Risk
6/27/2011
03:01 PM
50%
50%

Health Data Losses: Don't Blame Hackers

Physical theft and lost computing devices are responsible for most of the health data that has been compromised, not hacking, according to U.S. Dept. of Health and Human Services.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
While patients and doctors often worry about medical records being hacked by cybercriminals and Internet snoops, the most common cause of health data breaches is physical theft of computing gear, according to reports by the U.S. Dept of Health and Human Services.

Under the HITECH Act, HHS is required to post a list of incidents involving breaches and unsecured protected health information affecting 500 or more people. The HHS listing of the incidents reveals the top causes of breaches to be theft, not hacking of data.

Of the 288 HIPAA breaches listed on the HHS site, physical theft is at the root of more than 49% of the violations, according to analysis by software research and consulting firm, Software Advisor.

Meanwhile, human error and careless or accidental physical losses--such as losing a laptop with patient data--accounted for 14% of the incidents; unauthorized access and disclosure was involved in 16% of the cases; and improper disposal was the root of 5% of the incidents.

Despite common fears by patients and healthcare providers about of intrusions by black hats, hacking was involved in just 6% of the incidents.

Approximately 9% of the incidents involved a combination of breaches.

According the HHS, the largest data breach of all involved the theft of portal disk drive stolen from Health Net Inc. in California. The January 2011 incident affected 1.9 million individuals.

As for data breaches that involved lost computing gear, the largest incident occurred at South Shore Hospital in South Weymouth, Mass, affecting 800,000 individuals.

The January 2010 incident involved outdated patient data that was stored in e-medical records and on portable electronic devices that had been shipped by the hospital to Archive Data Solutions (formerly called Iron Mountain Data Products) for disposal.

However, a number of the boxes containing the records reportedly never arrived at the third-party data management company. The South Shore Hospital event was the fifth largest data breach incident reported in the HHS list.

Meanwhile, the largest breach involving hacking occurred last November and involved health data at Seacoast Radiology PA in New Hampshire. The incident affected 231,400 individuals.

Among some of the other larger health data breaches was a hacking incident in February 2010 involving records of the University of Texas in Arlington. The breach of prescription records--which included names of patients, diagnostic codes, medications names and some social security numbers--involved a network file server and affected approximately 27,000 individuals, according the HHS report.

In the new, all-digital InformationWeek Healthcare: iPads are leading a new wave of devices into the exam room. Are security, tech support, and infection control up to the task? Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: just wondering...Thanx
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.