Home » ASP

Tag: ASP

ASP Survey

Claim Your Wind River Shirt and a Chance to Win a $100 Amazon Gift Card!

What better way to enjoy Friday the 13th than getting a shirt and a chance at a $100 Amazon gift card?

That’s right, Steve Staden here. I’m one of the newest members of the Wind River team and heading up the Product Management team. You will be hearing a lot more from me as I am very excited to get your feedback.

Right now, I would greatly appreciate your thoughts and comments on the new Advanced Security Package (ASP). ASP is the enhanced PCI program that includes unlimited installation on security tools (Endpoint), pre-filled SAQ answers and a streamlined experience to achieve PCI compliance faster.

I’ve created a short, five-minute survey to get your feedback. Please include your contact information and you’ll be entered into a drawing for a $100 Amazon Gift Card -OR- a $100 contribution to the charity of your choice! Two winners will be randomly selected from the completed surveys. All respondents are eligible to receive a FREE Wind River Financial shirt! 

Please complete your survey entry by July 17, 2018. Winning entries will be selected when the survey closes.

Thanks again for your time and feedback. We really appreciate it as we continue to improve our products at Wind River Financial!

Advanced Security Package Webinar Trustwave

Advanced Security Package Webinar: Get the Most of ASP

Recently, Wind River Financial and Trustwave held an educational webinar that provided a detailed look at the security tools included in Wind River Financial’s new Advanced Security Package (ASP).


ASP, powered by Trustwave and using the TrustKeeper dashboard, includes a suite of integrated security tools for you to use, including such things as remote access detection and file integrity monitoring. All of these tools are designed specifically to strengthen the data security of your business.

The Advanced Security Package webinar was put together to allow our clients a chance to have a guided walkthrough to better understand how to take advantage of these tools. Hosted by Trustwave, the webinar showcases the security tool dashboard (TrustKeeper dashboard) and was meant to familiarize users with the benefits of each tool and how they should respond to any alerts that are received.

If you have any questions after watching the Advanced Security Package webinar, please contact us or call your relationship manager. We’d be happy to help you.

Remote Access Detection

The Unwanted Visitor

Have you ever had that sense of dread when you hear a knock on your door? I happened to be reading Verizon’s 2017 Data Breach Investigations Report and it made me think of how sometimes unwanted visitors knock…and even get in.

In their report, Verizon asked, “Who’s behind the breaches”? Maybe not surprising, but 75% of all breaches are perpetrated by outsiders. The other interesting statistics noted in this area of the report was that 51% of these breaches involved organized criminal groups.

How are these unwanted visitors getting in? Security Metrics posted an interesting blog that identified some key stats that shed some light on this area.
• 45% of organizations were breached through remote access
• 73% of all investigated breaches had not implemented Logging and Log Monitoring

A third statistic that was a bit staggering from the Security Metrics post was that the “average organization was vulnerable for 1,549 days” and that “Cardholder data was exfiltrated for an average of 264 day”. With these types of levels of vulnerability and with the number of breaches up significantly as was noted in our blog post “Seriously, What Are My Odds of a Data Breach?” , it really brings home the need for a “Security First” focus.

A key step in keeping away unwanted visitors is to ensure you are not an easy target. There are a number of great articles on best practices for Securing a Remote Access Application. If you are interested, in the 9 key steps recommended by Trustwave you can click here.

One immediate step you can take is to leverage the Remote Access Security capability within Wind River’s Advanced Security Package. This capability is one of the 13 tools that is part of ASP and is a service that checks your computers for common software used for remote access. The Remote Access Security tool produces alerts when remote access software has been identified so you can review and confirmed that it is authorized and secure.

For Wind River customers, ASP replaced our prior PCI program and all its capabilities are available to you. Because of our approach in packaging these capabilities for many customers, we are able to save you money compared to going and buying these tools yourself.

If you have not already taken advantage of it, you can get started by visiting our ASP landing page or contacting your Relationship Manager. We want to help you take this step in your Security First approach, helping you detect and keep away unwanted visitors.

