Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Database
    • Networking

    Data Breaches at Arizona Medical Center Makes Case for Zero Trust Security

    By
    Fahmida Y. Rashid
    -
    January 14, 2011
    Share
    Facebook
    Twitter
    Linkedin

      Two recent incidents at a hospital and a radiology lab highlight the importance of securing medical data from both internal and external threats.

      Three employees and a contracted nurse at Tucson’s University Medical Center were fired for accessing confidential patient records, according to the Arizona Daily Star. Katie Riley, the hospital’s spokesperson, said “We are not aware of any confidential patient information being released publicly.”

      The fired employees had accessed records of some of the victims from the Jan. 8 shooting spree, where 13 were wounded and six killed, according to the Associated Press. Riley did not disclose how many patients were affected by the unauthorized record access of privacy or their identities. Nor would the hospital disclose whether Arizona congresswoman Gabrielle Giffords, recovering from a gunshot wound to the head, was part of the breach or what kind of information was accessed.

      All patients and their family have been notified, according to Riley.

      In order to ensure patient privacy, UMC uses “sophisticated technology” to prevent and detect inappropriate access, Riley said.

      However, the “fundamental issue” was that in most organizations, “trust is granted to staff, allowing them access to massive amounts of an organization’s most sensitive data,” Glenn Hazard, Xceedium CEO, told eWEEK in an e-mail. Mobile and cloud computing also “pave the way” for these trusted individuals to transfer and share breached data with others, Hazard said.

      Malicious (intentionally or unintentionally) insiders are often in positions of trust and it’s not always clear what activities are trusted. The best chance of catching people intent on accessing confidential information is to “enforce zero-trust access control,” Hazard said.

      In a zero-trust environment, only the exact information the user needs is revealed and nothing else.. Instead of giving layers of access, where some people have higher levels of trust than others and only anomalies are tracked, zero-trust access control means all network traffic is logged and analyzed.

      Organizations should protect their data internally much in the same way they protect the data from external threats. Organizations can no longer “extend that level of trust” to insiders when it comes to “powerful” information, such as electronic medical records, said Hazard.

      External data threats can also come from many directions, whether it’s someone trying to gain access to identity information or a group trying to use system resources. In November, a group of gaming enthusiasts hacked into a server storing sensitive medical information for more than 230,000 patients, said Seacoast Radiology, a practice based in New Hampshire. The hackers were using the server tohost the “Call of Duty: Black Ops” computer game, according to Seacoast Radiology. The patients were notified since the servers contained names, social security numbers, medical diagnosis codes and other details.

      The breach was discovered after an administratator noticed “a loss of bandwidth,” said Lisa MacKenzie, a spokeswoman for ID Experts, a security firm brought in by Seacoast Radiology to look into the breach. Investigators don’t believe the hackers accessed any patient information, but the incident is still under investigation.

      The network vulnerability that made the compromise possible has been discovered and fixed and the data breach was reported to New Hampshire’s attorney general, as required under state law. It is unclear how long the players had been abusing the server.

      These incidents demonstrate that security must be “ubiquitous” throughout the network, not just at the perimeter, according to John Kindervag of Forrester Research.

      Fahmida Y. Rashid

      MOST POPULAR ARTICLES

      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×