><p><strong>This is the second article in a three part series on building effective compliance programs.</strong></p> <p><a href="https://www.zixcorp.com/resources/blog/may-2019/taking-the-first-steps-toward-compliance" rel="nofollow">In our first post</a> on building effective compliance programs, we wrote about the importance of committing to compliance. But that is only the first step; the next is to standardize your compliance program with documented policies and procedures. In the compliance hierarchy outlined in the previous piece, this is the point when compliance goes from "fragmented" to "defined."</p> <p>A risk assessment is key to properly defining a compliance program. The assessment allows you to right-size your program with policies and procedures tailored to the risks you actually face. It results in a program that is practical, connected to the business you conduct and the highest potential threats.</p> <h3><strong>RISK-BASED APPROACH</strong></h3> <p>If it was possible to design a perfect compliance program, we would never hear about fines again. However, the undeniable fact is that compliance is extremely complicated, especially when the preservation of compliance depends on perfectly managing people and complex programs, like cybersecurity. Considering how many different threats (intentional and accidental) can compromise compliance, companies can’t expect to address them all.</p> <p>A risk-based approach is based on the principle that when threats are myriad and defenses are limited, the limited resources should be focused on stopping the biggest threats. That might mean protecting a certain class of regulated data or defending against a specific cyberattack — it’s all about deploying security wherever it will have the biggest impact. In that way, a risk-based approach helps to maximize the impact of the compliance program instead of spreading it thin.</p> <p>It also helps produce employee buy-in, which is crucial for avoiding user errors. Framing a threat/defense as the “most important” rather than as “one of many” helps to command people’s attention and make your priorities clear. Users may not become perfect at cybersecurity broadly, but they’ll probably become perfect with regards to the “top risks.” </p> <p>The most compelling case for a risk-based approach may be that it’s considered part of a best-in-class compliance program. If a prosecutor, auditor, or other third party evaluates the quality of the compliance program in the wake of an incident, the program will likely only be considered adequate if you've conducted a risk assessment and responded to the top risks. And if your program does pass third-party review, you may receive lesser fines and fewer required remedial actions as a result.</p> <p>The sooner you get serious about risk assessment the better. It’s relatively simple when companies are small, but it becomes harder as companies grow. Rather than trying to start from scratch later, companies should identify their top risks now, then update and expand the list on an ongoing basis.</p> <h3><strong>HOW TO LAUNCH A COMPLIANCE PROGRAM BASED ON A RISK ASSESSMENT</strong></h3> <p>As the foundation for the entire compliance program, the risk assessment needs to be conducted correctly. Follow these best practices to learn as much as possible:</p> <ul><li><strong>Design the Risk Assessment – </strong>Companies can explore their risk exposure using a variety of tools — surveys, interviews, document reviews, market analysis, etc. Start by determining what toolset best supports the assessment and provides the best supporting information. Then identify which stakeholders will be involved with providing information, conducting analysis, and leading decision making.</li> <li><strong>Research Risk Profile – </strong>Risk assessment is all about identifying anything and everything that could compromise compliance. Technical issues are high on the list, but so are things like bribery, burglary, human error, or natural disasters. How these threats rank in the risk assessment will be different for every company, but it's important that as many as possible be included. To put it simply, you can't accurately assess risks until you know what all of them are.</li> <li><strong>Prioritize Each Risk – </strong>Risk is measured based on several factors — the likelihood of an incident, the probability of stopping it, and the consequences if it is successful. Risks that are common, hard to stop, and highly destructive are the priorities, and everything else is ranked below it. Since you're using this list to determine how you'll deploy limited resources, it's important to be accurate and honest about your top priorities.