File Integrity Monitoring Could Save Your Company

File Integrity Monitoring and How It Could Save Your Company

With the increase in data breaches, the data security world is a much scarier place today. According to the most recent stats from ITRC (Identity Theft Resource Center), 2017 was a record breaking year for data breaches, and 2018 is already on pace to be more of the same. So with threats coming left and right, what steps can you take to better protect your assets? Enter File Integrity Monitoring.

Seconds of Damage, Months of Recovery

In many cases, you may not know for a long time you have been compromised. According to CNBC, most companies aren’t aware of a breach until weeks after it has happened. This is likely due to the speed in which the incident occurs. The attacker is there and gone in seconds. Verizon’s 2016 Data Breach Investigations states that 93 percent of cases where data was stolen, systems were compromised in minutes or less, but in over 80 percent of cases, victims didn’t find the breach for weeks or more. This kind of damage to your business and reputation can take months, if not years, to repair.

Hackers Often Leave a Trail

So back to File Integrity Monitoring and why it is so critically important. File Integrity Monitoring (FIM) is the first line of defense of any organization wishing to protect its assets and data. To explain further, once a breach is under way in your network, the attacker will often do one or more of the following.

  • Modify critical systems, application binaries and configuration files
  • Access or modify data files
  • Modify or delete any log data to hide their tracks

The research done by Verizon analyzed more than 100,000 incidents and 2,260 breaches. They found that more than 90 percent of the breaches will fall into this same pattern. By having a FIM system in place, you’ll be able to monitor for these subtle changes and be instantly alerted if any of the above events have been detected.

File Integrity Monitoring Sniffs Out the Breadcrumbs

File Integrity Monitoring is such a valuable tool that we consider it a vital part of the Advanced Security Package. FIM will run every day at an inspection time determined by you and will watch for any changes within your network. A digest of the inspection report can then be emailed to you on a daily or weekly basis. Additionally, another helpful feature is a heatmap data visualization, which helps you quickly assess the state of your network. Events on this heatmap can be filtered by severity in order to help you focus on the most important events in your environment.

You Don’t Need a Fortress

A further quote from the Verizon study really drives this home. “There’s no such thing as an impenetrable system, but often even a half-decent defense will deter many cybercriminals — they’ll move on and look for an easier target. Sadly, many organizations fail to achieve even that modest ambition.”

Sometimes, it’s not about the size of your castle. It’s more about the size of your moat.

Put FIM in Place Today

File Integrity Monitoring is something that is available to all Wind River customers as part of the Advanced Security Package. If you’re interested in learning more or you’re an existing customer looking to get these tools in place, feel free to contact us today. We believe in creating Security First environments and delivering these capabilities in a way that saves you money.

Data-Security-Detection-&-Prevention

Detection and Prevention – Two Pillars of Data Security

When it comes to data security, one thing is for sure. There is no magic bullet. Although it would definitely make life easier, it’s just not that easy. So, despite its inherent challenges, where should you begin? What is your first priority when it comes to data security? Here is what over 1,600 full-time IT professionals believe should be your number one responsibility according to Trustwave’s 2017 Security Pressures Report .

Top 5 Data Security Responsibilities

1. Identifying vulnerabilities (22%)
2. Preventing Malware (20%)
3. Strengthening Remote Access and passwords (13%)
4. Detecting malicious activity and compromises (12%)
5. Patching Vulnerabilities (12%)

Previously, we mentioned that only 7% of IT professionals believe they will not be the victim of a data breach. The is a sobering statistic. It should then come as no surprise that the two most popular survey answers highlight very specific responsibilities: detection and prevention.

Keeping Up with Detection and Prevention

With the number of breaches increasing and almost 80% of the respondents stressing the importance of detection and prevention, it would seem logical that the need for resources would be a source of discussion.

