<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Aditi Group Managed IT &amp; Consulting</title>
	<atom:link href="https://aditigroup.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://aditigroup.com/</link>
	<description>IT Privacy • Protection • Productivity</description>
	<lastBuildDate>Thu, 13 Feb 2025 22:50:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://aditigroup.com/data-privacy/wp-content/uploads/cropped-aditi-group-icon-512-t-32x32.png</url>
	<title>Aditi Group Managed IT &amp; Consulting</title>
	<link>https://aditigroup.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Podcast: 2025 HIPAA Proposed Rule Changes You Need to Know About</title>
		<link>https://aditigroup.com/2025-hipaa-proposed-rule-changes-you-need-to-know-about/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Thu, 13 Feb 2025 22:42:06 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Aditi Group]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[compliance audits]]></category>
		<category><![CDATA[Dorothy Cociu]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[HIPAA requirements]]></category>
		<category><![CDATA[HIPAA Security Rule]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[incident response]]></category>
		<category><![CDATA[Marilyn Monahan]]></category>
		<category><![CDATA[monitor]]></category>
		<category><![CDATA[patch management]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[policies and procedures]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[robust risk management]]></category>
		<category><![CDATA[Ted Flittner]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1568</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/2025-hipaa-proposed-rule-changes-you-need-to-know-about/">Podcast: 2025 HIPAA Proposed Rule Changes You Need to Know About</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Benefits Executive Roundtable Podcast</h2>
<p><strong>Watch &amp; Listen as Aditi Group&#8217;s Ted Flittner covers ground on the recently proposed HIPAA Security Rule changes and how they can affect you.</strong></p>
<p>Dorothy Cociu discusses the recently released HIPAA Security Proposed Rules with Marilyn Monahan of Monahan Law Office and Ted Flittner, Principal of Aditi Group, an IT/HIPAA Security/Cybersecurity firm. In Part 1 of this series, we discuss the proposed requirements for written policies and procedures, establishing technical and non-technical evaluations, and a robust risk management plan. Many requirements are annual, with at least one every six months. We discuss the requirement for encryption, patch management, monitoring, incident response, testing, an annual compliance audit, and more. What’s in the new proposed rules specifically? Join us for this informative podcast.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>LISTEN NOW</h3></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_0">
				
				
				
				
				<div class="et_pb_code_inner"><iframe src="https://podcasters.spotify.com/pod/show/benefitsexecroundtable/embed/episodes/S6E11---HIPAA-Security-Proposed-Rules-Part-1-e2ud0ro" height="102px" width="400px" frameborder="0" scrolling="no">
</div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_5 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>WATCH VIDEO PODCAST</h3></div>
			</div><div class="et_pb_module et_pb_video et_pb_video_0">
				
				
				
				
				<div class="et_pb_video_box"><iframe title="S6E11 - HIPAA Security Proposed Rules Part 1" width="1080" height="608" src="https://www.youtube.com/embed/sR2ROzusq2U?feature=oembed&amp;rel=0&amp;controls=1"  allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
				