</li> </ul><p>It’s easy to make assumptions about risk, and it’s also easy to be wrong. As we emphasized earlier, compliance programs need to be systematic, especially in the early stages. Committing to the risk assessment process isn’t always quick or simple — and it can reveal some uncomfortable truths along the way — but diligence in any phase of implementing an effective compliance program is always worth it.</p> <h3><strong>DOCUMENTING YOUR PROGRAM</strong></h3> <p>There should be a policy and procedure to cover the prioritized risks you identify. Obtain help from advisors and peers for the issues you identify. They have been through it before and can let you know what solutions work (and which ones don't).</p> <p>One of the biggest challenges when developing a compliance program is the tendency to skip steps or overlook details when trying to progress toward goals. An easy way to balance both objectives is to benchmark existing plans, policies, and programs at other companies. Since those plans have already been tested and refined, they usually offer good ideas for the development of effective plans.  Just be aware that the risk assessment and program documentation should be tailored to your situation; this should not be a cut-and-paste job.</p> <p>Once you know where the biggest vulnerabilities exist, your conscientious attempts to improve compliance can have great impact and economic benefits — exactly what a compliance program is designed to do for business.</p> Fri, 14 Feb 2020 21:13:34 +0000 admin 89 at Are You Compliant With the California Consumer Privacy Act? /resources/blog/january-2020/are-you-compliant-with-ccpa <span>Are You Compliant With the California Consumer Privacy Act?</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Thu, 01/02/2020 - 14:54</span> <a href="/taxonomy/term/64" hreflang="en">Thought Leadership</a> <a href="/taxonomy/term/45" hreflang="en">Noah Webster</a> <article><img loading="lazy" src="/sites/default/files/2021-03/image%20%2810%29_0.png" width="940" height="450" alt="keyboard with CCPA key" typeof="foaf:Image" /></article><p>The California Consumer Privacy Act went into effect on Jan. 1, 2020. Now that this game-changing piece of cybersecurity legislation has become law, companies need to get serious about the details.</p> <p>Does your company have one or more customers in California? If so, CCPA almost certainly affects you. The law grants individuals a right of action (basically, the ability to sue) if their unencrypted or unredacted data is stolen. That right applies even if the stolen data caused no personal harm. Data breaches already are scary, but the threat of class-action lawsuits makes them more so.</p> <p>More specifically, assuming you meet any of the criteria listed below the CCPA impacts data security and privacy for your business:</p> <ul><li>If you are part of a for-profit organization doing business in California that earns $25 million or more in revenue per year</li> <li>If 50% or more of your company's annual revenue comes from selling personal information</li> <li>If you sell 50,000 or more consumer records per year</li> </ul><p>Compliance with CCPA means giving California residents the right to know what personal information has been collected and whether it’s been sold, as well as the right to access and delete that information at will. Meeting those mandates won’t be easy, so we suggest you start immediately.</p> <h3><strong>What CCPA Means for Daily Operations</strong></h3> <p> The good news is, the CCPA isn’t drastically different from existing data privacy laws, most notably the General Data Protection Regulation passed in the European Union in 2018. Like its California counterpart, the GDPR requires companies to give individuals more control over their personal data. GDPR rules apply to anyone who does business in Europe, which is likely to be a large swath of companies that do business in California, too. Those companies already have done much of the legwork to comply with CCPA.</p> <p>The bad news is, the laws are not identical. For example, both involve updating privacy notices, improving opt-in/opt-out requests, and abiding by requests to delete data. Unlike GDPR, however, the California law requires companies to create a “do not sell” link that lets users restrict how their data is monetized. The devil is in the details, and companies can’t assume that complying with another set of rules ensures compliance with CCPA.</p> <p>Penalties for noncompliance are uncertain, but they’re intended to be meaningful. The California attorney general can levy fines of <a href="https://marketingland.com/a-marketers-guide-to-the-california-consumer-privacy-act-261703" rel="nofollow">$2,500 to $7,500</a> for each user profile handled improperly. Multiply those fines by the thousands of users typically affected by a breach, and it’s clear just how costly CCPA could become.