<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Breach Archives - Aditi Group Managed IT &amp; Consulting</title>
	<atom:link href="https://aditigroup.com/category/data-breach/feed/" rel="self" type="application/rss+xml" />
	<link>https://aditigroup.com/category/data-breach/</link>
	<description>IT Privacy • Protection • Productivity</description>
	<lastBuildDate>Tue, 10 Dec 2024 22:50:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://aditigroup.com/data-privacy/wp-content/uploads/cropped-aditi-group-icon-512-t-32x32.png</url>
	<title>Data Breach Archives - Aditi Group Managed IT &amp; Consulting</title>
	<link>https://aditigroup.com/category/data-breach/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Stop Insider Theft &#038; USB Drive-By with Zero Trust</title>
		<link>https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Mon, 18 Nov 2024 21:02:18 +0000</pubDate>
				<category><![CDATA[Aditi Zero Trust]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[data storage control]]></category>
		<category><![CDATA[flashdrive]]></category>
		<category><![CDATA[thumb drive]]></category>
		<category><![CDATA[USB drive]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1483</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/">Stop Insider Theft &amp; USB Drive-By with Zero Trust</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Remember Physical Data Security</h2>
<p>Just like fortified castle defenses, most electronic data security focuses on the internet.  Phishing emails, malicious websites, unsavory social media links, public Wifi connections, and weak passwords.  All are potentially exploited by data thieves.  But what about the old school theft?  What about in person physical theft of data?</p>
<p>&nbsp;</p>
<h3>Stealth Storage in a Pocket</h3>
<p>Insider theft and passers-by can too quickly pop in a USB drive and terabytes of data quickly and unnoticed.  Storage size and data transfer speed are no longer limitations for would be thieves.  Today&#8217;s reality is that even USB flash drives aka thumb drives can be found for less than $20 for 2TB of storage! </p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>USB flash drives</li>
<li>Portable 2.5&#8243; Solid State drives</li>
<li>Portable 2.5&#8243; hard disk drives</li>
<li>USB adapters for M2 SSD sticks</li>
<li>USB A, B, C</li>
<li>USB 3.0</li>
<li>mobile phones</li>
</ul>
</li>
</ul></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_5 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;"><span style="color: #333333;"><em>Gone In 60 Seconds?</em></span></h2></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				
				
				<span class="et_pb_image_wrap "><img fetchpriority="high" decoding="async" width="800" height="800" src="https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800.jpg" alt="USB drive theft - gone in 60 seconds?" title="USB drive theft - gone in 60 seconds?" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1485" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>What About Our Ever Present Phones?</h3>
<p>And perhaps most stealth of all&#8230;the our ever present mobile phones!   Who would notice a cell phone connected to a computer?   Likely just a battery recharge right?   Maybe it&#8217;s more.   An iPhone can have to 1TB of storage and many Android phones have large storage AND the ability to add microSD cards for even more.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_1">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="717" src="https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800.jpg" alt="transfer data between cell phones and computers" title="transfer data between cell phones and computers" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800-480x430.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1492" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;">USB Adapter for M.2 Internal SSD</h3>
<p style="text-align: center;"><strong>As high as 4TB of space, blazing fast, and small as a stick of gum!</strong></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_2">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="600" src="https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter.jpg" alt="USB M.2 SSD adapter" title="m2 SSD usb adapter" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter-480x360.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1491" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What&#8217;s the Risk?  What&#8217;s At Stake?</h2>
<p>Everything valuable to you and your business.</p>
<p>HIPAA breach of protected health information (PHI).   Company proprietary secrets.   Customer private financial information, including social security numbers and other items covered by GLBA and consumer privacy laws.   Book of business &#8211; the clientele that you&#8217;ve worked so hard to build up over the years.  Embarasing photos or insinuating documents.</p>
<p>Breach of privacy laws can mean massive financial penalties by authorities, lawsuits, and potentially even jail time. And your reputation can flip from trusted authority to careless, untrustworthy people to avoid.  </p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Stealth and Easy Use Enables Theft</h3>
<p>USB storage devices &#8211; portable drives and mobile phones, enable in-person, local theft of data if they are allowed.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h4>Theft happens in one of three ways:</h4>
<ol>
<li style="list-style-type: none;">
<ol>
<li>The door is left OPEN &#8211; the invitation to take unprotected things</li>