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/2025-hipaa-proposed-rule-changes-you-need-to-know-about/">Podcast: 2025 HIPAA Proposed Rule Changes You Need to Know About</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>HIPAA Training on New Regulations &#038; Updates in 2025</title>
		<link>https://aditigroup.com/hipaa-training-on-new-regulations-updates-in-2025/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Fri, 24 Jan 2025 23:03:31 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[changes]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[in-person. HIPAA]]></category>
		<category><![CDATA[privacy office]]></category>
		<category><![CDATA[privacy work group]]></category>
		<category><![CDATA[regulations]]></category>
		<category><![CDATA[reproductive rights]]></category>
		<category><![CDATA[required training]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1543</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/hipaa-training-on-new-regulations-updates-in-2025/">HIPAA Training on New Regulations &amp; Updates in 2025</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_2_3 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Get Ready for Changes!</h2>
<p>HIPAA new proposed regulations bring many new requirements for ALL Covered Entities big and small as well as for Business Associates.  Learn about the changes in detail and about updates to HIPAA Reproductive Rights requirements.</p>
<p>&nbsp;</p>
<h3 style="text-align: center;"></h3>
<h3 style="text-align: center;">Two venues and dates to attend IN-PERSON</h3>
<h3 style="text-align: center;">March 18, 2025 9am &#8211; 4pm<br />Anaheim Hills, Orange County</h3>
<h3 style="text-align: center;">April 23, 2025 9am &#8211; 4pm<br />Santa Fe Springs, Los Angeles County</h3></div>
			</div><div class="et_pb_button_module_wrapper et_pb_button_0_wrapper et_pb_button_alignment_center et_pb_module  dbdb-icon-on-right dbdb-icon-on-hover">
				<a class="et_pb_button et_pb_button_0 et_pb_bg_layout_light" href="https://advancedbenefitconsulting.com/all-new-hipaa-privacy-security-training-march-april-2025" target="_blank">Learn More</a>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="222" height="224" src="https://aditigroup.com/data-privacy/wp-content/uploads/health-and-human-services-hipaa.gif" alt="Health &amp; Human Services" title="health-and-human-services-hipaa" class="wp-image-1545" /></span>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/hipaa-training-on-new-regulations-updates-in-2025/">HIPAA Training on New Regulations &amp; Updates in 2025</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Stop Insider Theft &#038; USB Drive-By with Zero Trust</title>
		<link>https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Mon, 18 Nov 2024 21:02:18 +0000</pubDate>
				<category><![CDATA[Aditi Zero Trust]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[data storage control]]></category>
		<category><![CDATA[flashdrive]]></category>
		<category><![CDATA[thumb drive]]></category>
		<category><![CDATA[USB drive]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1483</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/">Stop Insider Theft &amp; USB Drive-By with Zero Trust</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Remember Physical Data Security</h2>
<p>Just like fortified castle defenses, most electronic data security focuses on the internet.  Phishing emails, malicious websites, unsavory social media links, public Wifi connections, and weak passwords.  All are potentially exploited by data thieves.  But what about the old school theft?  What about in person physical theft of data?</p>
<p>&nbsp;</p>
<h3>Stealth Storage in a Pocket</h3>
<p>Insider theft and passers-by can too quickly pop in a USB drive and terabytes of data quickly and unnoticed.  Storage size and data transfer speed are no longer limitations for would be thieves.  Today&#8217;s reality is that even USB flash drives aka thumb drives can be found for less than $20 for 2TB of storage! </p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>USB flash drives</li>
<li>Portable 2.5&#8243; Solid State drives</li>
<li>Portable 2.5&#8243; hard disk drives</li>
<li>USB adapters for M2 SSD sticks</li>
<li>USB A, B, C</li>
<li>USB 3.0</li>
<li>mobile phones</li>
</ul>
</li>
</ul></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_5 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;"><span style="color: #333333;"><em>Gone In 60 Seconds?</em></span></h2></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_1">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="800" src="https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800.jpg" alt="USB drive theft - gone in 60 seconds?" title="USB drive theft - gone in 60 seconds?" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/usb-drive-and-stopwatch-800-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1485" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>What About Our Ever Present Phones?</h3>
<p>And perhaps most stealth of all&#8230;the our ever present mobile phones!   Who would notice a cell phone connected to a computer?   Likely just a battery recharge right?   Maybe it&#8217;s more.   An iPhone can have to 1TB of storage and many Android phones have large storage AND the ability to add microSD cards for even more.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_2">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="717" src="https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800.jpg" alt="transfer data between cell phones and computers" title="transfer data between cell phones and computers" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/cell-phone-and-laptop-800-480x430.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1492" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;">USB Adapter for M.2 Internal SSD</h3>
<p style="text-align: center;"><strong>As high as 4TB of space, blazing fast, and small as a stick of gum!</strong></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_3">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="600" src="https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter.jpg" alt="USB M.2 SSD adapter" title="m2 SSD usb adapter" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/m2-SSD-usb-adapter-480x360.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1491" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>What&#8217;s the Risk?  What&#8217;s At Stake?</h2>
<p>Everything valuable to you and your business.</p>
<p>HIPAA breach of protected health information (PHI).   Company proprietary secrets.   Customer private financial information, including social security numbers and other items covered by GLBA and consumer privacy laws.   Book of business &#8211; the clientele that you&#8217;ve worked so hard to build up over the years.  Embarasing photos or insinuating documents.</p>
<p>Breach of privacy laws can mean massive financial penalties by authorities, lawsuits, and potentially even jail time. And your reputation can flip from trusted authority to careless, untrustworthy people to avoid.  </p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Stealth and Easy Use Enables Theft</h3>
<p>USB storage devices &#8211; portable drives and mobile phones, enable in-person, local theft of data if they are allowed.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h4>Theft happens in one of three ways:</h4>
<ol>
<li style="list-style-type: none;">
<ol>
<li>The door is left OPEN &#8211; the invitation to take unprotected things</li>
<li>An OUTSIDER breaks in &#8211; hacking and social engineering</li>
<li>Someone INSIDE is the thief &#8211; you&#8217;re given access as a team member</li>
</ol>
</li>
</ol>
<h2>Zero Trust Solution: Block USB</h2>
<p>The heavy handed IT admin&#8217;s solution is to simply block all USB ports.   No more connecting thumb drives, phones, or portable SSDs and HDDs.   Blocking USB drive storage can close an overlooked door that few choose to secure.  This follows the assumption that files copied or saved to extneral USB connected drives are suspect and not to be trusted.  This closes a real and serious security hole.  But it also can create a roadblock to work flow by denying USB connected devices that you WANT.  So, really a more nuanced and complex strategy is what most people want.  And it is what keeps IT admins from implementing it: complexity.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_11  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2><img loading="lazy" decoding="async" src="https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000-300x102.png" width="300" height="102" alt="Aditi Zero Trust Protection" class="wp-image-1475 alignleft size-medium" />Let Aditi Zero Trust Do the Work</h2>
<p>A much more practical path forward to secure your data, while allowing dyanmic workplaces and convenience is with Aditi Zero Trust.   Data storage controls can regulate storage options by specific computer, workgroup, user, or even software program.  Our set of tools allows us to deal with all of the complexity of enabling software functionality and workflow that you need while locking down and blocking everything else.   Aditi Zero Trust is supported 24/7 and we are able to react to any new requests for software changes within a few minutes. So, you get the best overall security while keeping business flowing smoothly. </p></div>
			</div><div class="et_pb_button_module_wrapper et_pb_button_1_wrapper et_pb_button_alignment_center et_pb_module  dbdb-icon-on-right dbdb-icon-on-hover">
				<a class="et_pb_button et_pb_button_1 et_pb_bg_layout_light" href="https://aditigroup.com/contact-us/">Contact Us Now to Learn More</a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/stop-insider-theft-usb-drive-by-with-zero-trust/">Stop Insider Theft &amp; USB Drive-By with Zero Trust</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>3 Cybersecurity Strikes Against Marriott for $52 Million Settlement</title>
		<link>https://aditigroup.com/3-cybersecurity-strikes-against-marriott-for-52-million-settlement/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Wed, 23 Oct 2024 20:37:06 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[2FA]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Awareness Month]]></category>
		<category><![CDATA[Marriott]]></category>
		<category><![CDATA[network security]]></category>
		<category><![CDATA[Starwood]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1407</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/3-cybersecurity-strikes-against-marriott-for-52-million-settlement/">3 Cybersecurity Strikes Against Marriott for $52 Million Settlement</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_12  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Big Company, Big Breaches, Big Settlement</h2>
<p>&nbsp;</p>
<p><strong>If you&#8217;ve ever stayed at hotel, you&#8217;ve probably stayed with Marriott.  </strong>Marriott International is the world&#8217;s largest hotel company.  Nearly 8900 properties in 141 countries and territories. Wow! That&#8217;s a lot.</p>
<p>They have another distinction:  Marriott and now subsidiary company Starwood Hotels &amp; Resorts Worldwide, LLC suffered three major cyber security breaches in the last decade affecting over 344 million guest and loyalty records.  What was it? Everything from passport numbers and personal info to payment card info and hotel stay history.</p>
<p>Now Marriott International has approved a $52 million settlement with 50 states and D.C.  The group action of 50 state attorneys general over three breaches that have plagued Marriott is just one of the penalties against the hotel giant.  It paves the way for more actions in other countries and is only the latest and largest to date for the company.</p>
<p>The Federal Trade Commission worked in parallel with the 50 states investigation and has imposed other terms.  The <strong>FTC requires Marriot</strong>t International and subsidiary Starwood Hotels &amp; Resorts Worldwide LLC<strong> to put in place &#8220;a robust information security program.</strong>&#8221; Marriott will improve data security practices &#8220;using a dynamic risk-based approach&#8221; with customer data protections, and pay $52 million to States.</p>
<p>&nbsp;</p>
<h2 style="text-align: center;">Allegations by Attorneys General</h2>
<p>&nbsp;</p>
<h4><em>Marriott violated state consumer protection laws, personal information protection laws, and breach notification laws by failing to implement reasonable data security and fix data security holes.  Particularly with integrating Starwood into Marriott systems.</em></h4>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_13  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_13  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">What Happened in Marriott Data Breaches</h2></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_with_border et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_1_3 et_pb_column_14  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_14  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><strong>Strike 1</strong><br />Starwood Payment Card Data</h3>
<p>In June 2014 Starwood Hotels &amp; Resorts incurred a<strong> data breach of payment information of over 40,000 Starwood guests</strong>. Hackers went unnoticed for more than a year.  Starwood only told customers in November 2015, four days after the Starwood acquisition announcement.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_15  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><span style="color: #800000;">How Breach Happened</span></h3>
<p style="text-align: center;">Hackers used <strong>compromised credentials</strong> and <strong>unprotected administrative accounts</strong> to <strong>install malware</strong> and access customer information.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_15  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_16  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><strong>Strike 2</strong><br />Starwood Guest Records</h3>
<p>From July 2014 to September 2018 <strong>hackers stole 339 million Starwood guest account records, including 5.25 million unencrypted passport numbers.</strong> This second hit on Starwood went undetected for more than four years!</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_17  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><span style="color: #800000;">How Breach Happened</span></h3>
<p style="text-align: center;">Hackers <strong>installed malware</strong> with keyloggers, remote access, and memory scrapers <strong>in more than 480 systems across 58 locations</strong> to steal 339 million personal records.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_3 et_pb_column_16  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_18  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><strong>Strike 3</strong><br />Marriott Guest Records</h3>
<p style="text-align: left;"><strong>Hackers accessed 5.2 million guest records worldwide, </strong>including data from 1.8 million Americans. Names, mailing addresses, email addresses, phone numbers, birth day and month, and loyalty account information were breached.  Network access went undetected from September 2018 until February 2020.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_19  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3 style="text-align: center;"><span style="color: #800000;">How Breach Happened</span></h3>
<p style="text-align: center;">Attackers used <strong>compromised employee credentials</strong> to breach its network several times</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_11">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_17  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_blurb et_pb_blurb_0  et_pb_text_align_left et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_blurb_content">
					
