Cyber Hawk Internal Monitoring

Tier3MD now offers Cyber Hawk for internal monitoring of your network.  We have various levels depending on the need you have for your practice.  We automatically generate alerts on a daily basis and can send them to your IT department, or to our technicians for an immediate resolution.  We use dynamic “action buttons” for each threat including remediate, investigate, and ignore.  We create and enforce your IT security policies.

Security Matters

  • 60% of attacks target small companies, including medical practices
  • Healthcare was victim to 88% of all ransomware attacks in the US.
  • Cost of avg. attack on medical practices

–In 2016 an attack on one medical record cost $355 and is rising.

–The cost to healthcare practices is $8.2 Billion

  • Cyber criminals feel healthcare will pay the ransom

 

Enhanced Security with Internal Vulnerability Scanning

This package is included FREE of charge upon request.

Access Control

Restrict Access to Accounting Computers to Authorized Users

Restrict Access to Business Owner Computers to Authorized Users

Restrict Access to IT Admin Only Restricted Computers to IT Administrators

Restrict Users that are Not Authorized to Log into Multiple Computer Systems

Authorize New Devices to be Added to Restricted Networks

Restrict IT Administrative Access to Minimum Necessary

Strictly Control the Addition of New Users to the Domain

Users Should Only Access Authorized Systems

Strictly Control the Addition of New Local Computer Administrators

Only Connect to Authorized Printers

Computers

Install Critical Patches on Network Computers within 30 Days

Network Security

Only Connect to Authorized Wireless Networks

Platinum Security with Internal Vulnerability Scanning

Small monthly charge depending on the size of your practice.

Access Control

Restrict Access to Computers Containing ePHI to Authorized Users

Restrict Access to Systems in the Cardholder Data Environment (CDE) to Authorized Users

Restrict Access to Accounting Computers to Authorized Users

Restrict Access to Business Owner Computers to Authorized Users

Restrict Access to IT Admin Only Restricted Computers to IT Administrators

Restrict Users that are Not Authorized to Log into Multiple Computer Systems

Authorize New Devices to be Added to Restricted Networks

Restrict IT Administrative Access to Minimum Necessary

Strictly Control the Addition of New Users to the Domain

Users Should Only Access Authorized Systems

Strictly Control the Addition of New Local Computer Administrators

Investigate Suspicious Logons to Computers

Investigate Suspicious Logons by Users

Only Connect to Authorized Printers

Computers

Changes on Locked Down Computers Should be Strictly Controlled

Restrict Internet Access for Computers that are Not Authorized to Access the Internet Directly

Install Critical Patches for DMZ Computers within 30 Days

Install Critical Patches on Network Computers within 30 Days

 

Network Security

Remediate Medium Severity Internal Vulnerabilities (CVSS > 4.0)

Detect Network Changes to Internal Wireless Networks

Detect Network Changes to Internal Networks

Remediate High Severity Internal Vulnerabilities Immediately (CVSS > 7.0)

Only Connect to Authorized Wireless Networks

 

Aside from helping patients, keeping your practice up and running should be the most important thing you can do for your staff, and patients.  For such a low monthly cost, it is definitely worth it to add this safe, secure layer of protection.  Contact us today.