4.4 million patient records were compromised in 117 healthcare data breaches in the third quarter of this year alone according to the Protenus Breach Barometer.
Justin Jett, Director of Audit and Compliance at Plixer:
“Data breaches in healthcare pose a serious risk not only for the organization but also for the patients. Should a hacker get this critical information, they can use it for insurance fraud which turns into a nightmare for the patient as there is no formal process for patients to correct their healthcare records and it could have serious impact if a patient needs a test or medicine. The insurance company could turn down such expenses if it looks like a patient has already had the test or medicine or has used up their allotment for the year. Many organizations take the stance that network and security teams perform vastly different roles, but as data is being siphoned from the network, it is the network team, working with the security team, that is best suited to detect the breach. Given that most data breaches occur by malicious actors taking data from the network in a low and slow way, most security teams are unable to detect the small amounts of data being taken from the network. IT professionals from both network and security teams should work together to make data breaches a relic of the past.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.