<li>An OUTSIDER breaks in &#8211; hacking and social engineering</li>
<li>Someone INSIDE is the thief &#8211; you&#8217;re given access as a team member</li>
</ol>
</li>
</ol>
<h2>Zero Trust Solution: Block USB</h2>
<p>The heavy handed IT admin&#8217;s solution is to simply block all USB ports.   No more connecting thumb drives, phones, or portable SSDs and HDDs.   Blocking USB drive storage can close an overlooked door that few choose to secure.  This follows the assumption that files copied or saved to extneral USB connected drives are suspect and not to be trusted.  This closes a real and serious security hole.  But it also can create a roadblock to work flow by denying USB connected devices that you WANT.  So, really a more nuanced and complex strategy is what most people want.  And it is what keeps IT admins from implementing it: complexity.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><img loading="lazy" decoding="async" src="https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000-300x102.png" width="300" height="102" alt="Aditi Zero Trust Protection" class="wp-image-1475 alignleft size-medium" />Let Aditi Zero Trust Do the Work</h2>
<p>A much more practical path forward to secure your data, while allowing dyanmic workplaces and convenience is with Aditi Zero Trust.   Data storage controls can regulate storage options by specific computer, workgroup, user, or even software program.  Our set of tools allows us to deal with all of the complexity of enabling software functionality and workflow that you need while locking down and blocking everything else.   Aditi Zero Trust is supported 24/7 and we are able to react to any new requests for software changes within a few minutes. So, you get the best overall security while keeping business flowing smoothly. </p></div>
			</div><div class="et_pb_button_module_wrapper et_pb_button_0_wrapper et_pb_button_alignment_center et_pb_module  dbdb-icon-on-right dbdb-icon-on-hover">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://aditigroup.com/contact-us/">Contact Us Now to Learn More</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/">Stop Insider Theft &amp; USB Drive-By with Zero Trust</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>3 Cybersecurity Strikes Against Marriott for $52 Million Settlement</title>
		<link>https://aditigroup.com/3-cybersecurity-strikes-against-marriott-for-52-million-settlement/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Wed, 23 Oct 2024 20:37:06 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[2FA]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Awareness Month]]></category>
		<category><![CDATA[Marriott]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Starwood]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1407</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/3-cybersecurity-strikes-against-marriott-for-52-million-settlement/">3 Cybersecurity Strikes Against Marriott for $52 Million Settlement</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Big Company, Big Breaches, Big Settlement</h2>
<p>&nbsp;</p>
<p><strong>If you&#8217;ve ever stayed at hotel, you&#8217;ve probably stayed with Marriott.  </strong>Marriott International is the world&#8217;s largest hotel company.  Nearly 8900 properties in 141 countries and territories. Wow! That&#8217;s a lot.</p>
<p>They have another distinction:  Marriott and now subsidiary company Starwood Hotels &amp; Resorts Worldwide, LLC suffered three major cyber security breaches in the last decade affecting over 344 million guest and loyalty records.  What was it? Everything from passport numbers and personal info to payment card info and hotel stay history.</p>
<p>Now Marriott International has approved a $52 million settlement with 50 states and D.C.  The group action of 50 state attorneys general over three breaches that have plagued Marriott is just one of the penalties against the hotel giant.  It paves the way for more actions in other countries and is only the latest and largest to date for the company.</p>
<p>The Federal Trade Commission worked in parallel with the 50 states investigation and has imposed other terms.  The <strong>FTC requires Marriot</strong>t International and subsidiary Starwood Hotels &amp; Resorts Worldwide LLC<strong> to put in place &#8220;a robust information security program.</strong>&#8221; Marriott will improve data security practices &#8220;using a dynamic risk-based approach&#8221; with customer data protections, and pay $52 million to States.</p>
<p>&nbsp;</p>
<h2 style="text-align: center;">Allegations by Attorneys General</h2>
<p>&nbsp;</p>
<h4><em>Marriott violated state consumer protection laws, personal information protection laws, and breach notification laws by failing to implement reasonable data security and fix data security holes.  Particularly with integrating Starwood into Marriott systems.</em></h4>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">What Happened in Marriott Data Breaches</h2></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_1_3 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><strong>Strike 1</strong><br />Starwood Payment Card Data</h3>
<p>In June 2014 Starwood Hotels &amp; Resorts incurred a<strong> data breach of payment information of over 40,000 Starwood guests</strong>. Hackers went unnoticed for more than a year.  Starwood only told customers in November 2015, four days after the Starwood acquisition announcement.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_11  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><span style="color: #800000;">How Breach Happened</span></h3>
