Risk

6/27/2011
03:01 PM
50%
50%

Health Data Losses: Don't Blame Hackers

Physical theft and lost computing devices are responsible for most of the health data that has been compromised, not hacking, according to U.S. Dept. of Health and Human Services.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
While patients and doctors often worry about medical records being hacked by cybercriminals and Internet snoops, the most common cause of health data breaches is physical theft of computing gear, according to reports by the U.S. Dept of Health and Human Services.

Under the HITECH Act, HHS is required to post a list of incidents involving breaches and unsecured protected health information affecting 500 or more people. The HHS listing of the incidents reveals the top causes of breaches to be theft, not hacking of data.

Of the 288 HIPAA breaches listed on the HHS site, physical theft is at the root of more than 49% of the violations, according to analysis by software research and consulting firm, Software Advisor.

Meanwhile, human error and careless or accidental physical losses--such as losing a laptop with patient data--accounted for 14% of the incidents; unauthorized access and disclosure was involved in 16% of the cases; and improper disposal was the root of 5% of the incidents.

Despite common fears by patients and healthcare providers about of intrusions by black hats, hacking was involved in just 6% of the incidents.

Approximately 9% of the incidents involved a combination of breaches.

According the HHS, the largest data breach of all involved the theft of portal disk drive stolen from Health Net Inc. in California. The January 2011 incident affected 1.9 million individuals.

As for data breaches that involved lost computing gear, the largest incident occurred at South Shore Hospital in South Weymouth, Mass, affecting 800,000 individuals.

The January 2010 incident involved outdated patient data that was stored in e-medical records and on portable electronic devices that had been shipped by the hospital to Archive Data Solutions (formerly called Iron Mountain Data Products) for disposal.

However, a number of the boxes containing the records reportedly never arrived at the third-party data management company. The South Shore Hospital event was the fifth largest data breach incident reported in the HHS list.

Meanwhile, the largest breach involving hacking occurred last November and involved health data at Seacoast Radiology PA in New Hampshire. The incident affected 231,400 individuals.

Among some of the other larger health data breaches was a hacking incident in February 2010 involving records of the University of Texas in Arlington. The breach of prescription records--which included names of patients, diagnostic codes, medications names and some social security numbers--involved a network file server and affected approximately 27,000 individuals, according the HHS report.

In the new, all-digital InformationWeek Healthcare: iPads are leading a new wave of devices into the exam room. Are security, tech support, and infection control up to the task? Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12630
PUBLISHED: 2018-06-21
NEWMARK (aka New Mark) NMCMS 2.1 allows SQL Injection via the sect_id parameter to the /catalog URI.
CVE-2018-12631
PUBLISHED: 2018-06-21
Redatam7 (formerly Redatam WebServer) allows remote attackers to read arbitrary files via /redbin/rpwebutilities.exe/text?LFN=../ directory traversal.
CVE-2018-12632
PUBLISHED: 2018-06-21
Redatam7 (formerly Redatam WebServer) allows remote attackers to discover the installation path via an invalid LFN parameter to the /redbin/rpwebutilities.exe/text URI.
CVE-2018-12581
PUBLISHED: 2018-06-21
An issue was discovered in js/designer/move.js in phpMyAdmin before 4.8.2. A Cross-Site Scripting vulnerability has been found where an attacker can use a crafted database name to trigger an XSS attack when that database is referenced from the Designer feature.
CVE-2018-12613
PUBLISHED: 2018-06-21
An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attack...