SlideShare a Scribd company logo
1 of 6
Hello Shreya,
Detailed analysis of data breaches that occurred in the
healthcare sector
The instances of data breaches have now been prevalent
because the security networks have some loopholes by which
the intruders’ penetration and accessibility become easier and
efficient. The authors also illustrated in the article the diverse
factors that accelerate data breaching concerning technological
advancement (McLeod & Dolezel, 2018). Apart from the
loopholes in the organizational elements, certain gaps in
business procedure also expose the security threats facilitating
data breaches multiple times. In this scenario, technological
availability is one of the major reasons for occurring data
breaches. The healthcare sector incorporates diverse advanced
technologies to secure their stored patients’ information pieces
concerning technological improvements. Lack of technological
skills leads to human errors from where data breaches have
become more general, reflecting the severity of the attack i n the
healthcare sector that is articulated in the article. Accordingly,
employees’ unawareness about the information systems also
leads to data breaches. Due to their lack of concern, the
specifications in the security applications have not been
processed, ultimately leading to the massive failure in securing
the patients’ data.
Reasons of causing those problems
Data breaches that occurred in the healthcare sector
might be caused by insisting on diverse factors. Human error is
an important factor, proliferating the vulnerable areas within
databases and other information systems multiple times. The
intruders acquire the opportunities to access the databases
compromising massive data. The certain erroneous actions of
employees also lead to massive failure in business procedures,
exposing the severity of data breaches. Accordingly, using weak
passwords in databases containing the patients’ information and
leaving those data unencrypted has also led to severe problems,
facilitating easier data hacking methods. In addition, while the
authority does not patch software periodically, the vulnerability
within the software has been exposed from where the hackers
have acquired the possibility for intrusion and proceeded with
data breaches. Due to technological incapability, sometimes, the
healthcare authority does not regulate data transmissions
actively, leaving the stored data susceptible and actively
enhances the risks of exposure to data breaches. Human errors
always enhance these loopholes multiple folds from where the
severe problems have been facilitated.
Potential solutions against the threat factors
Hello DEEPESH,
Technology in healthcare is providing numerous opportunities
to transform and improve the services such as improving
clinical outcomes, reducing human errors, keeping patient data
up to date for research purposes etc. Information Systems,
Internet of medical things, cloud services have transformed the
healthcare industry digitally. Data has become an important part
for the healthcare industry to provide better services. With the
increase in demand to the technology and reliability on data in
healthcare industry, there is also a spike in the data breaching
instances. As per a report, In the United States 600 healthcare
data breaches has been reported in year 2020 which was the
55% increase than the previous year. These figures depict the
increased impact of cybersecurity and data breaches (Vaidya,
2020).
Health insurance companies are the main victims of data
breaches which exposed the personal data of their customers
including birth dates, place, names, addresses, SSN, and other
important info. Financial data easily become unusable as people
can easily change their debit/credit numbers but in case of
medical data, it is unvindicable and hence become so useful for
cybercriminals. Mostly they target data from pharmaceutical
and biotech intellectual property. In the healthcare industry
everything like health application over phone, insulin pumps are
well networked which leaves unique openings for hackers and
leads to security breaches.
Data in technology plays a crucial role, so the necessary steps
should be taken to prevent it from compromising. Healthcare
industry should follow HIPAA security and privacy rules. Apart
from this, educating healthcare staff about the security measures
is also very necessary. Implementing data usage controls,
encrypting data, giving only necessary access to staff, securing
mobile devices, conducting regular risk assessments, mitigating
connected device risks, logging and monitoring use, restricting
access to data and applications, carefully utilizing off-site data
backup are the other important measures to be practiced (Lord,
2020).
Hello Pritesh,
Discussing the case study in detail
According to Wang & Johnson (2018), the discussion is mainly