In the Security Pressures Report, 51 percent of the operational pressures come down to a lack of resources:

  • lack of security skills and expertise (15%)
  • lack of budget (14%)
  • lack of staff members (13%)
  • lack of time (9%)

For many businesses, they are finding it difficult to find resources and cost-effective ways to arm themselves for the challenge.

Security Tools and Managed Services

As businesses look to be more proactive, they are looking more and more at how they can bring together the tools they need and automate parts of the detection and prevention cycle. It is a theme that we at Wind River are hearing from of our customers and prospects. We believe that in order to stay ahead of the hackers, it is important to adopt a new mindset. Instead of each company trying to “staff up” and needing the same skilled resources, it makes more sense to look to companies that focus on data security, monitoring, and prevention.

Partnering to Win the Battle

As we look to help our customers in the detection and prevention battle, we looked to find a partner that has the focus and marks of being a leader in their industry. Trustwave was recognized by Gartner by being placed in the “Leader” quadrant of their Magic Quadrant evaluation.

In partnership with Trustwave, Wind River has now launched the Advanced Security Package. It contains key tools in each of the areas of identifying vulnerabilities, preventing malware, strengthening remote access control, and detecting malicious activity.
We invite you to learn more by going to our web site. For our customers, it is easy to get started, simply click here and check out the video and 3 steps to get started or contact your relationship manager.

Does-Data-Security-Keep-You-Up-At-Night-2

Does Data Security Keep You up at Night?

Data security has caused its fair share of sleepless nights for IT departments. A recent survey of 1,600 full-time IT professionals compiled by Trustwave in their 2017 Security Pressures Report shows us exactly what’s got them tossing and turning.

6 Biggest Worries About Data Security

  1. Theft or Loss of Customer Data (30%)
  2. Data or Systems Access Restricted by Ransomware (18%)
  3. Loss of Intellectual Property (16%)
  4. DDoS Attacks/Website Offline (14%)
  5. Reputation Damage or Loss (12%)
  6. Fines or Legal Action (3%)

There are a number of interesting perspectives to be drawn from this information. First, almost half of the data security worries are focused on two key areas: data loss or theft and in-system access issues. Both these worries tend to have a common root source – being attacked. Typically those attacks come via either hacking or someone planting or accessing malware, and as we mentioned before, data breaches were up 44.7% last year.

Are you a 7%-er?

At this point, an astute reader may have noticed the above percentages only add up to 93 percent. So what about the other seven percent, you ask? Interestingly enough, the Security Pressure Report indicates that seven percent of IT professionals do not think they would be the victim of a breach.

When you realize that only seven percent of the 1,600 IT professionals surveyed believe their data security makes them “safe” from a data breach, it begins to hit home just how high the risk has become. The goal can no longer be just compliance; it is has to be about being Security First.

What’s the Impact to My Organization?

In another section of the Security Pressures Report, the survey group was asked what repercussions they fear the most if their organization was breached. Two answers dominated their answers and accounted for 80 percent of the total responses. Coming in first with 42 percent was reputation damage to the IT professional and their company, followed closely by financial damage to the company with 38 percent.

In both cases, the impact can be attributed to another core concern – customers. When a breach happens, customers lose confidence. They may also be personally impacted, resulting in the loss of their business. Perhaps not surprisingly, the ability to weather the storm created by a breach seems to be inversely related to the size of the company. The smaller the company, the less likely they are to survive.

Why Security First?

In order to combat these issues, organizations need to take a proactive posture. Part of the answer is to always be reviewing your readiness. Another is to leverage key tools and expertise to help minimize exposure. Security First means thinking about data security and its implications as a business priority.

At Wind River, we aim to arm all of our customers with additional ways to keep both themselves and their customer or patient data secure. A key first step to maintaining this Security First mindset is by leveraging the capabilities of our Advanced Security Package (ASP).

If you are interested in learning more about what ASP has to offer, contact us or check out the package’s 13 tools to help make you more secure.