<p style="text-align: center;">Hackers used <strong>compromised credentials</strong> and <strong>unprotected administrative accounts</strong> to <strong>install malware</strong> and access customer information.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_12  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><strong>Strike 2</strong><br />Starwood Guest Records</h3>
<p>From July 2014 to September 2018 <strong>hackers stole 339 million Starwood guest account records, including 5.25 million unencrypted passport numbers.</strong> This second hit on Starwood went undetected for more than four years!</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_13  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><span style="color: #800000;">How Breach Happened</span></h3>
<p style="text-align: center;">Hackers <strong>installed malware</strong> with keyloggers, remote access, and memory scrapers <strong>in more than 480 systems across 58 locations</strong> to steal 339 million personal records.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_14  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><strong>Strike 3</strong><br />Marriott Guest Records</h3>
<p style="text-align: left;"><strong>Hackers accessed 5.2 million guest records worldwide, </strong>including data from 1.8 million Americans. Names, mailing addresses, email addresses, phone numbers, birth day and month, and loyalty account information were breached.  Network access went undetected from September 2018 until February 2020.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_15  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><span style="color: #800000;">How Breach Happened</span></h3>
<p style="text-align: center;">Attackers used <strong>compromised employee credentials</strong> to breach its network several times</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_13  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_blurb et_pb_blurb_0  et_pb_text_align_left et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_blurb_content">
					
					<div class="et_pb_blurb_container">
						<h2 class="et_pb_module_header"><span>States Hold Marriott Accountable</span></h2>
						<div class="et_pb_blurb_description"><p><span></span></p>
<p style="text-align: left;"><span><strong>“Companies have an obligation to take reasonable measures to protect consumer data security.</strong> Marriott clearly failed to do that, resulting in the breach of the Starwood computer network and the exposure of personal information for millions of its guests. This 50-state settlement, co-led by Connecticut forces a strong system of risk-based protections to guard against ever-evolving threats to cybersecurity. We will continue to work closely with our multistate partners across the country to ensure companies are taking all reasonable precautions to protect our personal information” <br /> </span><span><em><strong><br /></strong></em></span><span><em>&#8211; Connecticut Attorney General William Tong</em><br /></span></p></div>
					</div>
				</div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_14  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_16  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Settlement Requirements for Marriott</h2>
<p>&nbsp;</p>
<p>The following are requirements of the <a href="https://portal.ct.gov/ag/press-releases/2024-press-releases/multistate-settlement-with-marriott-for-data-breach-of-starwood-guest-reservation-database" target="_blank" rel="noopener" title="Marriott $52 million settlement">settlement with the States &amp; DC</a></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><strong>Pay $52 million to the U.S. states &amp; D.C. </strong>
<p><strong></strong></p>
</li>
<li><strong>Allow U.S. customers to request deletion of personal info</strong> tied to their email address or loyalty rewards account number. And they must review loyalty rewards accounts upon customer request and restore stolen loyalty points.</li>
<li><strong>Implementation of a comprehensive Information Security Program.</strong> This includes new overarching security program mandates, such as incorporating zero-trust principles, regular security reporting to the highest levels within the company, including the Chief Executive Officer, and enhanced employee training on data handling and security.</li>
<li><strong style="font-size: 14px;">Data minimization and disposal requirements</strong><span style="font-size: 14px;">, which will lead to less consumer data being collected and retained.</span></li>
<li><strong style="font-size: 14px;">Specific security requirements with respect to consumer data</strong><span style="font-size: 14px;">, including component hardening, conducting an asset inventory, encryption, segmentation to limit an intruder’s ability to move across a system, patch management to ensure that critical security patches are applied in a timely manner, intrusion detection, user access controls, and logging and monitoring to keep track of movement of files and users within the network.</span></li>
<li><strong style="font-size: 14px;">Increased vendor and franchisee oversight</strong><span style="font-size: 14px;">, with a special emphasis on risk assessments for “Critical IT Vendors,” and clearly outlined contracts with cloud providers.</span></li>