on the data breach incident in Equifax. This cyber-attack case
happened in March 2017, where the personal data of millions of
people was stolen from the system of Equifax. Through this
incident, Equifax has faced a lot of financial problems, and the
condition of the people's health also became a great concern for
the company. This case study shows some of the important
information of how the situation has happened in the company
and what things are lacking within the system for which the
attackers get the chance to involve within the system.
Reasons for having this data breach problem
As per the cyber-security experts' report, several security lapses
within the system allow the attackers to enter into the system.
Another reason is an SSL certificate that they used for security
purposes also expired, and for that incoming traffic network
could not be decrypted properly. The attackers get the chance to
involve and encrypt their activities and make some decent
changes within Equifax's server. It is seen that Equifax was
unaware of the suspicious activities, and also they are lack in
this situation's knowledge, and for that reason, this problem has
arisen within the system. Around 143 million customers
suffered from this incident, and this is one of the biggest data
breach incidents that causes a big failure to the company's
reputation, work culture and trust that they gained from the
customers all goes in vain with this incident. The technologies
that have been involved within the company did not work as it
required to be done, and for that, they fail to protect this
personal data of the customers, and this made a big blunder for
the company to manage the situation well.
Potential solutions
As per the discussed situation, it could be said that Equifax
needs to update the SSL certificate procedure first as it the main
equipment of Equifax to protect any unethical or unauthorized
operation done within the
Hello Akif,
Cause of the problem
Data is very vulnerable at the same time, very important
for any organisation. A lot of data is generated in different
organizations. They are also doing a lot to make sure that the
data is protected in the right manner. In healthcare as well, the
concept of data integrity has become a major concern (Pandey et
al., 2020). Data breaches in healthcare can result in a lot of
consequences. Managing the data in healthcare is very critical,
but it is also very difficult to handle them due to composite it
since it is also complex in the hospital and can feel capacity
pressure. The leakage of patient information is very vulnerable.
Due to huge complexity and constant pressure, it becomes very
difficult to handle the data in the right order.
The solution to the problem
The Healthcare sector is one of the vulnerable areas, and thus it
is important to solve the problem, but initially, it is important to
find the issue through which it occurred so that we can go in
finding the right solution to mitigate the risk. One of the areas
is human error, as per which there are various reasons why
humans become an unknown reason for the data breach. Due to
a lack of consciousness or any carelessness of the internal
associate, the problem may take place, and thus it is important
to have detailed information about the same (Chernyshev et al.,
2019). Thus it is very important to have a good policy that
employees of the organisation should follow. The data breach
situation can also be resolved with the help of proper
technological equipment in the company. The new data help fill
the gap between the two ministers; the companies need to keep
updating uses and adopt new approaches that will help better
understand.
It is essential to give the staff in the organisation a proper
understanding of what is to be done if the need use any quick
action can be taken. The restriction must be there concerning
the data and its access so that it will be more secure, and thus
the action and track of people will be kept. It is important to
keep monitoring because the update and all can be properly
taken place with. For the double security aspect, it is beneficial
to always encrypt the data as the data will remain safe even if it
is stolen since then, the attacker will not be able to harm me.
Mobile devices are connected with security and all of those
aspects (Seh et al., 2020). Various risks are also incorporated
with the connected devices, and thus it is important to keep
track of the same. It is also used to mitigate the risk so that it
wouldn't be transferred. It is also a good action to keep doing
the risk assessment since it will be well known what is to be
done in the case of the risk. It is also important to keep the
password, and other protecting elements keep changing since it
blocks the path of the mitigation.
Healthcare Data Breaches: Causes and Solutions

