Risk
6/27/2011
03:01 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Health Data Losses: Don't Blame Hackers

Physical theft and lost computing devices are responsible for most of the health data that has been compromised, not hacking, according to U.S. Dept. of Health and Human Services.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
While patients and doctors often worry about medical records being hacked by cybercriminals and Internet snoops, the most common cause of health data breaches is physical theft of computing gear, according to reports by the U.S. Dept of Health and Human Services.

Under the HITECH Act, HHS is required to post a list of incidents involving breaches and unsecured protected health information affecting 500 or more people. The HHS listing of the incidents reveals the top causes of breaches to be theft, not hacking of data.

Of the 288 HIPAA breaches listed on the HHS site, physical theft is at the root of more than 49% of the violations, according to analysis by software research and consulting firm, Software Advisor.

Meanwhile, human error and careless or accidental physical losses--such as losing a laptop with patient data--accounted for 14% of the incidents; unauthorized access and disclosure was involved in 16% of the cases; and improper disposal was the root of 5% of the incidents.

Despite common fears by patients and healthcare providers about of intrusions by black hats, hacking was involved in just 6% of the incidents.

Approximately 9% of the incidents involved a combination of breaches.

According the HHS, the largest data breach of all involved the theft of portal disk drive stolen from Health Net Inc. in California. The January 2011 incident affected 1.9 million individuals.

As for data breaches that involved lost computing gear, the largest incident occurred at South Shore Hospital in South Weymouth, Mass, affecting 800,000 individuals.

The January 2010 incident involved outdated patient data that was stored in e-medical records and on portable electronic devices that had been shipped by the hospital to Archive Data Solutions (formerly called Iron Mountain Data Products) for disposal.

However, a number of the boxes containing the records reportedly never arrived at the third-party data management company. The South Shore Hospital event was the fifth largest data breach incident reported in the HHS list.

Meanwhile, the largest breach involving hacking occurred last November and involved health data at Seacoast Radiology PA in New Hampshire. The incident affected 231,400 individuals.

Among some of the other larger health data breaches was a hacking incident in February 2010 involving records of the University of Texas in Arlington. The breach of prescription records--which included names of patients, diagnostic codes, medications names and some social security numbers--involved a network file server and affected approximately 27,000 individuals, according the HHS report.

In the new, all-digital InformationWeek Healthcare: iPads are leading a new wave of devices into the exam room. Are security, tech support, and infection control up to the task? Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-0460
Published: 2014-04-16
The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.

CVE-2011-0993
Published: 2014-04-16
SUSE Lifecycle Management Server before 1.1 uses world readable postgres credentials, which allows local users to obtain sensitive information via unspecified vectors.

CVE-2011-3180
Published: 2014-04-16
kiwi before 4.98.08, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands via shell metacharacters in the path of an overlay file, related to chown.

CVE-2011-4089
Published: 2014-04-16
The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.

CVE-2011-4192
Published: 2014-04-16
kiwi before 4.85.1, as used in SUSE Studio Onsite 1.2 before 1.2.1 and SUSE Studio Extension for System z 1.2 before 1.2.1, allows attackers to execute arbitrary commands as demonstrated by "double quotes in kiwi_oemtitle of .profile."

Best of the Web