<li>In the future, if Marriott acquires another entity, it <strong style="font-size: 14px;">must timely further assess the acquired entity’s information security program</strong><span style="font-size: 14px;"> and develop plans to address identified gaps or deficiencies in security as part of the integration into Marriott’s network.</span></li>
<li>An independent <strong style="font-size: 14px;">third-party assessment of Marriott’s information security program</strong><span style="font-size: 14px;"> every two years for a period of 20 years for additional security oversight.</span></li>
<li><span style="font-size: 14px;"><strong>Offer multi-factor authentication</strong> to consumers for their loyalty rewards accounts, such as Marriott Bonvoy</span></li>
<li><strong><span style="font-size: 14px;">Review rewards accounts if there is suspicious activity.</span></strong></li>
</ul>
</li>
</ul>
<p>Additional FTC REquirements:<strong><span style="font-size: 14px;"></span></strong></p>
<p>Marriott must <strong>investigate suspicious activity within 24 hours</strong> and <strong>provide assessments</strong> and reports for future data breaches <strong>within 120 days</strong>.</p>
<p style="padding-left: 40px;"></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_11">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_15  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_17  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">What You Can Learn from Marriott</h2></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_18  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3>LOCK DOWN SYSTEMS</h3>
<p><strong>Zero Trust, Deny by Default</strong></p>
<p>This is an Aditi Group favored strategy and special leading-edge functionality that we offer our clients.  Unlike anti-malware or anti-virus programs which look for what is already running, downloaded or installed, we lock down and set computers to <strong>deny by default</strong>.  So, malware often can&#8217;t download, and can&#8217;t install or run. </p>
<p>We limit software programs that can install, run, or even be uninstalled to what we allow.  And within those programs, only expected actions are allowed.   What computer and data resources programs can use are by allow-list only. In essence, it&#8217;s the IT managers dream &#8211; lock everything down to just what is needed to do the job.  We also employ ways to limit escalation of rights from user accounts so they can&#8217;t go from being an every day user to having Administrator rights.</p>
<p><em><strong>With this approach, malware, keyloggers, memory scrapers, and remote access programs would never have been allowed to install.</strong></em></p>
<p>&nbsp;</p>
<h3></h3>
<h3>KNOW THE RISKS</h3>
<p><strong>Regular Risk Assessments</strong></p>
<p>Marriott strayed from its forward looking nature and focus on people and excellence.   While Marriott wasn&#8217;t responsible for the actions or inactions of Starwood prior to take-over, it is now ultimately responsible and should have done a deep dive into the <strong>IT Security Step 1:  RISK ASSESSMENT.</strong></p>
<p>Aditi Group, like our peers who support data privacy laws such as HIPAA and consumer protection laws know that good security begins with identifying the risks.  And that should be followed by making plans to patch holes and reduce risks.   The most comment and first item noted from all HIPAA violation settlements is <strong>Lack of Proper Risk Assessment.</strong></p>
<p>This is also an age old precept of warfare.  We must know our strengths and weaknesses and anticipate how the other side may try to exploit weak defenses and human behavior.</p>
<p><em><strong>Risk Assessments and taking action to fix gaps helps avoid breaches and penalties if problems do happen.</strong></em></p>
<p>&nbsp;</p>
<h3>DO THE BASICS</h3>
<p><strong>Encryption, Multi-factor Authentication</strong></p>
<p>A second take-away is to ensure that the basic tools and techniques are used.  Stolen data includes unencrypted passport numbers and personal contact data.  Encryption is a basic data security method that should be activated for data that can be used in personal credit fraud.  Numerous state and federal and international data privacy laws require encryption of sensitive data or de-identification of it.  This is nothing new.  It should be the norm.</p>
<p><em><strong>MFA prevents most account compromising.  Encrypted data is useless to hackers. </strong></em></p>
<p>&nbsp;</p>
<h3></h3>
<h3>KEEP ONGOING AWARENESS</h3>
<p><strong>Monitor Data Going Out, Monitor Account Logins, Malware Scans</strong></p>
<p>Each of the data breaches with Starwood and Marriott went more than a year before they were detected.  The latest happened over four years.  That&#8217;s a lifetime in the electronic data world.   This fact is a driver of the ever increasing focus of anti-virus and cyber security programs to do what is called pattern recognition or behavioral analysis.  They look for the anomolys.   Just like when your credit card company puts a lock on your card if you suddenly use it at 3am to buy $100 in gasoline 3 times in 30 minutes&#8230;&#8221;that didn&#8217;t look like you.&#8221;</p>
<p><em><strong>Monitors should have revealed issues within short time</strong></em></p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_12">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_16  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_19  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Marriott History</h2></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_13">
