Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Mobile
    • Storage

    Health Care Data Breaches Highlight Need for Security Investment

    Written by

    Brian T. Horowitz
    Published April 25, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Within a few weeks’ time, massive health care breaches have been made public at Emory Healthcare in Atlanta, the South Carolina Department of Health and Human Services (SCDHHS) and the Utah Department of Health, showing a need for health care organizations to boost their security budgets, according to Judy Hanover, research director at IDC Health Insights.

      “There’s been a chronic underinvestment in breach protection and in securing our network and our data,” Hanover told eWEEK.

      New requirements under the 2009 Health Information Technology for Economic and Clinical Health (HITECH) Act mean health care companies need to go public with breaches and report them to the news media in addition to the U.S. Department of Health and Human Services (HHS), said Hanover.

      “Increased reporting requirements are definitely making them more visible,” she said. “You don’t have to pop through HHS briefings to find out about these breaches any longer.” Breaches affecting more than 500 people must be reported to local media outlets, according to the federal notification rule.

      Of the three recent breaches, the Utah breach was the most serious due to the surreptitious nature of the breach and the potential for fraudulent use of financial data as well as medical data, said Hanover.

      On March 30, a weak password enabled an Eastern Europe cyber-attacker to hack into a server at the Utah Department of Technology Services. Of the compromised records, about 280,000 included Social Security numbers and about 500,000 included a name, date of birth and address.

      The Utah case is also serious because it involved children’s information, Hanover noted. Data about the beneficiaries of the Children’s Health Insurance Program was stolen, and their cases remain in a high-fraud risk monitoring database until age 17, according to Hanover.

      “Child identity theft is just a different animal because children aren’t using their credit all the time and aren’t accessing it,” said Hanover. “And that kind of identify theft tends to go unnoticed, and so those children need to be placed in a high-risk fraud file and monitored longer.”

      Unlike the Utah case, the South Carolina breach is “fairly well-contained,” said Hanover, noting that officials managed to seize some machines from which the data had been transferred.

      In South Carolina, SCDHHS reported on April 19 that an employee in the Medicaid program moved personal information for 228,435 Medicaid beneficiaries to his personal email account. The department discovered the breach on April 10 and then reported it to the South Carolina Law Enforcement Division.

      The illegally transferred data came from 17 spreadsheets dating back to Jan. 31. They included names, phone numbers, addresses, birth dates and Medicaid ID numbers, SCDHHS reported. The Medicaid ID numbers contain Social Security numbers and also matched up with beneficiaries’ names in 22,604 cases.

      Meanwhile, Emory Healthcare in Atlanta announced on April 18 that it had misplaced 10 backup disks containing data on 315,000 patients. Social Security numbers were included on 228,000 of the patient files, and Emory Healthcare CEO John Fox’s own health data may have been among the missing records. The health system stored the disks in an unlocked cabinet. They may have been missing for a long time and gone undetected, Hanover suggested.

      A recent survey by HIMSS Analytics and Kroll highlighted a need for more proactive security policies by health care organizations. To avoid data breaches, health care companies can acquire software that performs data mining and intrusion protection, Hanover suggested. Vendors include FairWarning and Sensage. Products from these companies run data mining to detect if intrusions have occurred, said Hanover.

      Companies should also conduct audits of security practices and vulnerabilities, either by an internal or external firm, she said.

      Health care organizations also need to adopt proper device management for mobile devices, particularly as companies join the “bring your own device” (BYOD) trend. In fact, 85 percent of hospital IT departments allow doctors and staff to employ personal devices on the job, a Feb. 21 survey by mobile networking vendor Aruba Networks revealed.

      For mobile devices, health care facilities should adopt a “no client strategy” in which users don’t store data on the units. The policy involves “keeping the data as tightly held in the data center as possible and really just providing access to the device but not storing the information,” said Hanover.

      Brian T. Horowitz
      Brian T. Horowitz
      Brian T. Horowitz is a technology and health writer as well as a copy editor. Brian has worked on the tech beat since 1996 and covered health care IT and rugged mobile computing for eWEEK since 2010. He has contributed to more than 20 publications, including Computer Shopper, Fast Company, FOXNews.com, More, NYSE Magazine, Parents, ScientificAmerican.com, USA Weekend and Womansday.com, as well as other consumer and trade publications.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.