Tallying Healthcare Breaches
Despite leaps and bounds in cybersecurity tech, healthcare continues to be one of the most at-risk industries in the business sector.
Despite leaps and bounds in cybersecurity tech, healthcare continues to be one of the most at-risk industries in the business sector.
In the digital age, the ability to review and respond to cyber threats is more important than ever. And as healthcare systems become increasingly reliant on technology, cyber attacks become more prevalent risks, particularly with the uptick in new methods designed to infiltrate your networks. To minimize the risk of successful attacks, IT security teams must be constantly aware of major threat trends, even the ones that don’t appear to target their industries. This week, we examine two standouts from the most recent Threat Landscape Report that are most likely to specifically impact healthcare. Living Off the Land This refers to a type of attack in which cybercriminals make use of software that already exists on the system at risk.
Your organization’s finances can be affected by a variety of factors; everything from client engagement to marketing is critical to consider. But most recently, studies have shown that the most important issue for healthcare providers may also be the one you are least prepared to address: cyber attacks.
A new HIPAA fine has been released, and it’s significant. Federal regulators have issued one of the largest HIPAA settlements ever in favor of 521 impacted individuals over Massachusetts-based healthcare organization Fresenius Medical Care (FMCNA). Cited specifically for a lack of risk analysis, FMNCA now ranks among one of the costliest HIPAA penalties issued, paying out $3.5 million to affected individuals. Fresenius first reported the breach on January 21, 2013. Data exposed included patient names, addresses, dates of birth, telephone numbers, insurance information and even some social security numbers. FMNCA committed an all too common theme among HIPAA violations, failure to conduct a thorough risk analysis of potential risks and vulnerabilities to the confidentiality, integrity, and availability of all its
We’re here to discuss your upcoming IT security assessment and compliance audit needs.