				<div class="et_pb_column et_pb_column_1_3 et_pb_column_17  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_20  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Marriott Brands</h3>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li>The Ritz-Carlton®</li>
<li>St. Regis®</li>
<li>JW Marriott®</li>
<li>Ritz-Carlton Reserve®</li>
<li>The Luxury Collection®</li>
<li>W Hotels®</li>
<li>EDITION®</li>
<li>Marriott Hotels®</li>
<li>Sheraton®</li>
<li>Marriott Vacation Club®</li>
<li>Delta Hotels®</li>
<li>Westin®</li>
<li>Le Méridien®</li>
<li>Renaissance Hotels®</li>
<li>Gaylord Hotels®</li>
<li>Courtyard Hotels®</li>
<li>Four Points®</li>
<li>SpringHill Suites®</li>
<li>Fairfield Inn &amp; Suites®</li>
<li>AC Hotels®</li>
<li>Aloft Hotels®</li>
<li>Moxy Hotels®</li>
<li>Protea Hotels®</li>
<li>City Express®</li>
<li>Four Points Flex by Sheraton</li>
<li>Residence Inn®</li>
<li>TownePlace Suites®</li>
<li>Element®</li>
<li>Homes &amp; Villas by Marriott Bonvoy®</li>
<li>Apartments by Marriott Bonvoy®</li>
<li>Marriott Executive Apartments®</li>
<li>Autograph Collection Hotels®</li>
<li>Design Hotels®</li>
<li>Tribute Portfolio®</li>
<li>MGM Collection with Marriott Bonvoy</li>
</ul>
</li>
</ul>
</li>
</ul></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_3 et_pb_column_18  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_3">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1200" height="609" src="https://aditigroup.com/data-privacy/wp-content/uploads/marriott-bonvoy-brands.png" alt="Marriott Bonvoy paying $52 million settlement for cyber breaches" title="marriott-bonvoy brands" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/marriott-bonvoy-brands.png 1200w, https://aditigroup.com/data-privacy/wp-content/uploads/marriott-bonvoy-brands-980x497.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/marriott-bonvoy-brands-480x244.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" class="wp-image-1411" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_21  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Marriott International is the world&#8217;s largest hotel chain.   With over 30 brands, you&#8217;re familiar with them.  This dizzyingly large list covers the range of resort, boutique, luxury, business traveler, extended stay and budget economy stays.  You&#8217;ve probably stayed in many of their nearly 8900 properties in 141 countries and territories.</p>
<p>&nbsp;</p>
<h3>From Root Beer to Global Empire</h3>
<p>J.W. and Alice Marriott founded this massive global leader from humble beginnings in 1927, serving A &amp; W Root Beer in D.C. stand that grew to Hot Shoppe diners.  This grew into food service for the airline industry.  Momentum grew into cafeteria management services. </p>
<p>Thirty years after serving their first root beer, the company drifted into hotels with Twin Bridges Motor lodge. Led by Bill Marriott, Jr., this foray into hoteling grew and grew over the next 50 years into an international hotel giant.   <strong>In 2016, Marriott International acquired Starwood Hotels &amp; Resorts Worldwide creating the world’s largest hotel company</strong>.</p>
<p>The long trajectory of expansion was guided and maintained by corporate values of realizing opportunities and changing with the times.  This latest cybersecurity breach settlement for Marriott is a story of missing the mark with company values. </p>
<p>Marriott didn&#8217;t do everything they should have to protect customers like you and me after the 2016 take-over of Starwood.</p>
<p>&nbsp;</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_14">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_19  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_22  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Starwood and Marriott Fell Short of Core Values</h2></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_15">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_20  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_23  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>J.W. and Alice Marriott built the empire on strong business and ethical core values. Have they held true on in the customer data privacy realm?   These are values Marriott highlights today:</p>
<h4 style="padding-left: 40px; text-align: center;">Put People First,  Act with Integrity,  Pursue Excellence</h4>
<h4 style="padding-left: 40px; text-align: center;">Embrace Change,  Serve Our World</h4>
<p style="padding-left: 40px;"></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_24  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>&nbsp;</p>
<h3 style="padding-left: 40px;">Act with Integrity</h3>
<p style="padding-left: 40px;"><strong>&#8220;How we do business is as important as the business we do.  </strong>We hold ourselves to uncompromising ethical and legal standards. This extends to our day-to-day business conduct, our employee policies, our supply chain policies, our environmental programs and practices, and our commitment to human rights and social responsibility.&#8221;<strong></strong></p>
<p style="padding-left: 40px;"></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_21  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_4">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1000" height="667" src="https://aditigroup.com/data-privacy/wp-content/uploads/john-willard-marriott-hotel-founder-1000.jpg" alt="John Willard &quot;J.W.&quot; Marriott hotel founder" title="john-willard-marriott-hotel-founder-1000" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/john-willard-marriott-hotel-founder-1000.jpg 1000w, https://aditigroup.com/data-privacy/wp-content/uploads/john-willard-marriott-hotel-founder-1000-980x654.jpg 980w, https://aditigroup.com/data-privacy/wp-content/uploads/john-willard-marriott-hotel-founder-1000-480x320.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1000px, 100vw" class="wp-image-1422" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_16">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_22  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_25  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Lessons for Everyone</h2>