					<div class="et_pb_blurb_container">
						<h2 class="et_pb_module_header"><span>States Hold Marriott Accountable</span></h2>
						<div class="et_pb_blurb_description"><p><span></span></p>
<p style="text-align: left;"><span><strong>“Companies have an obligation to take reasonable measures to protect consumer data security.</strong> Marriott clearly failed to do that, resulting in the breach of the Starwood computer network and the exposure of personal information for millions of its guests. This 50-state settlement, co-led by Connecticut forces a strong system of risk-based protections to guard against ever-evolving threats to cybersecurity. We will continue to work closely with our multistate partners across the country to ensure companies are taking all reasonable precautions to protect our personal information” <br /> </span><span><em><strong><br /></strong></em></span><span><em>&#8211; Connecticut Attorney General William Tong</em><br /></span></p></div>
					</div>
				</div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_12">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_18  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_20  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Settlement Requirements for Marriott</h2>
<p>&nbsp;</p>
<p>The following are requirements of the <a href="https://portal.ct.gov/ag/press-releases/2024-press-releases/multistate-settlement-with-marriott-for-data-breach-of-starwood-guest-reservation-database" target="_blank" rel="noopener" title="Marriott $52 million settlement">settlement with the States &amp; DC</a></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><strong>Pay $52 million to the U.S. states &amp; D.C. </strong>
<p><strong></strong></p>
</li>
<li><strong>Allow U.S. customers to request deletion of personal info</strong> tied to their email address or loyalty rewards account number. And they must review loyalty rewards accounts upon customer request and restore stolen loyalty points.</li>
<li><strong>Implementation of a comprehensive Information Security Program.</strong> This includes new overarching security program mandates, such as incorporating zero-trust principles, regular security reporting to the highest levels within the company, including the Chief Executive Officer, and enhanced employee training on data handling and security.</li>
<li><strong style="font-size: 14px;">Data minimization and disposal requirements</strong><span style="font-size: 14px;">, which will lead to less consumer data being collected and retained.</span></li>
<li><strong style="font-size: 14px;">Specific security requirements with respect to consumer data</strong><span style="font-size: 14px;">, including component hardening, conducting an asset inventory, encryption, segmentation to limit an intruder’s ability to move across a system, patch management to ensure that critical security patches are applied in a timely manner, intrusion detection, user access controls, and logging and monitoring to keep track of movement of files and users within the network.</span></li>
<li><strong style="font-size: 14px;">Increased vendor and franchisee oversight</strong><span style="font-size: 14px;">, with a special emphasis on risk assessments for “Critical IT Vendors,” and clearly outlined contracts with cloud providers.</span></li>
<li>In the future, if Marriott acquires another entity, it <strong style="font-size: 14px;">must timely further assess the acquired entity’s information security program</strong><span style="font-size: 14px;"> and develop plans to address identified gaps or deficiencies in security as part of the integration into Marriott’s network.</span></li>
<li>An independent <strong style="font-size: 14px;">third-party assessment of Marriott’s information security program</strong><span style="font-size: 14px;"> every two years for a period of 20 years for additional security oversight.</span></li>
<li><span style="font-size: 14px;"><strong>Offer multi-factor authentication</strong> to consumers for their loyalty rewards accounts, such as Marriott Bonvoy</span></li>
<li><strong><span style="font-size: 14px;">Review rewards accounts if there is suspicious activity.</span></strong></li>
</ul>
</li>
</ul>
<p>Additional FTC REquirements:<strong><span style="font-size: 14px;"></span></strong></p>
<p>Marriott must <strong>investigate suspicious activity within 24 hours</strong> and <strong>provide assessments</strong> and reports for future data breaches <strong>within 120 days</strong>.</p>
<p style="padding-left: 40px;"></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_with_border et_pb_row et_pb_row_13">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_19  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_21  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">What You Can Learn from Marriott</h2></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_22  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3></h3>
<h3></h3>
<h3></h3>
<h3></h3>
<h3>LOCK DOWN SYSTEMS</h3>
<p><strong>Zero Trust, Deny by Default</strong></p>
<p>This is an Aditi Group favored strategy and special leading-edge functionality that we offer our clients.  Unlike anti-malware or anti-virus programs which look for what is already running, downloaded or installed, we lock down and set computers to <strong>deny by default</strong>.  So, malware often can&#8217;t download, and can&#8217;t install or run. </p>
<p>We limit software programs that can install, run, or even be uninstalled to what we allow.  And within those programs, only expected actions are allowed.   What computer and data resources programs can use are by allow-list only. In essence, it&#8217;s the IT managers dream &#8211; lock everything down to just what is needed to do the job.  We also employ ways to limit escalation of rights from user accounts so they can&#8217;t go from being an every day user to having Administrator rights.</p>
<p><em><strong>With this approach, malware, keyloggers, memory scrapers, and remote access programs would never have been allowed to install.</strong></em></p>
<p>&nbsp;</p>
<h3></h3>
<h3>KNOW THE RISKS</h3>
<p><strong>Regular Risk Assessments</strong></p>
<p>Marriott strayed from its forward looking nature and focus on people and excellence.   While Marriott wasn&#8217;t responsible for the actions or inactions of Starwood prior to take-over, it is now ultimately responsible and should have done a deep dive into the <strong>IT Security Step 1:  RISK ASSESSMENT.</strong></p>
<p>Aditi Group, like our peers who support data privacy laws such as HIPAA and consumer protection laws know that good security begins with identifying the risks.  And that should be followed by making plans to patch holes and reduce risks.   The most comment and first item noted from all HIPAA violation settlements is <strong>Lack of Proper Risk Assessment.</strong></p>
<p>This is also an age old precept of warfare.  We must know our strengths and weaknesses and anticipate how the other side may try to exploit weak defenses and human behavior.</p>
<p><em><strong>Risk Assessments and taking action to fix gaps helps avoid breaches and penalties if problems do happen.</strong></em></p>
<p>&nbsp;</p>
<h3>DO THE BASICS</h3>
<p><strong>Encryption, Multi-factor Authentication</strong></p>
<p>A second take-away is to ensure that the basic tools and techniques are used.  Stolen data includes unencrypted passport numbers and personal contact data.  Encryption is a basic data security method that should be activated for data that can be used in personal credit fraud.  Numerous state and federal and international data privacy laws require encryption of sensitive data or de-identification of it.  This is nothing new.  It should be the norm.</p>
<p><em><strong>MFA prevents most account compromising.  Encrypted data is useless to hackers. </strong></em></p>
<p>&nbsp;</p>
<h3></h3>
<h3>KEEP ONGOING AWARENESS</h3>
<p><strong>Monitor Data Going Out, Monitor Account Logins, Malware Scans</strong></p>
<p>Each of the data breaches with Starwood and Marriott went more than a year before they were detected.  The latest happened over four years.  That&#8217;s a lifetime in the electronic data world.   This fact is a driver of the ever increasing focus of anti-virus and cyber security programs to do what is called pattern recognition or behavioral analysis.  They look for the anomolys.   Just like when your credit card company puts a lock on your card if you suddenly use it at 3am to buy $100 in gasoline 3 times in 30 minutes&#8230;&#8221;that didn&#8217;t look like you.&#8221;</p>
<p><em><strong>Monitors should have revealed issues within short time</strong></em></p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_14">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_20  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_23  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Marriott History</h2></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_15">
				<div class="et_pb_column et_pb_column_1_3 et_pb_column_21  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_24  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Marriott Brands</h3>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li>The Ritz-Carlton®</li>
<li>St. Regis®</li>
<li>JW Marriott®</li>
<li>Ritz-Carlton Reserve®</li>
<li>The Luxury Collection®</li>
<li>W Hotels®</li>
<li>EDITION®</li>
<li>Marriott Hotels®</li>
<li>Sheraton®</li>
<li>Marriott Vacation Club®</li>
<li>Delta Hotels®</li>
<li>Westin®</li>
<li>Le Méridien®</li>
<li>Renaissance Hotels®</li>
<li>Gaylord Hotels®</li>
<li>Courtyard Hotels®</li>
<li>Four Points®</li>
<li>SpringHill Suites®</li>
<li>Fairfield Inn &amp; Suites®</li>
<li>AC Hotels®</li>
<li>Aloft Hotels®</li>
<li>Moxy Hotels®</li>
<li>Protea Hotels®</li>
<li>City Express®</li>
<li>Four Points Flex by Sheraton</li>
<li>Residence Inn®</li>
<li>TownePlace Suites®</li>
<li>Element®</li>
<li>Homes &amp; Villas by Marriott Bonvoy®</li>
<li>Apartments by Marriott Bonvoy®</li>
<li>Marriott Executive Apartments®</li>
<li>Autograph Collection Hotels®</li>
<li>Design Hotels®</li>
<li>Tribute Portfolio®</li>
<li>MGM Collection with Marriott Bonvoy</li>
</ul>
</li>
</ul>
</li>
