Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Health Care Point-of-Sale Breaches a Rising Concern: Verizon

    Written by

    Brian T. Horowitz
    Published April 24, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Financially motivated cyber-crime was a key part of 75 percent of the incidents in Verizon’s 2013 Data Breach Investigations Report (DBIR), released on April 23.

      Health care organizations are in danger of these types of breaches for copayment and credit card transactions, according to Suzanne Widup, senior analyst on the Verizon Risk Team and an author of the report.

      The study found that 37 percent of the security breaches occurred in financial organizations and retail environments while restaurants suffered 24 percent of the incidents.

      “We find that the health care breaches act a lot like retail breaches in as much as that it’s the organized crime groups going after the payment chain, so they’re looking for the credit cards and the Social Security numbers they can turn into money,” Widup told eWEEK.

      Hackers in health care are more interested in attacking payment point-of-sale systems than actual electronic health records (EHRs), according to Widup. “The health care area is very used to the patient-privacy aspect of securing the data and may not be paying too much attention to their payment systems,” she said.

      In addition to payments for care, security breaches also involve transactions at hospital gift shops and cafeterias, she noted.

      Despite an interest by cyber-criminals in payment systems, patient data is still at risk, Widup said.

      “The risk is … they still may go after patient data, so there still could be a reportable breach in that data type even though that may not have been the initial data interest to the people coming in to steal it,” she said.

      “Most cyber-criminals are more interested in accessing your bank account and applying for loans in your name than they are the details of your last medical exam,” Verizon stated in its October 2012 report on how cyber-threats affect health care and other verticals.

      With the final omnibus rule for the Health Insurance Portability and Accountability Act (HIPAA) requiring risk assessments, health care organizations need to determine their level of preparation for financial attacks, Widup suggested.

      “You need to look at where your own risk is and know your attacker,” Widup said. If organizations such as health systems are vulnerable to attackers with financial motivation, then they need to strengthen their defenses for payment and billing systems, she added.

      Logging systems are also a key tool for warding off financial attackers, Widup noted.

      Health care organizations need to “make sure they’re paying attention to what those logs are saying so that if there’s evidence of something that’s going on, they can act on it quickly,” she said.

      Organizations should have adequate logging systems so they can piece together the circumstances of incidents quickly, Widup said.

      Staying current with software vendor patches is also important to avoid cyber-crimes in health care and other industries. “If you’ve applied the vendor patch, then you’re no longer vulnerable,” according to Widup.

      In an October snapshot of verticals, Verizon noted that health care breaches mainly affected smaller practices and were part of insurance fraud schemes.

      POS terminals accounted for 64 percent of compromised health care assets compared with 38 percent of desktops or workstations, Verizon reported in October.

      To guard against POS attacks, health care organizations should change their administrative passwords on POS systems often. In addition, avoid using POS systems to browse the Web, Verizon reported in its health care snapshot.

      A provider’s POS application should be compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), Verizon said.

      Brian T. Horowitz
      Brian T. Horowitz
      Brian T. Horowitz is a technology and health writer as well as a copy editor. Brian has worked on the tech beat since 1996 and covered health care IT and rugged mobile computing for eWEEK since 2010. He has contributed to more than 20 publications, including Computer Shopper, Fast Company, FOXNews.com, More, NYSE Magazine, Parents, ScientificAmerican.com, USA Weekend and Womansday.com, as well as other consumer and trade publications.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.