<p>While Marriott and Starwood can&#8217;t turn the clock back and prevent the breaches of personal data that have already happened, they can now make security a &#8220;Job One&#8221; kind of priority.  And we hope that other companies learn from Marriott&#8217;s experiences and the judgements of attorneys general and the FTC.   Apply the lessons for your organiztion and keep private data private and secure.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_26  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Need Help?</h2>
<p><em>Aditi Group, Inc provides Zero Trust security tools including deny-by-default, data encryption, multi-factor authentication, password management, account and network monitoring, and risk assessments.   Call or message us to learn more today.</em></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/3-cybersecurity-strikes-against-marriott-for-52-million-settlement/">3 Cybersecurity Strikes Against Marriott for $52 Million Settlement</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Security Risks and Importance of Cybersecurity</title>
		<link>https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Tue, 11 Oct 2022 15:35:11 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data hack]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[LAUSD]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=933</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/">Data Security Risks and Importance of Cybersecurity</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_17">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_23  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_5">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1000" height="1000" src="https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1.jpg" alt="Aditi Group cybersecurity interview podcast " title="Podcast-S4E6-Cybersecurity-part-1" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1.jpg 1000w, https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1-980x980.jpg 980w, https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1000px, 100vw" class="wp-image-937" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_27  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Listen in as we kick off Cybersecurity Month with another great interview by Dorothy Cociu on the Benefits Executive Roundtable.  In this show we discuss hot security topics and security breaches in 2022 and 2021.  Find out what&#8217;s been happening and what you can avoid being a statistic!</p>
<p>Listen and follow the podcast series Benefits Executive Roundtable: </p>
<p><a href="https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1/?">https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1/?</a></p></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_0">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://anchor.fm/benefitsexecroundtable/embed/episodes/S4E6---Data-Security-Risks-and-Importance-of-Cybersecurity--Part-1-e1p2a1k" height="102px" width="400px" frameborder="0" scrolling="no"></iframe></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/">Data Security Risks and Importance of Cybersecurity</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</title>
		<link>https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Fri, 20 May 2022 21:28:53 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Aditi Group]]></category>
		<category><![CDATA[Advanced Benefit Consulting]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[interview]]></category>
		<category><![CDATA[published articles]]></category>
		<category><![CDATA[The STATEment]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=887</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_18">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_24  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_28  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><strong>Aditi co-founders Ted Mayeshiba and Ted Flittner</strong> are interviewed in this lengthy article written by Dorothy Cociu, President of Advanced Benefit Consulting.  We invite you to learn more about current computer and  phone electronic data security threats and how to avoid some of them.</p>
<h3>Highlight Topics Include</h3>
<ul>
<li>Are banking apps safe?</li>
<li>Microsoft Breach by Lapsus$ Hacker Group, March 2022</li>
<li>The risks of using QR codes</li>
<li>Crypto currency</li>
<li>The need for risk assessments – an ongoing security tool</li>
</ul>
<h3>Read the article at Advanced Benefit Consulting</h3>
<p><a href="https://advancedbenefitconsulting.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">https://advancedbenefitconsulting.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/</a></p>
<p><a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank" rel="noopener"></a></p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_25  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_29  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;">Read the article in the <a href="https://www.calbrokermag.com/in-this-issue/cybersecurity-2-0/" target="_blank" rel="noopener">California Broker magazine, June 2022 issue</a></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_6">
				
				
				
				
