RegTech Eases Compliance Costs & Strengthens Cyber Security

RegTech Simplifies Governance, Risk, and Compliance

As compliance costs skyrocket, standards grow increasingly complex, and the cyber threat environment evolves, organizations are turning to RegTech solutions to automate their compliance processes and improve their overall cybersecurity posture.

As compliance costs skyrocket, standards grow increasingly complex, and the cyber threat environment evolves, organizations are turning to RegTech solutions to automate their compliance processes and improve their overall cybersecurity posture.

Compliance with regulatory and industry standards, such as HIPAA, PCI DSS, FedRAMP, and SSAE 16 SOC reporting, are a burdensome yet necessary part of doing business in the digital world. Organizations operating in highly regulated industries, such as healthcare and finance, face significant compliance challenges, especially when they must comply with multiple standards. HIPAA, for example, applies to any organization that handles medical records, including schools, collection agencies that handle medical debt, personal injury attorneys, and SaaS providers of healthcare software; meanwhile, these same organizations may also have to comply with PCI DSS, SSAE 16 reporting, SOX, and other applicable standards.

Organizations must figure out which standards apply to them, then continually keep up with reporting requirements, audits, and the inevitable changes in those standards as technology and the cyber threat environment evolve. It is estimated that regulatory compliance costs U.S. businesses about $2 trillion annually, and in a perverse twist, small business’s compliance costs are over three times higher than what large companies bear. This heavy burden helps explain why so many enterprise cyber security “plans” start and end with compliance, even though compliance does not equate to data security. It’s not necessarily that organizations don’t care about whether their data is secure, but that they spend so much money and time on compliance, there’s nothing left to tackle cyber security.

Fortunately, technology has made it possible for organizations to achieve compliance and secure their systems and data, at an affordable cost.

RegTech to the Rescue

One of the biggest problems in many organizations is the fact that their compliance processes – or the processes of their third-party compliance providers – are not automated. Some companies still use spreadsheet programs such as Excel for compliance reporting and audits, even though Excel was never meant to be used with the very large data sets produced by today’s complex data environments. But RegTech software, such as Continuum GRC’s IT Audit Machine (ITAM), can.

While the term “RegTech” is most commonly associated with the finance industry, RegTech solutions can be employed by any organization that must adhere to compliance standards, including healthcare, cloud computing, SaaS, education, and public-sector organizations. RegTech solutions utilize big data capabilities and rapid report creation to automate data management and reporting. Instead of multiple, disparate spreadsheets and ledgers, RegTech software creates a centralized repository of all IT compliance requirements with associated controls and automated information flows for audits, assessments, and testing.

Making Sense of Big Data

The big problem with big data is that it amounts to a lot of big noise unless you have the capability to analyze it and derive actionable insight from it. RegTech doesn’t just simplify your compliance processes; it also strengthens your enterprise’s cyber security by providing the advanced data analysis capabilities you need to make sense of your data environment and discover where your vulnerabilities lie. The ITAM, for example, integrates IT governance, policy management, risk management, and incident management. In addition to taking the pain out of the compliance process, it empowers you to document and analyze IT risks, develop mitigation plans, define security controls, and manage ongoing risk assessments so that you can anticipate new and emerging threats and stop them before a breach occurs.

RegTech is poised to transform IT governance, compliance, and cyber security. Organizations that employ this new technology will free up money, time, and human resources to innovate, create, and pursue long-term organizational goals instead of being bogged down in regulatory paperwork and worried about data breaches and other cyber attacks.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help your organization successfully simplify Governance, Risk, and Compliance, and secure your systems.

New PCI DSS Ecommerce Guidelines Stress TLS 1.1 Migration

New PCI DSS Ecommerce Best Practices Replace Previous Guidelines Issued in 2013

Consumers love shopping online and are abandoning malls for mobile shopping apps in droves. However, online shopping environments offer multiple opportunities for hackers to steal payment card data. Even worse, as more brick-and-mortar stores implement card chip technology to defeat skimmers and other forms of POS system fraud, thieves are gravitating toward card-not-present (CNP) ecommerce environments, where the pickings are easier. In an effort to address the growing threat of ecommerce fraud and clear up confusion among merchants regarding encryption and digital certificates, the PCI Security Standards Council has just released a PCI DSS ecommerce information supplement with updated best practices for ecommerce cyber security, which replaces the previous PCI DSS ecommerce guidelines issued in 2013.

New PCI DSS Ecommerce Guidelines Stress TLS 1.1 Migration

Previously, the PCI Council had mandated that all online merchants implement TLS 1.1 encryption or higher by the end of June 2016, then later extended the deadline to June 2018. However, the PCI Council recognized that many merchants did not fully understand their responsibilities and options regarding encryption and digital certificates. The new PCI DSS ecommerce guidelines include a primer on SSL and TLS that explains the difference between SSL and TLS and how to select a Certification Authority (CA) and a public key certificate. There is also a list of questions merchants commonly have about certificate types and TLS migration options; four case studies outlining ecommerce security solutions in different data environments; and a section devoted to best practices for securing ecommerce sites.

Understanding and Complying With the New PCI DSS Ecommerce Guidelines

As the PCI Council itself points out, the new guidelines “[do] not replace or supersede requirements in any PCI SSC Standard.” They “[contain] revised content to address changes in risk and supporting technologies” and are meant to help merchants protect themselves against emerging threats and prepare for migration to TLS 1.1+ encryption.