</ul></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_3 et_pb_column_22  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_4">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1200" height="609" src="https://aditigroup.com/data-privacy/wp-content/uploads/marriott-bonvoy-brands.png" alt="Marriott Bonvoy paying $52 million settlement for cyber breaches" title="marriott-bonvoy brands" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/marriott-bonvoy-brands.png 1200w, https://aditigroup.com/data-privacy/wp-content/uploads/marriott-bonvoy-brands-980x497.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/marriott-bonvoy-brands-480x244.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" class="wp-image-1411" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_25  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Marriott International is the world&#8217;s largest hotel chain.   With over 30 brands, you&#8217;re familiar with them.  This dizzyingly large list covers the range of resort, boutique, luxury, business traveler, extended stay and budget economy stays.  You&#8217;ve probably stayed in many of their nearly 8900 properties in 141 countries and territories.</p>
<p>&nbsp;</p>
<h3>From Root Beer to Global Empire</h3>
<p>J.W. and Alice Marriott founded this massive global leader from humble beginnings in 1927, serving A &amp; W Root Beer in D.C. stand that grew to Hot Shoppe diners.  This grew into food service for the airline industry.  Momentum grew into cafeteria management services. </p>
<p>Thirty years after serving their first root beer, the company drifted into hotels with Twin Bridges Motor lodge. Led by Bill Marriott, Jr., this foray into hoteling grew and grew over the next 50 years into an international hotel giant.   <strong>In 2016, Marriott International acquired Starwood Hotels &amp; Resorts Worldwide creating the world’s largest hotel company</strong>.</p>
<p>The long trajectory of expansion was guided and maintained by corporate values of realizing opportunities and changing with the times.  This latest cybersecurity breach settlement for Marriott is a story of missing the mark with company values. </p>
<p>Marriott didn&#8217;t do everything they should have to protect customers like you and me after the 2016 take-over of Starwood.</p>
<p>&nbsp;</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_16">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_23  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_26  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Starwood and Marriott Fell Short of Core Values</h2></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_17">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_24  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_27  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>J.W. and Alice Marriott built the empire on strong business and ethical core values. Have they held true on in the customer data privacy realm?   These are values Marriott highlights today:</p>
<h4 style="padding-left: 40px; text-align: center;">Put People First,  Act with Integrity,  Pursue Excellence</h4>
<h4 style="padding-left: 40px; text-align: center;">Embrace Change,  Serve Our World</h4>
<p style="padding-left: 40px;"></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_28  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>&nbsp;</p>
<h3 style="padding-left: 40px;">Act with Integrity</h3>
<p style="padding-left: 40px;"><strong>&#8220;How we do business is as important as the business we do.  </strong>We hold ourselves to uncompromising ethical and legal standards. This extends to our day-to-day business conduct, our employee policies, our supply chain policies, our environmental programs and practices, and our commitment to human rights and social responsibility.&#8221;<strong></strong></p>
<p style="padding-left: 40px;"></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_25  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_5">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1000" height="667" src="https://aditigroup.com/data-privacy/wp-content/uploads/john-willard-marriott-hotel-founder-1000.jpg" alt="John Willard &quot;J.W.&quot; Marriott hotel founder" title="john-willard-marriott-hotel-founder-1000" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/john-willard-marriott-hotel-founder-1000.jpg 1000w, https://aditigroup.com/data-privacy/wp-content/uploads/john-willard-marriott-hotel-founder-1000-980x654.jpg 980w, https://aditigroup.com/data-privacy/wp-content/uploads/john-willard-marriott-hotel-founder-1000-480x320.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1000px, 100vw" class="wp-image-1422" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_18">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_26  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_29  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Lessons for Everyone</h2>
<p>While Marriott and Starwood can&#8217;t turn the clock back and prevent the breaches of personal data that have already happened, they can now make security a &#8220;Job One&#8221; kind of priority.  And we hope that other companies learn from Marriott&#8217;s experiences and the judgements of attorneys general and the FTC.   Apply the lessons for your organiztion and keep private data private and secure.</p></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_30  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2 style="text-align: center;">Need Help?</h2>
<p><em>Aditi Group, Inc provides Zero Trust security tools including deny-by-default, data encryption, multi-factor authentication, password management, account and network monitoring, and risk assessments.   Call or message us to learn more today.</em></p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/3-cybersecurity-strikes-against-marriott-for-52-million-settlement/">3 Cybersecurity Strikes Against Marriott for $52 Million Settlement</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How QuickBooks &#038; Lacerte can weaken security and help hackers</title>
		<link>https://aditigroup.com/how-quickbooks-lacerte-can-weaken-security-and-help-hackers/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Thu, 10 Oct 2024 23:19:06 +0000</pubDate>
				<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[accounting]]></category>
		<category><![CDATA[Administrator]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Lacerte]]></category>
		<category><![CDATA[lock down]]></category>
		<category><![CDATA[permissions control]]></category>
		<category><![CDATA[QuickBooks]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[tax software]]></category>
		<category><![CDATA[Windows user privileges]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1358</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/how-quickbooks-lacerte-can-weaken-security-and-help-hackers/">How QuickBooks &amp; Lacerte can weaken security and help hackers</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_19">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_27  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_31  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3></h3>
<h2>What to do when your software needs Windows Admin rights: safely using QuickBooks &amp; Lacerte</h2></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_20">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_28  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_6">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="816" height="625" src="https://aditigroup.com/data-privacy/wp-content/uploads/Windows-10-Administrator-Account.jpg" alt="Windows Administrator accounts and permissions" title="Administrator accounts and permissions" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/Windows-10-Administrator-Account.jpg 816w, https://aditigroup.com/data-privacy/wp-content/uploads/Windows-10-Administrator-Account-480x368.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 816px, 100vw" class="wp-image-1393" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_3_5 et_pb_column_29  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_32  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h3>Overview</h3>
<p>Lacerte and QuickBooks require Administrative Windows user level permission to keep software updated.  This is different than the various QuickBooks user level accounts within QuickBooks.  <strong>Why does this matter? </strong> As we explain in other Aditi Group articles, <em><strong>a</strong><strong> key goal of hackers is to get admin rights</strong></em>.</p>
<p>Once a user has Windows admin permissions, he or she can open more doors, access more data and functions, run exploits, change user credentials, and ultimately, get to the goods &#8211; sensitive financial info.</p>
<p><strong>Aditi Group uses unique software that allows <em>programs</em> </strong><strong>to have Admin rights, without requiring <em>users</em> to be Admins</strong>.  So programs function correctly, while allowing Windows users work without Admin level rights &#8211; in a much more secure mode.  Work gets done while blocking potential hackers from greater access.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_21">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_30  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_33  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>&nbsp;</p>
<p><strong>QuickBooks</strong> is synonymous with personal and business accounting.  Nearly every bank and online investment account allows you to export transaction history and account data in QuickBooks file format.  Even better, you can connect financial institutions directly to your QuickBooks software to sync data automatically.  It&#8217;s the most widely used accounting and bookkeeping software for small businesses.</p>
<p>Another in the Intuit portfolio is tax preparation software <strong>Lacerte</strong>.  Acquired by Intuit in 1998 for $400 million, it&#8217;s not one of the more known Intuit names, but there is a large base of CPA&#8217;s and tax preparers.  Both progams are part of the ever growing portfolio of <strong>Intuit</strong>, current owner TurboTax, Credit Karma and Mailchimp.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_2_5 et_pb_column_31  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_7">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="581" src="https://aditigroup.com/data-privacy/wp-content/uploads/lacerte-quickbooks-intuit.png" alt="" title="" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/lacerte-quickbooks-intuit.png 800w, https://aditigroup.com/data-privacy/wp-content/uploads/lacerte-quickbooks-intuit-480x349.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1367" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_22">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_32  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_34  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Administrator Rights</h2>