 

Top Three Healthcare Technology Trends from HIMSS 2018

Top Three Healthcare Technology Trends from HIMSS 2018

Healthcare information and technology professionals gathered in Las Vegas in early March for the Health Information and Management Systems Society (HIMSS) Global Conference & Exhibition to double down on the latest healthcare technology trends. In case you missed the conference this year, we thought we’d give you a casino advantage and deal out our top three takeaways from HIMSS 2018.

1. There’s A Difference Between Compliance and Security

The Identity Theft Resource Center recently reported that healthcare was the second most breached sector in 2017 with 374 breaches accounting for 23.7 percent of total reported breaches. So it’s no surprise cyber security took center stage at HIMSS 2018 with a full-day forum on the topic. With stakes this high, panelists and attendees agreed, compliance is not security. While being compliant is a key step, security is not just a checkbox approach. There must be support from the board-level down, and security best practices must be spread throughout the organization. To encourage organizations to take a security-first mindset, Wind River developed the Advanced Security Package (ASP). ASP presents a customized solution of security tools to help mitigate risk, assist with certifying PCI DSS compliance and help ensure your business is secure.

2. Cloud Computing. Cloud Computing Everywhere

Cloud technology was another healthcare technology trend regularly mentioned by presenters and discussed by attendees across the conference. HIMSS research concluded that many users found the cloud more effective at mitigating security risk. Before moving to the cloud, however, it is imperative to understand data governance and have a mature security model. As health systems continue to embrace cloud services, it is essential to actively manage cloud security strategies and call on experts to guarantee security.

3. Amazon, Apple and Uber Roll the Dice on Healthcare

Amazon, Apple and Uber recently announced they are making their way into healthcare, which made for popular discussion among the professionals at HIMSS. Each of these massive tech companies has its own exciting innovation to bring to the table: Amazon offering group purchasing, Apple providing employee clinics and Uber contributing transportation to hospitals. While these announcements are definitely disrupting the healthcare industry, they may not have hit the jackpot quite yet considering all of these ideas are already being covered in an existing format. Like many others technology trends, we’re skeptical about just how much these companies will revolutionize the healthcare industry, but we’re also excited about the push for innovation and adoption of new technologies.

The immense knowledge shared at HIMSS made everyone a winner. From cyber security to new technology and innovations, healthcare technology trends are advancing to improve the patient experience and keep data safe. At Wind River, we stay on top of these trends to mitigate risk, keep patient information secure and improve the overall patient experience.

What-Are-My-Odds-of-a-Data-Breach

Seriously, What Are My Odds of a Data Breach?

Unfortunately, your chances of experiencing a data breach are growing each year. In fact, the trends and shifts in awareness pertaining to data security are frightening to watch unfold. I read a recent study that polled adults in the US, UK and Australia that asked if the number of criminals trying to steal personal information is increasing. Not surprisingly, the survey indicated that 85% of respondents felt that it was.

We recently discussed why having a “Security First” mindset and approach is important, and as we look at what is happening with breaches, the importance is highlighted even more.

According to the ITRC (Identity Theft Resource Center), cyberattacks and breaches have grown both in frequency and in the amount of losses sustained. Here are some of the statistics as noted in their 2017 Executive Summary.

  • Breaches again hit a new record in 2017, with 1,579 breaches tracked, up 44.7 percent from 1,091 in 2016, as businesses and government entities move toward timely reporting
  • The number of records exposed rose to about 179 million, compared with 37 million in 2016
  • Businesses saw 870 breaches (55% of the total)
  • Medical/healthcare organizations were affected by 374 breaches (23.7 percent of total breaches)
  • Banking/Credit/Financial saw 134 breaches (8.5%)

For a more detailed breakdown, you can see the year-over-year data breach numbers by sector and category.

Another key statistic from the report indicates that 59.3% of breaches were from hacking. Hacking includes methods such as phishing, malware and skimming.

With the number of breaches increasing and hacking being the number one method, it is clear that one area of your defense strategy needs to focus on identifying and mitigating the damage as quickly as possible.