</p> <h3><strong>Getting Compliant on a Short Schedule</strong></h3> <p>If you already have a data privacy program in place, you’re on the right path. With a few updates, you will likely be in full compliance with CCPA. If you don’t have a program, you may have a lot of ground to make up:</p> <ul><li><strong>Data mapping: </strong>Identify exactly what data you have, where it lives, and who does the processing. Understanding what data exists inside your ecosystem is a prerequisite for securing it as CCPA requires. </li> <li><strong>Data governance: </strong>Evaluate your ability to manage and monitor incoming data. Without excellent governance, companies that start compliant may struggle to stay compliant. </li> <li><strong>Data monetization: </strong>Plan how you will monetize data (now and long-term) in ways that comply with CCPA. The law creates strict mandates for monetization.</li> <li><strong>Privacy controls: </strong>Judge whether your existing privacy controls create gaps that might conflict with CCPA. If and when they do, identify how processes and technologies need to evolve to close those gaps. </li> <li><strong>Compliance management: </strong>Make a team or individual responsible for ongoing CCPA compliance. Staying within the letter of the law will take constant evaluation and adaptation — work that companies can’t afford to neglect. Plus, by cultivating in-house compliance experts, companies are better prepared for future data-privacy laws at the local, state, federal, or global level.</li> </ul><p>If you don’t serve California, be aware that other states are considering similar laws, and tougher privacy protections seem all but guaranteed. Therefore, everyone should take the spirit of CCPA seriously and begin preparing for a future in which data is an asset and a liability.</p> <p>When you’re ready to get started, <a href="https://www.zixcorp.com/about-us/contact-us" rel="nofollow">contact the team at Ƶɫ</a> to properly secure all of your data and help you stay compliant with every regulation that comes to pass.</p> Thu, 02 Jan 2020 20:54:40 +0000 admin 81 at 4 Steps to Protect Intellectual Property from Cybercriminals /resources/blog/august-2019/4-steps-protect-intellectual-property-cybercriminals <span>4 Steps to Protect Intellectual Property from Cybercriminals</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Tue, 08/27/2019 - 14:04</span> <a href="/taxonomy/term/64" hreflang="en">Thought Leadership</a> <a href="/taxonomy/term/45" hreflang="en">Noah Webster</a> <article><img loading="lazy" src="/sites/default/files/2021-03/Protect-IP.jpg" width="940" height="450" alt="man holding brain image" typeof="foaf:Image" /></article><p>Intellectual property, or IP, is broader than most people expect. It includes trademarks and patents, of course, but also encompasses employee know-how, internal communications, competitive insights, and budding innovations. Overlooking how much data falls under the umbrella of IP can lead to sensitive information being exposed to unnecessary and unacceptable risks.</p> <p>Cybercriminals of all stripes target IP because it has immense value, especially compared to basic consumer data. IP is under such persistent attack that companies lose an estimated <u><a href="https://www.csoonline.com/article/3236790/mobile/trade-secrets-how-to-protect-ip-when-deploying-software.html" rel="nofollow">$300 billion annually</a></u>, which also leads to the elimination of 2 million jobs. The hard truth is that IP theft is and always will be on the front lines of cybersecurity.</p> <h3><strong>The Complex Landscape of IP Theft</strong></h3> <p>Companies that discover their IP has been stolen do have some legal recourse, however. The Defend Trade Secrets Act and the Digital Millennium Copyright Act empower companies to take civil action against anyone who misappropriates intellectual property. Unfortunately, neither law is perfect in practice.</p> <p>DTSA assigns a heavy penalty for IP theft — up to three times the value of the property — as long as plaintiffs can show they’ve taken adequate steps to protect their intellectual property. The most problematic aspect is that different state courts have defined “adequate” differently, leaving unanswered questions about when and how settlements are awarded.</p> <p>DMCA also has uncertainty. The law was implemented after easy file sharing on the internet began to exacerbate media theft. Consequently, it provides sweeping protections for copyrights but not for patents, trademarks, or other data that should realistically be considered IP. Despite the expansive legal framework in place, IP theft typically leaves victims with limited options.