<p>QuickBooks and Lacerte require Windows Admin user account credentials to run updates, which, during tax season, can be frequent.  Aditi Group has seen updates daily, and even more than once a day at times.  And tax prep offices may be running a slew of different tax years simultaneously, each one requiring different Lacerte program version.</p>
<p>These means QB and Lacerte users need to be made Windows Admin level to keep the office running with their core software.   <strong>The violates a basic principle of security: <em>only use the level of access you need right now.</em></strong></p>
<p>Don&#8217;t work in Admin mode all the time.  Use non-admin accounts for daily work.  Use Admin accounts to make changes, review issues, and access resources for special action.   See what Google recommends to administrators:</p></div>
			</div><div class="et_pb_with_border et_pb_module et_pb_blurb et_pb_blurb_1  et_pb_text_align_left et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap et_pb_only_image_mode_wrap"><img loading="lazy" decoding="async" width="1200" height="1048" src="https://aditigroup.com/data-privacy/wp-content/uploads/google-guideance-for-admins.png" alt="Google Workspace Admin security recommendtions" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/google-guideance-for-admins.png 1200w, https://aditigroup.com/data-privacy/wp-content/uploads/google-guideance-for-admins-980x856.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/google-guideance-for-admins-480x419.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1200px, 100vw" class="et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-1377" /></span></div>
					<div class="et_pb_blurb_container">
						<h4 class="et_pb_module_header"><span>What Does Google Say to Admins?</span></h4>
						<div class="et_pb_blurb_description"><p><em><strong>Don&#8217;t stay logged into Admin or use Admin accounts for everyday work.  </strong></em>Google, like most sources, cautions against remaining logged in as an admin, or in the context of Google Workspace (aka Apps), as Super Admin.</p>
<p>&nbsp;</p></div>
					</div>
				</div>
			</div><div class="et_pb_module et_pb_text et_pb_text_35  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Prime Hacker Targets</h2>
<p>Financial professionals who deal in analyzing, tracking, managing, and reporting on money are prime target for hackers.  Especially Tax Accountants and Tax Preparers.  Your valuable info, including your social security number, is the golden key that credit thieves are looking for.  Not only can fraudsters potentially create new credit accounts in your name, but they can also potentially file for tax refunds in your name, and to be collected by them.  In fact, tax return fraud is such a huge problem in recent years that the <a href="https://www.taxpayeradvocate.irs.gov/news/nta-blog/nta-blog-wheres-my-refund-has-your-tax-return-been-flagged-for-possible-identity-theft/2023/08/">IRS flags millions of returns as potentially fraudulent and requires tax user verification</a>.  An untold number of fraudulent returns make it through the system.</p>
<p>As we write this, October 15th is fast approaching and smack in the middle of national Cybersecurity Awareness month.  It&#8217;s fitting.  Hackers know that it&#8217;s &#8220;silly season&#8221; as some tax preparers call it.   They know that heavily loaded staff working long, late hours can more easily click on a phishing email link instead of a legit message from a client and accidentally let in a potential hacker.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_23">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_33  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_36  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Feeling the Pressure</h2>
<p>&nbsp;</p>
<h3>Tax Seasons Around the Year</h3>
<p>As the tax filing dates grow closer for individuals in April and October and for business with their tax filing deadlines, the pressure cooker in many tax prep offices heats up and up.  Clients (hey, that&#8217;s people like you and me) tend to wait until the deadline and then some, to get data, and I mean all the records to the tax prep offices.  And then we demand that OUR filings are submitted on time.   And hey, where&#8217;s my refund? </p>
<p>&nbsp;</p>
<h3>Monthly Close &amp; Reporting Deadlines</h3>
<p>When CPA&#8217;s and bookkeepers aren&#8217;t hustling with tax prep or filing steps, they&#8217;re keenly aware of the regular reporting that many business leaders require to pace company progress and manage the tactical and strategic plans through the year.  Like tax filing dates, these end of month, quarter and yearly points mean more work and more pressure clients to get data processed and reports done.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_34  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_8">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="600" height="401" src="https://aditigroup.com/data-privacy/wp-content/uploads/tax-deadline-pexels-leeloothefirst-8962467-800.jpg" alt="tax deadline April and October 15 for personal income tax" title="tax deadline April and October 15 for personal income tax" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/tax-deadline-pexels-leeloothefirst-8962467-800.jpg 600w, https://aditigroup.com/data-privacy/wp-content/uploads/tax-deadline-pexels-leeloothefirst-8962467-800-480x321.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" class="wp-image-1378" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_24">
				<div class="et_pb_column et_pb_column_2_5 et_pb_column_35  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_9">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="425" height="282" src="https://aditigroup.com/data-privacy/wp-content/uploads/computer-security-protection-privacy.jpg" alt="computer security lock down privacy protection" title="computer security lock down privacy protection" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/computer-security-protection-privacy.jpg 425w, https://aditigroup.com/data-privacy/wp-content/uploads/computer-security-protection-privacy-300x199.jpg 300w" sizes="(max-width: 425px) 100vw, 425px" class="wp-image-1390" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_3_5 et_pb_column_36  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_37  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>&lt;&lt;   IT Managers&#8217; Dream</h2>
<p>The fantasy for many a CISO or IT manager is to fully lock down every computer.  No one gets admin rights but them.  No one else can make changes, install risky software, use weak passwords, move data with insecure ways, or otherwise erode the secure defenses our IT leaders put in place.</p>
<h2 style="text-align: right;">&gt;&gt;  IT Reality</h2>
<p style="text-align: left;">Keeping offices in forward motion and appeasing staff traditionally means <em><strong>trade-offs</strong></em>.  We vote for quick and easy over secure and thorough and secure.  The real picture is too often weak or compromised security to allow programs and people to get the job done.  Thieves pray on the security trade-offs and compromises we make for convenience.  Something to exploit!</p>
<p>&nbsp;</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_25">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_37  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_38  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Elevation Control Solution</h2>
<p>Aditi Group employs a software system that allows us to exercise granularly assigned rights and privileges to both programs and people.  Those rights can be set with a variety of factors which gives IT managed service providers like us at Aditi Group, the ability to approve Lacerte and QuickBooks for Windows administrative permission, while keeping users are non-admins.  So, users, including hackers, can&#8217;t directly get to the admin privileges.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_38  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_10 et_animated et-waypoint">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="999" height="338" src="https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000.png" alt="Aditi Zero Trust Protection
" title="Aditi-Zero-Trust-Platform-inline-blue-1000" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000.png 999w, https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000-980x332.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/Aditi-Zero-Trust-Platform-inline-blue-1000-480x162.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 999px, 100vw" class="wp-image-1475" /></span>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_26">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_39  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_11">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="800" height="533" src="https://aditigroup.com/data-privacy/wp-content/uploads/eat-cake-pexels-wildlittlethingsphoto-3215592.jpg" alt="have your cybersecurity cake and eat it too!" title="have your cybersecurity cake and eat it too" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/eat-cake-pexels-wildlittlethingsphoto-3215592.jpg 800w, https://aditigroup.com/data-privacy/wp-content/uploads/eat-cake-pexels-wildlittlethingsphoto-3215592-480x320.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 800px, 100vw" class="wp-image-1381" /></span>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_40  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_39  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Enjoy the Security &amp; Productivity Rewards</h2>
<p>We can have our cake AND eat it too.  We can now effectively and securely enable powerful software tools while reducing cybersecurity risks.  This is the not the end-all, be-all for security, but it significantly reduces risk of hacking of valuable financial data.  And that can be the difference between having a thriving accounting, bookkeeping, or tax preparation business and lawsuits and penalties for allowing hackers to get to client data.</p></div>
			</div><div class="et_pb_button_module_wrapper et_pb_button_2_wrapper  et_pb_module  dbdb-icon-on-right dbdb-icon-on-hover-off">
				<a class="et_pb_button et_pb_button_2 et_pb_bg_layout_light" href="https://aditigroup.com/contact-us/" data-icon="">Contact Us to Secure Your Office</a>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_27">
				<div class="et_pb_column et_pb_column_3_5 et_pb_column_41  et_pb_css_mix_blend_mode_passthrough et_pb_column_empty">
				