				<a href="https://www.calbrokermag.com/in-this-issue/cybersecurity-2-0/" target="_blank"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="600" height="781" src="https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2.jpg" alt="Cal Broker magazine quotes Aditi Group on cybersecurity" title="caifornia-broker-june-2022-cyber-security-2" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2.jpg 600w, https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2-480x625.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" class="wp-image-904" /></span></a>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_26  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_30  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;">Read the article in the <a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank" rel="noopener">STATEment May / June 2022 issue</a></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_7">
				
				
				
				
				<a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="400" height="517" src="https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400.jpg" alt="" title="" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400.jpg 400w, https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400-232x300.jpg 232w" sizes="(max-width: 400px) 100vw, 400px" class="wp-image-891" /></span></a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>S1E1 &#8211; Not So Happy Hour at Coors and Microsoft</title>
		<link>https://aditigroup.com/s1e1-friday-happy-hour-not-to-happy-at-coors/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Sat, 13 Mar 2021 19:43:50 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[Coors]]></category>
		<category><![CDATA[Cyber Gurus]]></category>
		<category><![CDATA[data backup]]></category>
		<category><![CDATA[email hack]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Microsoft Exchange]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[verification]]></category>
		<category><![CDATA[wifi security]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=629</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/s1e1-friday-happy-hour-not-to-happy-at-coors/">S1E1 &#8211; Not So Happy Hour at Coors and Microsoft</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_19">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_27  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_8">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="600" height="591" src="https://aditigroup.com/data-privacy/wp-content/uploads/cyber-gurus-podcast-s1e1-not-so-happy-hour-at-coors-and-microsoft.jpg" alt="Cyber Gurus podcast Not So Happy Hour at Coors and Microsoft" title="cyber-gurus-podcast-s1e1-not-so-happy-hour-at-coors-and-microsoft" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/cyber-gurus-podcast-s1e1-not-so-happy-hour-at-coors-and-microsoft.jpg 600w, https://aditigroup.com/data-privacy/wp-content/uploads/cyber-gurus-podcast-s1e1-not-so-happy-hour-at-coors-and-microsoft-480x473.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" class="wp-image-650" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_31  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In this episode cyber security experts from Aditi Group tell us about why things are not Golden at Coors this week. And you&#8217;ll learn about the hack that is sweeping the planet with Microsoft Exchange. This first Friday Happy Hour edition podcast uncovers network security issues at Molsen-Golden that have had big impact on the taps and the company bottom line. We&#8217;ll talk data backups, ransomware, cyber hacks and more as we also cover the Microsoft global vulnerability that has already affected tens of thousands of servers. Join us to hear about these stories and how they relate to you and your precious electronic data.</p>
<p><strong>Press the ARROW on the player below to listen now</strong></p></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_1">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://anchor.fm/cybergurus/embed/episodes/S1E1---Friday-Happy-Hour---Not-to-Happy-at-Coors-et2bln" height="102px" width="600px" frameborder="0" scrolling="no"></iframe></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/s1e1-friday-happy-hour-not-to-happy-at-coors/">S1E1 &#8211; Not So Happy Hour at Coors and Microsoft</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What&#8217;s the harm in sharing your mobile number?</title>
		<link>https://aditigroup.com/whats-the-harm-in-sharing-your-mobile-number/</link>
		
		<dc:creator><![CDATA[Ted Mayeshiba]]></dc:creator>
		<pubDate>Tue, 22 Oct 2019 14:24:31 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Personal Privacy Invasion]]></category>
		<category><![CDATA[Security Learning]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=310</guid>