</p> <p>The simple solution would be to safeguard all IP, a monumentally difficult proposition when insiders are the biggest threat. Research shows that <u><a href="https://www.csoonline.com/article/3245310/intellectual-property/protecting-intellectual-property-against-cyberattack.html" rel="nofollow">half of all departing employees</a></u> leave with confidential information, either accidentally or intentionally. And when insiders are motivated to steal, their close proximity to IP makes it easy for them to bypass security controls.</p> <p>On the other side of the equation, third-party vendors up and down the supply chain can put IP at risk if they’re not trustworthy. Companies are in the difficult position of having to look both inward and outward with equal scrutiny while hoping the laws provide adequate protection. It’s a dire situation, but that doesn’t mean IP protection is impossible.</p> <h3><strong>The Key Components of IP Cybersecurity</strong></h3> <p>Don’t assume that your existing cybersecurity strategy is adequate at protecting your present and future intellectual property. Fully addressing the unique vulnerabilities of this data will also require a unique strategy with regards to its protection:<br />  </p> <ul><li><strong>Address IP comprehensively:</strong> Safeguarding IP requires a constellation of protections — legal, technological, logistical, administrative, etc. It should include everything from data encryption to access controls to nondisclosure agreements. All of these measures are necessary to protect IP from every conceivable threat. Plus, courts are likelier to side with plaintiffs who are proactive about securing secrets.</li> <li><strong>Define IP clearly: </strong>All IP is sensitive, but some more so than others. Start by identifying any data that could fall under the definition of IP. Then, segment that information by type of IP and level of protection needed. For instance, patents and trade secrets are both IP, but the former is public knowledge while the latter is confidential information. Systematically cataloging IP allows you to secure information according to its sensitivity.</li> <li><strong>Get aggressive about access: </strong>Because some of the biggest threats are internal, companies need to think seriously about who has access to IP in any form. All access points need to be identified and strictly controlled; otherwise, it’s impossible to know when trade secrets are drifting out the door. Access controls should include physical security, digital barriers, and data segregation.</li> <li><strong>Be consistent and recalibrate: </strong> As tempting as it may be to bypass protections in order to expedite workflows, a single lapse can put sensitive data in jeopardy. Outdated cybersecurity strategies can do the same thing. IP protections require regular review and revision in order to keep up with evolving threats, changes to the laws, and expanding amounts of IP.</li> </ul><p>On a fundamental level, IP is the lifeblood of your company. If your intellectual property were to fall into the wrong hands, the damage could be impossible to overcome. Instead of treating this data as sensitive, acknowledge it for what it really is: mission-critical.</p> Tue, 27 Aug 2019 19:04:29 +0000 admin 64 at Taking the First Steps Toward Systematic Compliance /resources/blog/may-2019/taking-first-steps-toward-systematic-compliance <span>Taking the First Steps Toward Systematic Compliance</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Mon, 05/13/2019 - 13:12</span> <a href="/taxonomy/term/64" hreflang="en">Thought Leadership</a> <a href="/taxonomy/term/45" hreflang="en">Noah Webster</a> <article><img loading="lazy" src="/sites/default/files/2021-03/Compliance.jpg" width="940" height="450" alt="man using laptop" typeof="foaf:Image" /></article><h4><strong>This is the first article in a three part series on building effective compliance programs.</strong></h4> <p>Compliance is a pass or fail obligation. But achieving compliance, by contrast, can be a slow and systematic process.</p> <p>Large companies with expansive legal and HR departments can throw lots of resources at the effort. For small and midsize companies, however, ensuring that compliance is comprehensive and consistent tends to be more challenging.</p> <p>Smaller companies have just as much incentive to avoid the fines, lawsuits, and bad PR that come from compliance breaches. Litigation trolls and hackers target SMBs looking for weakness because SMBs have fewer resources to defend themselves. Fewer SMB resources also mean that an SMB often lacks the staff, expertise, and time needed to fully realize and implement a disciplined compliance approach.