				
				
				
				
			</div><div class="et_pb_column et_pb_column_2_5 et_pb_column_42  et_pb_css_mix_blend_mode_passthrough et-last-child et_pb_column_empty">
				
				
				
				
				
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/how-quickbooks-lacerte-can-weaken-security-and-help-hackers/">How QuickBooks &amp; Lacerte can weaken security and help hackers</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What&#8217;s the Score? National Vulnerability Database</title>
		<link>https://aditigroup.com/whats-the-score-national-vulnerability-database/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Wed, 10 Apr 2024 20:27:26 +0000</pubDate>
				<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NVD]]></category>
		<category><![CDATA[rating]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[severity]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1137</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/whats-the-score-national-vulnerability-database/">What&#8217;s the Score? National Vulnerability Database</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_28">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_43  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_40  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Weakness Scoring System</h2>
<p>Our Federal government division witin the Department of Commerce, under the National Institute of Standards and Technology, NIST, has a <strong>National Vulnerability Databaase</strong> designed to help the public, and especially the technical administrators of IT systems to guage potential weaknesses or vulnerabilities in software and hardware systems.  </p>
<p>&nbsp;</p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_12">
				
				
				
				
				<a href="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png" class="et_pb_lightbox_image" title="NATIONAL VULNERABILITY DATABASE"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="2400" height="1350" src="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png" alt="NATIONAL VULNERABILITY DATABASE" title="NIST-national-vulnerability-database page-2400" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png 2400w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-1280x720.png 1280w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-980x551.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-480x270.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 2400px, 100vw" class="wp-image-1139" /></span></a>
			</div><div class="et_pb_module et_pb_text et_pb_text_41  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>NIST has been working with private industry and other public sector organizations to rate and maintain a catalog of IT threats.   Originally started in 1999 under another name, and as an effort between NIST, SANS institute, and othrs, under the name ICAT or Internet Category Attack Toolkit.  It evolved and even faced death by lack of budgets until rebranded as NVD in 2005 and supported more fully.  </p></div>
			</div><div class="et_pb_module et_pb_blurb et_pb_blurb_2  et_pb_text_align_left et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap et_pb_only_image_mode_wrap"><img loading="lazy" decoding="async" width="1199" height="873" src="https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938.png" alt="example NVD score 7.8" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938.png 1199w, https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938-980x714.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938-480x349.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1199px, 100vw" class="et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-1145" /></span></div>
					<div class="et_pb_blurb_container">
						<h4 class="et_pb_module_header"><span>Example: 7.8 Severity Linux Vulnerability</span></h4>
						<div class="et_pb_blurb_description"><p>This page is an excellent example of the use, and also of how technical it is.  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46936">https://nvd.nist.gov/vuln/detail/CVE-2021-46936</a></p></div>
					</div>
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/whats-the-score-national-vulnerability-database/">What&#8217;s the Score? National Vulnerability Database</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Watch Your Keys &#8211; YubiKey Manager Advisory</title>
		<link>https://aditigroup.com/watch-your-keys-yubikey-manager-advisory/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Wed, 10 Apr 2024 19:37:17 +0000</pubDate>
				<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[hardware key]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[two factor authentication]]></category>
		<category><![CDATA[Yubico]]></category>
		<category><![CDATA[YubiKey]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1125</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/watch-your-keys-yubikey-manager-advisory/">Watch Your Keys &#8211; YubiKey Manager Advisory</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_29">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_44  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_42  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Security Advisory</h2>
<p>Yubico, maker of YubiKeys, issued this advisory of vulnerabilities in their software application YubiKey Manager GUI  <a href="https://www.yubico.com/support/security-advisories/ysa-2024-01/">https://www.yubico.com/support/security-advisories/ysa-2024-01/</a></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_30">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_45  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_43  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>WHO DOES THIS AFFECT?</h2>
<h3>Keys are Good.  Program has vulnerability.</h3>
<h4>Only users of <span><strong>YubiKey Manager GUI <span style="color: #ff0000;"><em>versions perior to 1.2.6</em></span></strong> installed on a computer that is running Windows and is not using Edge as the default browser. </span></h4>
<p>Millions of people worldwide use YubiKeys for more secure multifactor authentication than the common SMS text message, email or phone call.  It is also an alternative or adjunct to authenticator apps which are found on phones &#8211; like Google Authenticator, and apps from password managers like 1PAssword, Dashlane, and LastPass.   YubiKeys and other hardware keys are generally more secure than using phones or emails as those accounts can be compromised or hijacked remotely.  Physical keys are difficult to copy, clone, or interecpt.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_46  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_44  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				
				
				<div class="et_pb_text_inner"><h3 class="wp-block-heading">HOW SCARY IS THIS?</h3>
<h3 class="wp-block-heading" id="h-severity">Severity</h3>
<h4>Yubico has rated this issue as High. It has a CVSS score of<span> </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H&amp;version=3.1" target="_blank" rel="noreferrer noopener">7.7</a>.</h4></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_45  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				
				
