Personal information on almost 20,000 coronavirus patients in Wales was uploaded onto a public computer system in a major data security breach, it was revealed by the Daily Mail.
Experts Comments
Having access to so much data is akin to letting someone drive a bus without prior training.
With modern technology, it's easy to collect, process, and store data. This can bring about many business benefits, but there are equally as many risks, and despite technical controls being in place, it is very easy for an individual to accidentally or deliberately expose sensitive data.
Having access to so much data is akin to letting someone drive a bus without prior training. While the basics may appear similar to a car, there are many differences, and there are many more lives at stake......Read More
Cyber criminals are inventive and resourceful and will use any number of methods to use this data to commit more crime.
Despite the unfortunate nature of this event and the obvious worry and the potential harm it will undoubtedly cause to those involved, it is an excellent example of how Public Authorities should deal with data breaches.
The transparent nature and swift approach taken by Public Health Wales is to be commended. They have clearly done everything they can to mitigate the effects of this breach and obviously have a comprehensive Incident Response plan in place.
Anyone notified as victims of the.....Read More
Breach response, especially for public entities, has to include appropriate transparency and analysis.
Health information is certainly sensitive and needs to be protected. Unfortunately, technical controls aren’t always perfect, and aren’t always enough. In some cases, human error is the root cause of a breach. Breach response, especially for public entities, has to include appropriate transparency and analysis. Although human error might cause a breach, technical controls can certainly be part of the response. Using a technical control to prevent a human from making an error can be very.....Read More
Dot Your Expert Comments
Only for registered and approved experts. Please register before providing comments. Register here
Linkedin Message
@Robert Byrne, Field Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Announcing \"immediate measures\" is barely credible, however, since we know that good data security is an ongoing and, frankly, never ending programme...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-on-news-that-welsh-coronavirus-patient-details-leaked-online
Facebook Message
@Robert Byrne, Field Strategist, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Announcing \"immediate measures\" is barely credible, however, since we know that good data security is an ongoing and, frankly, never ending programme...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-on-news-that-welsh-coronavirus-patient-details-leaked-online