</p> <p>Regardless of company size, however, here’s the typical hierarchy of compliance maturity:<br />  </p> <ul><li><strong>Ad hoc: </strong>Compliance lacks structure, accountability, oversight, and understanding.</li> <li><strong>Fragmented: </strong>A compliance program exists but is not documented. </li> <li><strong>Defined: </strong>Compliance program managers ensure that compliance is conducted according to a documented program.</li> <li><strong>Mature: </strong>Monitoring and oversight is in place so that the company coordinates compliance activities throughout, and compliance reports are made to the highest levels of the company.</li> <li><strong>Optimized: </strong>The company considers every decision it makes through a framework of compliance, tracking metrics and conducting periodic reviews. Meanwhile, the company engages in systematic process improvement that incorporates compliance feedback it receives.</li> </ul><p>Deploying a vigorous compliance program can be a time-consuming; however, it’s not impossible, even for companies that lack large in-house teams.</p> <p>Compliance is about having the right tools deployed in the service of a smart strategy that resembles the scientific method.  A company can start with a basic hypothesis — we are compliant — that it rigorously tests and retests to validate. Then, when issues are discovered, they systematically fix them: written policies are amended, employee training is updated, and finally, the solution is tested again. Considering that compliance is a moving target, it’s essential to have a strategy that can effectively adapt.</p> <h3><strong>TAKING THE FIRST STEP: COMMITTING TO COMPLIANCE</strong></h3> <p>In this blog, let’s look at the first step a company needs to take when it comes climbing the compliance ladder: moving from ad hoc to fragmented.</p> <p>Early compliance efforts are disjointed since procedures and roles are not defined and set.  To go beyond this, a company must make the fundamental decision to become compliant. Once this decision is made, the compliance program can be built around the commitment and intent. Specifically, corporate leaders demonstrate a commitment to compliance by doing the following:</p> <ul><li>require a unified commitment to compliance across the company.</li> <li>provide periodic compliance messaging various ways, such by using: email, video/audio messages, all hands meetings, formal training, 1:1 conversations, business meetings.  The messaging can be simple, for example: We grow with integrity; We abide by law; We treat each other and our customers with respect.</li> <li>participate in compliance planning and training. </li> <li>make certain employees responsible for the compliance program and hold them accountable for progress; and</li> <li>provide a personal example of how to conduct business with integrity and in accordance with law.</li> </ul><p>In sum, commitment means sustained, active engagement in support of building the compliance program.</p> <h3><strong>NEXT UP: RISK ASSESSMENT</strong></h3> <p>In most instances, laws and regulations outline a set of rules that must be followed and outcomes that must be achieved. Then it’s up to companies themselves to determine when, where, why, and how those rules impact operations. Eventually, all of those insights are reflected in the companywide compliance policy, which is updated as necessary.</p> <p><a href="/resources/blog/february-2020/risk-assessment-laying-foundation-strong-program" rel="nofollow">In my next blog</a>, I will discuss the next steps on a company’s journey to compliance and why a risk assessment is necessary to create a compliance policy that is unique to the company.</p> Mon, 13 May 2019 18:12:07 +0000 admin 43 at Your IP is Under Attack: Learn How to Protect It From Every Angle /resources/blog/march-2019/your-ip-under-attack-learn-how-protect-it-every-angle <span>Your IP is Under Attack: Learn How to Protect It From Every Angle</span> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">admin</span></span> <span>Tue, 03/12/2019 - 12:41</span> <a href="/taxonomy/term/16" hreflang="en">Company</a> <a href="/taxonomy/term/45" hreflang="en">Noah Webster</a> <article><img loading="lazy" src="/sites/default/files/2021-03/IP-Protection.jpg" width="940" height="450" alt="padlock on copyright symbol" typeof="foaf:Image" /></article><p>By now, it’s a foregone conclusion that intellectual property is one of the most valuable assets any company owns. Leaving this resource vulnerable is an unacceptable risk, which is why protections like nondisclosure agreements and copyright protections are considered standard. But what if the “standard” is no longer enough?