Part of our “Security First” approach is to help arm all of our customers with additional ways to keep their customer or patient data safe. Our goal this year is to educate our customers about data breach risks and how they can start down the path to be “Security First.” An important component of that process will be encouraging them to take advantage of the security and monitoring tools in our Advanced Security Package.

If you’d like more information about other issues we see becoming more prevalent in the market, feel free to contact us or read about the dangers of ecommerce malware.

Is Being PCI DSS Compliant the Same as Being Secure?

Is Being Compliant the Same as Being Secure?

I was reading a study published by Javelin the other day, and a few details really stood out to me.

“The rise of information available via data breaches is particularly troublesome for the industry and a boon for fraudsters.” (Al Pascual, Senior Vice President, Research Director and Head of Fraud with Javelin Strategy & Research)

One of the implications of this statement is that fraudsters are being even more aggressive and looking for data, all kinds of data. While being PCI DSS compliant at any given point in time may seem comforting, the reality is the fight is ongoing, and it will take a higher level of diligence to not have you or your customers impacted.

How Safe Are We

The study included a frightening statistic that really emphasized current security issues.

“16.7 million Americans were victims last year, up from 15.4 million last year, the previous high.”

These are only the confirmed victims, not those with compromised information that hasn’t been used yet.

It’s Not Just Card Data

Just as sobering was the fact that the fraudsters aren’t just looking for card data.

“Large-scale compromise of existing non-card accounts in 2017 was clearly facilitated by poor controls as fraudsters capitalize on weak authentication.”

Even in the card data arena, the focus is changing.

“Card not present fraud is now 81 percent more likely than Point of Sale (POS) fraud.”

As card present counterfeit fighting capabilities improve with chip cards, the fight starts to shift online.

Compliance is the Wrong Goal

These types of statistics make it clear that the goal of being “compliant” is too small. Being PCI DSS compliant does not equal being secure. To combat these issues, organizations will need to adopt a “security first” mindset and approach, as opposed to the “finish line” approach.

Is there a silver bullet out there? Unfortunately, no.

As with most things that can be complex, it is about being diligent. Part of the answer is to always review your readiness. It also means leveraging key tools and expertise to help minimize exposure.

Are You “Security First”?

A “security first” approach can be hard, as many organizations have IT staff that are already stretched thin and aren’t able to make security their primary focus. Understandably, their role has been to focus the majority of their efforts on keeping your organization’s systems and technology running.

Advanced Security Package: A Strong Step

At Wind River Financial, we see a need to help our clients by bringing a “security first” approach. It is for this reason that we engaged with Trustwave and put together the Advanced Security Package (ASP) as strong steps toward this goal. It is too important not to take these steps.

The benefits of partnering with us and going down this path are many. It allows us to provide tools and capabilities that not only reduce your risk but save you time and money.

It’s Not Always Good to Wait

If you have not yet heard about the Advanced Security Package, you will soon. Our goal for 2018 is to reach out to every customer in order to help them in this endeavor.

This isn’t something that can wait. If you have not been contacted yet, feel free to read the details of ASP and then contact your Relationship Manager.

We look forward to helping you become “Security First.”

PCI Relief with ASP (Advanced Security Package)

For most of my customers, PCI is not their favorite acronym! The mere mention of this acronym has caused adverse side effects such as: anxiety, frustration, and headaches for both business owners and IT professionals alike.

Over the last 8 years, I have been helping our Wind River Financial customers with the challenges of PCI and I am happy to introduce another acronym, ASP. ASP, or Advanced Security Package, includes a security toolkit that can easily be downloaded to any workstation that will help alleviate some of the negative side effects of PCI validation. These tools will help secure your sensitive data, and in turn will reduce the amount of time spent on PCI validation.

To learn more about ASP, what is included in the security toolkit and its many benefits to our customers, click here or give me a call. Important enrollment information will be sent via email to you soon, so be on the lookout and watch your inbox closely.