HEALTHCARE BREACHES Andrew Kuebler MIS 534 April 15, 2015.

Slides:



Advertisements
Similar presentations
THE DEPARTMENT OF HEALTH AND HUMAN SERVICES (HHS) OFFICE FOR CIVIL RIGHTS (OCR) ENFORCES THE HIPAA PRIVACY, SECURITY, AND BREACH NOTIFICATION RULES HIPAA.
Advertisements

True Business-Class Remote Online Backup 44% Of All Computer Users Have Reported At Least One Permanent Data Loss Your Business Data IS Your Business –
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Cyber Liability- Risks, Exposures and Risk Transfer for a Data Breach June 11, 2013.
November, 2012 What’s The Rush? Learn Why Now is the Time to Become HIPAA Compliant.
DATA BREACHES IN HEALTHCARE BY CHUCK EASTTOM
Cyber Security and the Global Business Environment Jeremy Schaar:)
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
It’s Time to Upgrade Your Thinking Q1 & Q2 Cyber Breaches Source: Identity Theft Resource Center, 7/2/ breaches with over 8.5 million records.
David A. Brown Chief Information Security Officer State of Ohio
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Washington State Hospital Association Health Information Program The following slides illustrate key findings from 2004 for Washington health plans. The.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
DATA BREACHES IN HEALTHCARE BY CHUCK EASTTOM
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Business Continuity from an Insurance Perspective Presented by Jim Carter Manager, Risk & Insurance.
AUGUST 25, 2015 Cyber Insurance:
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Cyber Security Nevada Businesses Overview June, 2014.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Information Security 2013 Roadshow - PCI. Roadshow Outline  What IS PCI  Why we Care about PCI  What PCI Means to You and Me.
Cyber Security in HealthIT Mark Longworth Independent Security Consultant
2006 Medical Professional Liability Symposium Chicago, Illinois ~ March 14 & 15, 2006 The Impact of Technology on Underwriting Hospital Professional Liability.
Update on Privacy Issues at USU October 10, 2013.
Preparing Your Company for Social Media Challenges 23 rd Annual Corporate Counsel Conference 1 Orrie Dinstein GE Capital Geanne Rosenberg Baruch College.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
A PM’s Guide to Surviving A Data Breach. Compliance: PCI QSA and PCI Gap Analysis FISMA HIPAA SSAE 16 GLBA, Red Flags Response Incident Response and Disaster.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
The Internet of Things(IoT) BY CODEY DISNEY. Objectives  What Is the IOT?  How are corporations at risk? What are the security risks and what can happen.
Information Security: Current Threats Marc Scarborough Information Security Officer
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
HIPAA THE PRIVACY RULE Reviewed December HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti-
Computer Security and the “H” word Glen Klinkhart, CEO Mike Messick, CTO.
BlueCross BlueShield of Tennessee, Inc., an Independent Licensee of the BlueCross BlueShield Association. This document has been classified as public Information.
Proprietary & Confidential 1 Paul Falor, VP of IT, North Highland Friday, May 20th Cyber Security PayCLT.
Risky Business Week Protecting Your Identity: What to Know, What to Do Legal Division CSAA Insurance Group, a AAA Insurer.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Cyber Security Threats Today: What You Need To Know October 21, 2016 Maureen Connolly Risk Manager, Maps Credit Union.
Cyber Insurance Risk Transfer Alternatives
Combating Identity Fraud In A Virtual World
Breaking Down Cyber Liability
Security: Reducing Risk
Healthcare Cybersecurity: State of Industry
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
Continuous monitoring of patients - anytime , anywhere, in hospital and at home Rev B - 12/10/17.
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
How to Protect Yourself from ID Theft and Social Engineering
September 18, 2018.
Today’s Risk. Today’s Solutions. Cyber security and
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Society of Risk Management Consultants Annual Conference
Data Privacy and Breaches
Cyber Trends and Market Update
Millions of T-Mobile customers exposed in Experian breach
The Practical Side of Meaningful Use:
Protecting Your Company’s Most Valuable Asset
Figure 1. Number of Records Breached
Las Positas College Flex Day
Looking to the Future MIS 689 Cyber Warfare Capstone.
Open PHI Institute (OPHII)
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
Presentation transcript:

HEALTHCARE BREACHES Andrew Kuebler MIS 534 April 15, 2015

Outline The Forecast for 2015 Why are EMR’s & PHI Being Targeted? How are Hackers Succeeding? Top 10 Healthcare Breaches 3 rd - TRICARE 2 nd – Premera BCBS 1 st – Anthem BCBS Conclusion

The Forecast “2015 is already the year of the health-care hack — and it’s only going to get worse.” -The Washington Post, March 2015 “Healthcare to be 'plagued' by data breaches in 2015.” -Healthcare IT News, December 2014 “MEDICAL DATA HAS BECOME THE NEXT CYBERSECURITY TARGET” -NextGov, March 2015

Why are EMR’s & PHI Being Targeted?

How are Hackers Succeeding? “81% had a root cause in employee negligence. The most common issue was the loss of administrative credentials – user name and password – but also included lost media, firewall left open, lost laptop etc.” -Michael Bruemmer, VP of Consumer Protection at Experian “Employees and negligence are the leading cause of security incidents but remain the least reported issue.” -Experian’s 2015 Second Annual Data Breach Industry Forecast

Top 10 Healthcare Breaches 1. Anthem Inc., 80 Million Records 2. Premera Blue Cross,11 Million Records 3. TRICARE Management Activity, 4.9 Million Records 4. Community Health Systems, 4.5 Million Records 5. Advocate Health Care, 4.03 Million Records 6. Health Net Inc., 1.9 Million Records 7. New York City Health & Hospitals Corporation's North Bronx Healthcare Network, 1.7 Million Records 8. Montana Dept. of Public Health and Human Services, 1.3 Million Records 9. AvMed Inc., 1.22 Million Records 10. The Nemours Foundation, 1.06 Million Records

TRICARE Management Activity 4.9 Million Records WHO: TRICARE, a provider of health benefits for the military, military retirees, and dependents WHEN: September 14, 2011 HOW: Loss of backup tapes RESOLUTION: Free credit monitoring through FTC, Incident Response Call Center

Premera BCBS Premera BCBS 11 Million Records WHO: Premera, a BCBS Health Insurance Company WHEN: May 5, 2014 HOW: A “sophisticated cyber attack” RESOLUTION: Two years of free credit monitoring and identity theft protection, call center Premera Update

Anthem BCBS Anthem BCBS 80 Million Records WHO: Anthem, a BCBS Health Insurance Company WHEN: December 2014 HOW: A cyber attack that involved breaking in to servers RESOLUTION: Two years of free credit monitoring and identity theft protection, call center Anthem Update

Conclusion Predictions of healthcare breaches are making headlines for 2015 EMRs & PHI contain a valuable plethora of information that hackers can use for identity theft The number one cause of breaches: HUMAN ERROR The top three breaches of all time: TRICARE, 4.9 Million Records Premera BCBS, 11 Million Records Anthem BCBS, 80 Million Records

References and-its-only-going-to-get-worse/ and-its-only-going-to-get-worse/ software-systems/d/d-id/ ? software-systems/d/d-id/ ?