Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Health Data Losses: Don't Blame Hackers

Physical theft and lost computing devices are responsible for most of the health data that has been compromised, not hacking, according to U.S. Dept. of Health and Human Services.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
While patients and doctors often worry about medical records being hacked by cybercriminals and Internet snoops, the most common cause of health data breaches is physical theft of computing gear, according to reports by the U.S. Dept of Health and Human Services.

Under the HITECH Act, HHS is required to post a list of incidents involving breaches and unsecured protected health information affecting 500 or more people. The HHS listing of the incidents reveals the top causes of breaches to be theft, not hacking of data.

Of the 288 HIPAA breaches listed on the HHS site, physical theft is at the root of more than 49% of the violations, according to analysis by software research and consulting firm, Software Advisor.

Meanwhile, human error and careless or accidental physical losses--such as losing a laptop with patient data--accounted for 14% of the incidents; unauthorized access and disclosure was involved in 16% of the cases; and improper disposal was the root of 5% of the incidents.

Despite common fears by patients and healthcare providers about of intrusions by black hats, hacking was involved in just 6% of the incidents.

Approximately 9% of the incidents involved a combination of breaches.

According the HHS, the largest data breach of all involved the theft of portal disk drive stolen from Health Net Inc. in California. The January 2011 incident affected 1.9 million individuals.

As for data breaches that involved lost computing gear, the largest incident occurred at South Shore Hospital in South Weymouth, Mass, affecting 800,000 individuals.

The January 2010 incident involved outdated patient data that was stored in e-medical records and on portable electronic devices that had been shipped by the hospital to Archive Data Solutions (formerly called Iron Mountain Data Products) for disposal.

However, a number of the boxes containing the records reportedly never arrived at the third-party data management company. The South Shore Hospital event was the fifth largest data breach incident reported in the HHS list.

Meanwhile, the largest breach involving hacking occurred last November and involved health data at Seacoast Radiology PA in New Hampshire. The incident affected 231,400 individuals.

Among some of the other larger health data breaches was a hacking incident in February 2010 involving records of the University of Texas in Arlington. The breach of prescription records--which included names of patients, diagnostic codes, medications names and some social security numbers--involved a network file server and affected approximately 27,000 individuals, according the HHS report.

In the new, all-digital InformationWeek Healthcare: iPads are leading a new wave of devices into the exam room. Are security, tech support, and infection control up to the task? Download it now. (Free registration required.)

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.