					<description><![CDATA[<p>For some of you, it has (prior to this) been routine to punch in your phone number as an identifier for &#8220;club reward&#8221; points at the grocery store or other retail location. Yet, for many of us, mobile phone numbers especially follow us from apartment to apartment to home. We don&#8217;t change that number often, [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/whats-the-harm-in-sharing-your-mobile-number/">What&#8217;s the harm in sharing your mobile number?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For some of you, it has (prior to this) been routine to punch in your phone number as an identifier for &#8220;club reward&#8221; points at the grocery store or other retail location. Yet, for many of us, mobile phone numbers especially follow us from apartment to apartment to home. We don&#8217;t change that number often, if at all. It therefore, becomes a good identifier of who we are and tied with other publicly available information, becomes the key to unlock a lot of digital information. The article linked below shows the surprise findings of a tech journalist when he gave his mobile number to a security researcher. (click the picture)</p>
<p><iframe title="I Shared My Phone Number. I Learned I Shouldn’t Have." class="wp-embedded-content" sandbox="allow-scripts" security="restricted" src="https://www.nytimes.com/svc/oembed/html/?url=https%3A%2F%2Fwww.nytimes.com%2F2019%2F08%2F15%2Ftechnology%2Fpersonaltech%2Fi-shared-my-phone-number-i-learned-i-shouldnt-have.html#?secret=3W3PhXyG4U" data-secret="3W3PhXyG4U" scrolling="no" frameborder="0"></iframe></p>
<p>The post <a href="https://aditigroup.com/whats-the-harm-in-sharing-your-mobile-number/">What&#8217;s the harm in sharing your mobile number?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>October is National Cybersecurity Awareness Month</title>
		<link>https://aditigroup.com/october-is-national-cybersecurity-awareness-month/</link>
		
		<dc:creator><![CDATA[Ted Mayeshiba]]></dc:creator>
		<pubDate>Wed, 16 Oct 2019 22:48:21 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Personal Privacy Invasion]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[2FA]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=308</guid>

					<description><![CDATA[<p>Wondered why you&#8217;ve likely seen a bunch of articles about cybersecurity recently? Well, we should think about cybersecurity once in a while! The linked article is a good general deep dive into how to think about keeping your family safe in this connected world. Good advice about what to do if you think you&#8217;ve been [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/october-is-national-cybersecurity-awareness-month/">October is National Cybersecurity Awareness Month</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Wondered why you&#8217;ve likely seen a bunch of articles about cybersecurity recently?  Well, we should think about cybersecurity once in a while!  The linked article is a good general deep dive into how to think about keeping your family safe in this connected world.  Good advice about what to do if you think you&#8217;ve been hacked (something strange pops up on one of your credit card statements for instance).  ABC&#8217;s of cybersecurity, use of VPNs, 2FA, and other good things.  One good idea, if you have a family and want to help introduce the concept of cybersecurity to children who will grow up in this cyberworld, that is to set up a family domain.  If you have questions, please ask.</p>
<p>https://www.ml.com/articles/digital-defense-keeping-your-family-safe-online.html</p>
<p>The post <a href="https://aditigroup.com/october-is-national-cybersecurity-awareness-month/">October is National Cybersecurity Awareness Month</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Feinstein Institute to Pay $3.9 million for Laptop Breach</title>
		<link>https://aditigroup.com/feinstein-institute-to-pay-3-9-million-for-2012-laptop-breach/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Thu, 17 Mar 2016 21:25:19 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data encryption]]></category>
		<category><![CDATA[Feinstein Institute for Medical Research]]></category>
		<category><![CDATA[HIPAA breach]]></category>
		<category><![CDATA[Protected Health Information]]></category>
		<category><![CDATA[stolen laptop]]></category>
		<guid isPermaLink="false">http://aditigroup.com/data-privacy/?p=19</guid>

					<description><![CDATA[<p>As announced on the Health and Human Services website: $3.9 Million HIPAA Breach Settlement Feinstein Institute for Medical Research agreed to pay the U.S. Department of Health and Human Services, Office for Civil Rights (OCR) $3.9 million to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/feinstein-institute-to-pay-3-9-million-for-2012-laptop-breach/">Feinstein Institute to Pay $3.9 million for Laptop Breach</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>As announced on the Health and Human Services website:</em></p>
<h3>$3.9 Million HIPAA Breach Settlement</h3>
<p>Feinstein Institute for Medical Research agreed to pay the U.S. Department of Health and Human Services, Office for Civil Rights (OCR) $3.9 million to settle potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules and will undertake a substantial corrective action plan to bring its operations into compliance.</p>
<h3>What? Another Laptop Lost?</h3>
<p>In 2012, a laptop with electronic protected health information (ePHI) records of about 13,000 patients and research participants was stolen from an employee’s car.  Data included names of research participants, dates of birth, addresses, social security numbers, diagnoses &amp; lab test results, medications, and other medical info.</p>
<p>&gt; <a href="http://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/agreements/Feinstein/index.html." target="_blank" rel="noopener">Read more on HHS website</a></p>
<p>The post <a href="https://aditigroup.com/feinstein-institute-to-pay-3-9-million-for-2012-laptop-breach/">Feinstein Institute to Pay $3.9 million for Laptop Breach</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