				<div class="et_pb_text_inner"><h2><span>SOLUTION</span></h2>
<h4><span>Download the latest version of YubiKey Manager GUI from </span><a href="https://www.yubico.com/support/download/yubikey-manager/">Yubico.com website</a><span> or </span><a href="https://github.com/Yubico/yubikey-manager-qt" target="_blank" rel="noreferrer noopener">directly from GitHub</a><span>.</span></h4></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_46  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Bottomline</h2>
<p>Update Software.  Keep using advanced security options like hardware MFA tools.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_31">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_47  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_blurb et_pb_blurb_3  et_pb_text_align_left et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap et_pb_only_image_mode_wrap"><img loading="lazy" decoding="async" width="300" height="80" src="https://aditigroup.com/data-privacy/wp-content/uploads/partner-logo-yubico_2x-2798497557-300x80.png" alt="yubico MFA security key" class="et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-1129" /></span></div>
					<div class="et_pb_blurb_container">
						<h4 class="et_pb_module_header"><span>Advisory April 4, 2024</span></h4>
						<div class="et_pb_blurb_description"><h3 class="wp-block-heading" id="h-summary">Summary</h3>
<p>A security issue has been identified in YubiKey Manager GUI which could lead to unexpected privilege escalation on Windows. If a user runs the YubiKey Manager GUI as Administrator, browser windows opened by YubiKey Manager GUI may be opened as Administrator which could be exploited by a local attacker to perform actions as Administrator. Under this circumstance, some browsers like Edge for example, have additional mitigations to prevent opening as Administrator.</p>
<h3 class="wp-block-heading" id="h-affected-software">Affected software</h3>
<p>The affected tool is YubiKey Manager GUI (commonly known as<span> </span><em>ykman-gui</em>) with versions prior to 1.2.6. The issue impacts installations on Windows because Windows requires Administrative permissions to interact with FIDO authenticators. For other operating systems, YubiKey Manager GUI should not be run with elevated permissions.</p>
<h3 class="wp-block-heading" id="h-not-affected-software">Not affected software</h3>
<p>Installations of YubiKey Manager GUI on platforms other than Windows are not impacted by this issue.</p>
<h3 class="wp-block-heading" id="h-how-to-tell-if-you-are-affected">How to tell if you are affected</h3>
<p>You are affected if you have YubiKey Manager GUI versions &lt; 1.2.6 installed on a computer that is running Windows and is not using Edge as the default browser. You can check the version of YubiKey Manager GUI you have installed by clicking the “About” menu in the YubiKey Manager GUI.</p>
<h3 class="wp-block-heading" id="h-customer-actions">Customer Actions</h3>
<p>Yubico recommends that affected customers update to the latest version of YubiKey Manager available for download from<span> </span><a href="https://www.yubico.com/support/download/yubikey-manager/">our website</a><span> </span>or<span> </span><a href="https://github.com/Yubico/yubikey-manager-qt" target="_blank" rel="noreferrer noopener">directly from GitHub</a>.</p>
<h4 class="wp-block-heading" id="h-alternate-mitigations">Alternate Mitigations</h4>
<ol>
<li>Running YubiKey Manager GUI elevated is only required for using the FIDO features. In cases where users do not require FIDO features in YubiKey Manager GUI, it can run as an unelevated user to avoid this issue.</li>
<li>Users can set Microsoft Edge as their default browser which includes mitigations to avoid inheriting Administrative permissions when opened in this way.</li>
</ol>
<h3 class="wp-block-heading" id="h-issue-details">Issue Details</h3>
<p>YubiKey Manager GUI is a tool for managing the various features of a YubiKey, including FIDO, OTP or PIV. In certain situations, the tool spawns the system default browser as a child process. This action requires user interaction with the tool and is not automatically triggered.</p>
<p>On Windows systems, the ability to communicate with FIDO authenticators requires Administrator privileges. This is a limitation built into the operating system by Microsoft. Thus, in order to interact with the FIDO functionality of the YubiKey, the user must run YubiKey Manager GUI with Administrator privileges. Once YubiKey Manager GUI is run with Administrator privileges, any browser windows opened by YubiKey Manager GUI may also be elevated with Administrator privileges depending on the browser in use. This issue can be used by an attacker to escalate local attacks and increase the impact of browser based attacks.</p>
<h3 class="wp-block-heading" id="h-severity">Severity</h3>
<p>Yubico has rated this issue as High. It has a CVSS score of<span> </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H&amp;version=3.1" target="_blank" rel="noreferrer noopener">7.7</a>.</p>
<h3 class="wp-block-heading" id="h-timeline"><strong>Timeline</strong></h3>
<figure class="wp-block-table">
<table>
<tbody>
<tr>
<td>February 1, 2024</td>
<td>Issue identified</td>
</tr>
<tr>
<td>April 4, 2024</td>
<td>Yubico releases advisory</td>
</tr>
</tbody>
</table>
</figure></div>
					</div>
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/watch-your-keys-yubikey-manager-advisory/">Watch Your Keys &#8211; YubiKey Manager Advisory</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Is Blockchain a Security Savior for Healthcare and Us All?</title>
		<link>https://aditigroup.com/is-blockchain-a-security-savior-for-healthcare-and-us-all/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Thu, 03 Nov 2022 19:49:44 +0000</pubDate>
				<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[hacks]]></category>
		<category><![CDATA[hardware wallets]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[hipaa compliance]]></category>
		<category><![CDATA[performance problems]]></category>
		<category><![CDATA[supply chain]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=960</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/is-blockchain-a-security-savior-for-healthcare-and-us-all/">Is Blockchain a Security Savior for Healthcare and Us All?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_32">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_48  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_47  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>The Goals of Blockchain: Trust and Security</h2>
<h2>What is Blockchain? Blockchain explained for non-coders</h2>
<p>Blockchain is a way of recording that sequentially links every revision of a a record, in a distributed / shared log (or ledger for finance folks).  Every transaction is recorded in an every growing record chain.</p>
<h4>Featues of Blockchain Records</h4>
<ul>
<li>decentralized digital record ledger</li>
<li>data records (blocks) are tied together in time sequence</li>
<li>any change to a record adds a new block</li>
<li>nothing can be deleted or changed without a record as evidence</li>
<li>&#8220;tamper proof&#8221;</li>
<li>can be used for any kind of data</li>
<li>distributed network &#8211; doesn&#8217;t reside on just one computer or desk</li>
</ul>
<h2></h2>
<h2>Security and Trust</h2>
<p><strong>Blockchain brings the promise of trusted data,</strong> and impossible&#8230;or very low probability of fakes. It can allow a person to own their own data and share it with the world as they choose. Panacea.</p>
<p>&nbsp;</p>
<h2>Code Is Opportunity</h2>
<p>But this is code and electronics. There is always some relative weakness.  Code is the realm of hacks.</p>
<p>Crypto hacks have shown that environments where blockchain are used are not unlike other things in the cyber world.  Regardless of how trusted or secure a blockchain inidivudal record is, the the application or system it&#8217;s used in is vulnerable to the same old cybersecurity problems that befall everyone else.</p>
<p>Two main ways: stolen keys (the passwords), and exploiting bugs in code. Here are some expensive examples:</p>
<blockquote class="wp-embedded-content" data-secret="mHUgZF8POq"><p><a href="https://blockworks.co/the-nine-largest-crypto-hacks-in-2022/">The Nine Largest Crypto Hacks in 2022</a></p></blockquote>
<p><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;The Nine Largest Crypto Hacks in 2022&#8221; &#8212; Blockworks" src="https://blockworks.co/the-nine-largest-crypto-hacks-in-2022/embed/#?secret=pTgeASvjIu#?secret=mHUgZF8POq" data-secret="mHUgZF8POq" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<blockquote class="wp-embedded-content" data-secret="39q8TequQs"><p><a href="https://techmonitor.ai/technology/cybersecurity/biggest-cryptocurrency-hacks-of-all-time">The biggest cryptocurrency hacks of all time</a></p></blockquote>
<p><iframe loading="lazy" class="wp-embedded-content" sandbox="allow-scripts" security="restricted"  title="&#8220;The biggest cryptocurrency hacks of all time&#8221; &#8212; Tech Monitor" src="https://techmonitor.ai/technology/cybersecurity/biggest-cryptocurrency-hacks-of-all-time/embed#?secret=uNaKY72lLM#?secret=39q8TequQs" data-secret="39q8TequQs" width="600" height="338" frameborder="0" marginwidth="0" marginheight="0" scrolling="no"></iframe></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<h2>Where is Blockchain Used?  Is it Here Yet? </h2>
<p>Blockchain is being introduced in the background with the <strong>big insurers, banks, pharma, governments</strong>, etc. For most of us, we won&#8217;t see it or it won&#8217;t affect us for a while (some years).  Blockchain is really only encoutered by most people who invest in or read about crypto currencies.  What blockchain offers crypto is the distributed, trusted accounting that is needed when there is no central bank.  It&#8217;s the perfect and obvious applicaiton for this new way of tracking transactions. </p>
<h3>Healthcare Blockchain &amp; How It&#8217;s Used</h3>
<p>Blockchain methodology and application are still in the infancy stages for the healthcare industry as a whole. There is an ever increasing number of companies applying blockchain in different ways.</p>
<p><strong>Some create trusted data share groups.</strong>  These allow us patients &#8211; us individuals to own and control our personal medical history records.  We can choose who we allow to view and add to our records.  And they can&#8217;t be tampered with.  That&#8217;s real power in the hands of the people.  </p>
<p>Some healthcare blockchain companies and projects focus on the <strong>validation of drug history, DNA info, etc</strong>. This is similar to <em><strong>traceability</strong></em> that supply chains are generally concerned with.  Knowing the history or the full life path of who touched an item from raw material and out and into the marketplace, is important for controlling quality, safety, and accountability for problems.</p>
<p>Other blockchain tech companies just create <strong>data network protocols</strong> (the code stuff) <strong>or hardware</strong> (like crypto currency wallets).  These support products and services advance the practicality and usefulness of blockchain in healthcare.</p>
<p>&nbsp;</p>
<h2>Why Aren&#8217;t We All Using Blockchain?</h2>
<p><strong>What&#8217;s the Holdup? We need trusted, secure solutions today!<br /></strong></p>
<h3><strong>The Performance Problem</strong></h3>
<p>Blockchains also suffer from a capacity problem. That’s the reason one crypto currency has not really won out yet. Each transaction must be written somewhere. Therefore, the greatest strides have been done through supply chain. Once the object has been delivered, it can be archived or erased. Food is the one application that holds the greatest promise. A head of lettuce grown in a field can be tracked until sold. If a contamination is discovered, tracking to the field, within a farm, can be pulled out of the blockchain in an instant.</p>
<p><em><strong>Cons for using blockchain are processing speed and resources needed</strong></em>. It can consume a lot of computing power to solve the complex cryptographic equations for validating a record to be added to a chain. For crypto currencies, this is one way you get paid &#8211; by &#8220;mining&#8221; or by computing a new record. It takes time, so fewer transactions per second and computing power and electrical power. Both cost money&#8230;real money. : )</p>
<p>&nbsp;</p>
<p>Healthcare faces the same limits as currency. People live a long time. Each prescription, procedure, etc. must be kept for the life of the individual. The cloud is not limitless. Everything has a capacity.</p></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/is-blockchain-a-security-savior-for-healthcare-and-us-all/">Is Blockchain a Security Savior for Healthcare and Us All?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Security Risks and Importance of Cybersecurity</title>
		<link>https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Tue, 11 Oct 2022 15:35:11 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data hack]]></category>
		<category><![CDATA[IT security]]></category>
		<category><![CDATA[LAUSD]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=933</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/">Data Security Risks and Importance of Cybersecurity</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_33">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_49  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_13">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1000" height="1000" src="https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1.jpg" alt="Aditi Group cybersecurity interview podcast " title="Podcast-S4E6-Cybersecurity-part-1" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1.jpg 1000w, https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1-980x980.jpg 980w, https://aditigroup.com/data-privacy/wp-content/uploads/Podcast-S4E6-Cybersecurity-part-1-480x480.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1000px, 100vw" class="wp-image-937" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_48  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Listen in as we kick off Cybersecurity Month with another great interview by Dorothy Cociu on the Benefits Executive Roundtable.  In this show we discuss hot security topics and security breaches in 2022 and 2021.  Find out what&#8217;s been happening and what you can avoid being a statistic!</p>
<p>Listen and follow the podcast series Benefits Executive Roundtable: </p>
<p><a href="https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1/?">https://advancedbenefitconsulting.com/s4e6-data-security-risks-and-importance-of-cybersecurity-part-1/?</a></p></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_1">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://anchor.fm/benefitsexecroundtable/embed/episodes/S4E6---Data-Security-Risks-and-Importance-of-Cybersecurity--Part-1-e1p2a1k" height="102px" width="400px" frameborder="0" scrolling="no"></iframe></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/data-security-risks-and-importance-of-cybersecurity/">Data Security Risks and Importance of Cybersecurity</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</title>
		<link>https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Fri, 20 May 2022 21:28:53 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[IT Solutions]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Aditi Group]]></category>
		<category><![CDATA[Advanced Benefit Consulting]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[interview]]></category>
		<category><![CDATA[published articles]]></category>
		<category><![CDATA[The STATEment]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=887</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_10 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_34">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_50  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_49  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p><strong>Aditi co-founders Ted Mayeshiba and Ted Flittner</strong> are interviewed in this lengthy article written by Dorothy Cociu, President of Advanced Benefit Consulting.  We invite you to learn more about current computer and  phone electronic data security threats and how to avoid some of them.</p>
<h3>Highlight Topics Include</h3>
<ul>
<li>Are banking apps safe?</li>
<li>Microsoft Breach by Lapsus$ Hacker Group, March 2022</li>
<li>The risks of using QR codes</li>
<li>Crypto currency</li>
<li>The need for risk assessments – an ongoing security tool</li>
</ul>
<h3>Read the article at Advanced Benefit Consulting</h3>
<p><a href="https://advancedbenefitconsulting.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">https://advancedbenefitconsulting.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/</a></p>
<p><a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank" rel="noopener"></a></p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_51  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_50  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;">Read the article in the <a href="https://www.calbrokermag.com/in-this-issue/cybersecurity-2-0/" target="_blank" rel="noopener">California Broker magazine, June 2022 issue</a></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_14">
				
