Client Alerts, News Articles & Blog Posts

Everything you need to know about BMD and the industry.

The Rising Threat from Insiders – Get Your House in Order

What is Insider Threat?

As its name implies, an ‘Insider Threat’ originates inside an organization. An ‘insider’ is any person who has or had authorized access to or knowledge of an organization’s resources, including personnel, facilities, information, equipment, networks, and systems. ‘Insider threat’ can manifest from malicious, complacent, negligent or unintentional acts that negatively affect the integrity, confidentiality, and availability of the organization, its data, personnel, or facilities. Certainly, ‘Insider Threat’ can be an activity by a bad actor employee, but can also arise from an inadvertent or unknowing action inside an organization (such as an employee who unintentionally opens a phishing email or clicks on a malicious link).

Rising Frequency; Rising Costs.

Protecting against ‘Insider Threat’ is a data security concern for all organizations. The realities facing organizations today include:

  • The frequency and cost of preventing insider attacks is rising;
  • User negligence is the most common cause of a data breach; and
  • Insider threat deterrence must become a key element in a cybersecurity posture.

According to a 2020 study[1], the average global cost of ​insider threats​ rose by ​31% in two years and the frequency of these incidents spiked by ​47%​ in the same time period. The risk is also present for small and medium sized businesses (SMBs). While 72% of organizations reported an increase in insider attacks in 2020, 66% of key decision makers in SMBs do not think breaches are likely to occur. Only 14% of SMBs have any kind of breach defenses in place; the rest are vulnerable to potentially devastating cyberattacks[2]. While daunting, the reality of modern business dictates that companies of all sizes, in all industries, must be cognizant of cybersecurity issues and prepare accordingly.

How can your company guard against Insider Threat?

The following is a brief list of action items your company should implement to address ‘Insider Threat’:

  • Put it in writing – An organization’s security policy should include procedures to prevent and detect misuse of company resources, guidelines for conducting insider investigations, and the potential consequences to the individual. Written policies not only preserve continuity, but also clearly outline rules and expectations in the organization.
  • Train and educate – The Identity Management Institute states that employee education remains key to breach prevention, including cybersecurity awareness during onboarding and routine drills to practice attack and breach responses.
  • Dictate Acceptable Use – An organization should detail an organization’s rules and expectations regarding technology use. This includes considering acceptable behavior on networks and devices.
  • Be transparent about employee privacy expectations - Organizations need to balance reducing insider threats and protecting employee privacy. Communicate and educate employees regarding the security policy and IT rules. Explain the program's objectives, while training employees about their role in security.
  • Get Technical – Invest in IT and consult with legal and technical cybersecurity professionals to find a solution that works for your organization.

Prudent businesses will create and maintain written policies as it relates to cybersecurity and data protection. BMD can assist in crafting the policies and identifying proper security frameworks and connecting you with technical experts to implement. 

If you have any questions about whether your cybersecurity risks, and whether your business is protected, please contact BMD’s Cybersecurity Practice Leaders, Brandon Pauley at btpauley@bmdllc.com or Kyle Johnson at kajohnson@bmdllc.com.

[1] https://www.proofpoint.com/uk/resources/threat-reports/2020-cost-of-insider-threats and Cybersecurity Insiders’ 2020 Insider Threat Report.

[2] https://identitymanagementinstitute.org/government-cybersecurity-and-insider-threats/

Protections Under Federal and Ohio Law for Bona Fide Prospective Purchasers of Contaminated Property

Most industrial/commercial property developers are generally aware of the Comprehensive Environmental Response, Compensation, and Liability Act (“CERCLA”), often also referred to as “Superfund”. CERCLA, a United Stated federal law administered by the U.S. Environmental Protection Agency, was created, in part, because the U.S. Environmental Protection Agency recognized that environmental cleanup could help promote reuse or redevelopment of contaminated, potentially contaminated, and formerly contaminated properties, helping revitalize communities that may have been adversely affected by the presence of the contaminated properties. Commercial property developers should be aware that CERCLA provides for some important liability limitations for landowners that own contaminated property impacted by materials hazardous to the environment. It can also assist with landowners concerned about the potential liabilities stemming from the presence of contamination to which they have not contributed. In particular, CERCLA provides important liability limitations for landowners that qualify as (1) bona fide prospective purchasers (BFPPS), (2) contiguous property owners, or (3) innocent landowners.

Puerto Rico Is Open For Business

Puerto Rico has the highest vaccination in the nation. More than 73% of the total population is fully vaccinated. The U.S. national average is just over 57%. The ports opened in June 2020 and San Juan held it first live concert this past summer. It is important to remember that Puerto Rico is a U.S. territory and there is no need for visas, the banking systems is almost identical to the mainland and the Island uses the U.S. postal service and U.S. dollar as its currency. There are thousands of flights from the U.S. to Puerto Rico daily and all main airlines fly to the Island.

Ohio Medical Board Changes Telemedicine Rules

A SCMS News Article by Scott Sandrock.

In Cybersecurity– A Good Offense is the Best Defense

2021 has been a watershed moment for cybersecurity incidents as cybercrime has become a frequent headline and cyber criminals have thrived on unsuspecting and/or unprepared businesses and institutions. For example, the Solar Winds attack exposed sensitive data from top companies like Microsoft as well government agencies[1] and the Colonial Pipeline attack substantially disrupted the petroleum supply chain[2]. We have seen an almost 20% increase in data breaches and attacks since last year.

Changes to Medicare’s Physician Fee Schedule and Outpatient Prospective Payment System

Come the beginning of 2022, both the Medicare Physician Fee Schedule (“MPFS”) and Outpatient Prospective Payment System (“OPPS”) will look a little different. As a refresher, the MPFS lists the fees associated with reimbursement of services to providers at certain facilities, taking into account geography and costs. By contrast, OPPS sets reimbursement rates for hospitals and community mental health centers for outpatient services, which are determined in advance. A summary of some of the more pertinent changes to each rule will be outlined below.