</p> <p>Traditional protections largely ignore the threat of digital theft. A nondisclosure agreement should ideally prevent an ex-employee from talking about trade secrets, but it does nothing to keep sophisticated hackers from breaking into your network and stealing those secrets. In reality, cyber threats are a massive category of IP risk that has not been adequately addressed.</p> <p>Most organizations have strategies in place that are constructed to deflect hackers and lock down IP. The problem is that what we consider IP has expanded beyond what these defenses were originally designed to protect.</p> <p>We typically think of IP as structured data — information contained in a file with a clear format and taxonomy (like a patent). But realistically, IP is scattered throughout a company’s digital footprint. Emails, for example, are full of sensitive attachments, private conversations, internal discussions, and official information. This may not contain IP in the strictest sense, but these messages contain information that is just as relevant, sensitive, and valuable.</p> <p>If that information exists outside of the cyber defenses, it’s completely vulnerable to hackers. It’s also an obvious and easy point of attack. At most companies, the defense does not match up with the offense. As a result, IP is at risk.</p> <h3><strong>Taking a Comprehensive Approach to IP Security</strong></h3> <p>Internal IP theft is also a major concern. Recently, for instance, Uber <a href="https://www.npr.org/sections/thetwo-way/2018/02/09/584522541/uber-googles-waymo-settle-case-over-trade-secrets-for-self-driving-cars" rel="nofollow">settled a major lawsuit</a> after one of its executives was accused of stealing information about self-driving technology from his former employer, a Google subsidiary. Companies must address this threat along with the equal risk of attacks from external or unknown sources. You can ensure your IP protections are as strong as possible with these strategies:<br />  </p> <ul><li><strong>Make protection a priority: </strong>Employees can make or break your IP protection efforts. Creating policies and processes to safeguard intellectual property is important, but this spirit should really be baked into the culture. Employees need to understand how much is at stake if trade secrets are stolen or leaked. They also need to understand how many different forms IP theft can take. Education and training efforts do a lot to create a culture of healthy secrecy.</li> <li><strong>Institute best-in-class security: </strong>IP is a lot more valuable than a Social Security number. For instance, a Chinese company paid more than <a href="http://fortune.com/2018/11/29/9-charged-with-selling-samsungs-intellectual-property-report-says/" rel="nofollow">$13 million</a> for trade secrets stolen from Samsung. Hackers know that a big payday is on the line, so they target IP with their most sophisticated and aggressive attacks. Cyber defenses must be equally strong and effective, addressing all kinds of attacks and protecting both structured and unstructured data.</li> <li><strong>Get executive buy-in</strong><em>: </em>How a company feels about its own IP is defined by those at the top. Company leaders need to understand the full value of IP, believe in the necessity of its protection, and model the kind of cautious behavior that all employees should emulate.</li> </ul><h3><strong>Rounding Out IP Protection with Ƶɫ</strong></h3> <p>Ƶɫ is a leader in email security, which is actually the cornerstone of IP protection. Consider the hypothetical email we mentioned earlier, full of at risk confidential information whether sitting in an inbox or in transit. Without the proper strategies and technology in place, it wouldn’t take much for hackers to read the individual message or, worse, break into either inbox and steal all the IP inside. Ƶɫ helps prevent this scenario through gold standard email encryption.</p> <p>The email inbox is also where many cyberattacks are launched. Well-crafted emails can contain dangerous links, malicious attachments, and more. With a single click hackers can suddenly gain unrestricted access to the company's infrastructure and all the IP within. Ƶɫ uses a multilayered filtering approach to keep these bad emails out of the inbox. Plus, machine learning helps identify new and emerging attacks.</p> <p>Ƶɫ offers end-to-end email protection against a wide variety of threats. From defense against careless clicks to protection from hackers, the safety of your organization’s IP starts with the inbox.</p> Tue, 12 Mar 2019 17:41:03 +0000 admin 33 at