				
				
				
				<a href="https://www.calbrokermag.com/in-this-issue/cybersecurity-2-0/" target="_blank"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="600" height="781" src="https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2.jpg" alt="Cal Broker magazine quotes Aditi Group on cybersecurity" title="caifornia-broker-june-2022-cyber-security-2" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2.jpg 600w, https://aditigroup.com/data-privacy/wp-content/uploads/caifornia-broker-june-2022-cyber-security-2-480x625.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" class="wp-image-904" /></span></a>
			</div>
			</div><div class="et_pb_column et_pb_column_1_4 et_pb_column_52  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_51  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p style="text-align: center;">Read the article in the <a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank" rel="noopener">STATEment May / June 2022 issue</a></p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_15">
				
				
				
				
				<a href="https://www.camsdev.net/CAHU/Magazine/May-June-2022/" target="_blank"><span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="400" height="517" src="https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400.jpg" alt="" title="" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400.jpg 400w, https://aditigroup.com/data-privacy/wp-content/uploads/CAHU-Statement-May-June-2022_400-232x300.jpg 232w" sizes="(max-width: 400px) 100vw, 400px" class="wp-image-891" /></span></a>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/cybersecurity-2-0-the-latest-on-cyber-attacks-ransomware-and-the-need-for-risk-assessments/">Cybersecurity 2.0 &#8211; The Latest on Cyber-Attacks, Ransomware and the Need for Risk Assessments</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