Although the TLS migration deadline is still over a year away, the PCI Council does not recommend waiting. There are numerous security vulnerabilities in SSL and early (pre-1.1) versions of TLS that are incapable of being fixed or patched. Any ecommerce site running SSL or early TLS is at serious reach of being breached and should upgrade as soon as possible. This is critical even for small ecommerce businesses. Hackers do not discriminate between sole proprietorships and multinational corporations, and a tiny startup may be less able to absorb the financial hit of a breach than a multinational.

In addition to extensive information on TLS 1.1+ migration, the guidelines contain a list of best practices for securing ecommerce stores, including:

  • Know the location of all your cardholder data; use data flow diagrams to identify your systems, processes, and security controls.
  • If you don’t need it, don’t store it; PCI DSS 3.1 requires that merchants store cardholder data for only as long as they need to, and not store sensitive authentication data at all after authorization.
  • Evaluate the risks of your associated e-commerce technology; PCI DSS Requirement 12.2 mandates that organizations include their ecommerce environments in their annual risk-assessment process.
  • Conduct ASV scanning and penetration testing of ecommerce environments; even if you are outsourcing your web hosting and management, it is still your responsibility under PCI DSS to ensure that your vendor is conducting these important tests.

The PCI Council also mandates comprehensive cyber security training for staff and recommends that merchants promote cyber security awareness among their customers. Although the latter is not a requirement for PCI DSS compliance, it is still an excellent idea. Security-aware customers are less likely to fall victim to credit card fraud, which benefits merchants by reducing fraud-related losses. Additionally, in our connected world, hacks no longer happen in a vacuum; cyber security is everyone’s responsibility.

The PCI DSS ecommerce best practices supplement is 64 pages long, and much of the content is quite technical. Many merchants, especially small companies, may feel overwhelmed by the information, advice, and requirements outlined in the document, as well as PCI DSS compliance in general. That’s why merchants should seek the help of a PCI DSS Qualified Security Assessor (QSA) such as Lazarus Alliance. As a QSA, Lazarus Alliance has been approved by the PCI Security Standards Council to measure organizations’ compliance with the PCI DSS audit standard. Our PCI DSS experts will walk your business through the compliance process, including your online store’s migration to TLS 1.1+, and ensure that your systems are compliant and secured against data breaches, DDoS attacks, ransomware, and other forms of abuse.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help your organization successfully migrate to TLS 1.1 or higher, achieve and maintain PCI DSS compliance, and secure your systems.

It’s Time to Get Serious About Education Cyber Security

Back to School: Education Cyber Security

K-12 school systems, colleges, and universities are being increasingly targeted by hackers, yet education cyber security is as woefully lacking as other industries, as these recent incidents illustrate:

It’s Time to Get Serious About Education Cyber Security

Education Cyber Security Threats are Many and Varied

As the above incidents illustrate, K-12 schools and higher education institutions face threats on multiple fronts. Like healthcare facilities, school networks are a hacker’s treasure trove of identifying information on staff members, students, and students’ families, including names, birth dates, addresses, Social Security numbers, even medical information. Additionally, school networks are often connected to each other and to government agencies for information-sharing purposes, which means that in addition to data breaches, ransomware attacks, and other direct abuse, cyber criminals may infiltrate a school’s network for purposes of using it as a back door into another organization.

Further complicating education cyber security is the fact that K-12 schools, by their very nature, have a user base that includes minor children as well as adults. Not only are minor students potentially more vulnerable to social engineering schemes, they may also pose cyber threats themselves, as in the South Washington County Schools case. Students may also hack a school’s network to alter grades, cause general disruption, or even just to see if they can do it.

Third-party software applications also pose threats to education cyber security. Cash-strapped schools, under pressure from students and parents for more e-learning capabilities, often turn to free applications released by third parties. However, nothing is truly “free”; software developers must monetize their applications in some manner, and this could involve collecting personal data from teachers and students and selling it to other companies. Third-party developers may also practice poor data security. An independent audit of 1,200 education software applications by the nonprofit group Common Sense Education found that nearly half did not automatically encrypt students’ data.

How Schools Can Protect Themselves

Just as in every other industry, an education cyber security strategy must be proactive, not reactive. Teachers, other school staff, and students must all be trained on cyber security best practices, and schools must employ the same data security protection as organizations in other industries; for example, strong passwords that are changed regularly, two-factor authentication, and ensuring that software is kept up-to-date.

For generations, schools have taught students about “stranger danger” and how to stay safe in the real world; they should likewise be taught how to protect themselves from identity theft and other online crimes. Schools should also have specific policies regarding the use of third-party educational software in the classroom, and any software a teacher would like to use should be evaluated for data security before it is installed.

The cyber security experts at Lazarus Alliance have deep knowledge of the cyber security field, are continually monitoring the latest information security threats, and are committed to protecting organizations of all sizes from security breaches. We offer full-service risk assessment services and Continuum GRC software to protect companies from data breaches, ransomware attacks, and other cyber threats.

Lazarus Alliance is proactive cyber security®. Call 1-888-896-7580 to discuss your organization’s cyber security needs and find out how we can help your organization secure your systems.