More Related Content

Similar to Healthcare Data Breaches: Causes and Solutions

DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
 
A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...
A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...
A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...YogeshIJTSRD
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docxharrisonhoward80223
 
HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerAmer Nazar
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizationsijtsrd
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTijcisjournal
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTijcisjournal
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage DetectionIJERA Editor
 
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docxRunning head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docxsusanschei
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxtodd581
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxglendar3
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxmalbert5
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud SolutionIRJET Journal
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxArti Parab Academics
 
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docxPOST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docxLacieKlineeb
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHNovell
 

Similar to Healthcare Data Breaches: Causes and Solutions (20)

DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
 
A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...
A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...
A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...
 
Posting 1 Reply required for belowBusiness costs or risks of p.docx
Posting 1  Reply required for belowBusiness costs or risks of p.docxPosting 1  Reply required for belowBusiness costs or risks of p.docx
Posting 1 Reply required for belowBusiness costs or risks of p.docx
 
HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_Amer
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizations
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
 
A Survey On Data Leakage Detection
A Survey On Data Leakage DetectionA Survey On Data Leakage Detection
A Survey On Data Leakage Detection
 
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docxRunning head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
 
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docxRunning head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
Essay On It Security
Essay On It SecurityEssay On It Security
Essay On It Security
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docxPOST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
POST EACH DISCUSSION SEPARATELYThe way patient data is harvested.docx
 
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECHInformation Security & Compliance in Healthcare: Beyond HIPAA and HITECH
Information Security & Compliance in Healthcare: Beyond HIPAA and HITECH
 

More from SusanaFurman449

Please read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docxPlease read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docxSusanaFurman449
 
PLEASE read the question carefully.  The creation of teen ido.docx
PLEASE read the question carefully.  The creation of teen ido.docxPLEASE read the question carefully.  The creation of teen ido.docx
PLEASE read the question carefully.  The creation of teen ido.docxSusanaFurman449
 
Please reflect on the relationship between faith, personal disciplin.docx
Please reflect on the relationship between faith, personal disciplin.docxPlease reflect on the relationship between faith, personal disciplin.docx
Please reflect on the relationship between faith, personal disciplin.docxSusanaFurman449
 
Please read the following questions and answer the questions.docx
Please read the following questions and answer the questions.docxPlease read the following questions and answer the questions.docx
Please read the following questions and answer the questions.docxSusanaFurman449
 
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docxPRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docxSusanaFurman449
 
Must Be a hip-hop concert!!!!attend a .docx
Must Be a             hip-hop concert!!!!attend a           .docxMust Be a             hip-hop concert!!!!attend a           .docx
Must Be a hip-hop concert!!!!attend a .docxSusanaFurman449
 
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docxMini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docxSusanaFurman449
 
Please write these 2 assignments in first person.docx
Please write these 2 assignments in                 first person.docxPlease write these 2 assignments in                 first person.docx
Please write these 2 assignments in first person.docxSusanaFurman449
 
Personal Leadership Training plan AttributesColumbia South.docx
Personal Leadership Training plan  AttributesColumbia South.docxPersonal Leadership Training plan  AttributesColumbia South.docx
Personal Leadership Training plan AttributesColumbia South.docxSusanaFurman449
 
Need help on researching why women join gangs1.How does anxi.docx
Need help on researching why women join gangs1.How does anxi.docxNeed help on researching why women join gangs1.How does anxi.docx
Need help on researching why women join gangs1.How does anxi.docxSusanaFurman449
 
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docxJung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docxSusanaFurman449
 
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docxJournal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docxSusanaFurman449
 
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docxLDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docxSusanaFurman449
 
In this paper, you will select an ethics issue from among the topics.docx
In this paper, you will select an ethics issue from among the topics.docxIn this paper, you will select an ethics issue from among the topics.docx
In this paper, you will select an ethics issue from among the topics.docxSusanaFurman449
 
In the past few weeks, you practiced observation skills by watchin.docx
In the past few weeks, you practiced observation skills by watchin.docxIn the past few weeks, you practiced observation skills by watchin.docx
In the past few weeks, you practiced observation skills by watchin.docxSusanaFurman449
 
Overview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docxOverview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docxSusanaFurman449
 
Judicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docxJudicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docxSusanaFurman449
 
IntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docxIntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docxSusanaFurman449
 
In studying Social Problems, sociologists (and historians) identify .docx
In studying Social Problems, sociologists (and historians) identify .docxIn studying Social Problems, sociologists (and historians) identify .docx
In studying Social Problems, sociologists (and historians) identify .docxSusanaFurman449
 
I need help correcting an integrative review.This was the profes.docx
I need help correcting an integrative review.This was the profes.docxI need help correcting an integrative review.This was the profes.docx
I need help correcting an integrative review.This was the profes.docxSusanaFurman449
 

More from SusanaFurman449 (20)

Please read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docxPlease read the description of the Religion ethnography carefully an.docx
Please read the description of the Religion ethnography carefully an.docx
 
PLEASE read the question carefully.  The creation of teen ido.docx
PLEASE read the question carefully.  The creation of teen ido.docxPLEASE read the question carefully.  The creation of teen ido.docx
PLEASE read the question carefully.  The creation of teen ido.docx
 
Please reflect on the relationship between faith, personal disciplin.docx
Please reflect on the relationship between faith, personal disciplin.docxPlease reflect on the relationship between faith, personal disciplin.docx
Please reflect on the relationship between faith, personal disciplin.docx
 
Please read the following questions and answer the questions.docx
Please read the following questions and answer the questions.docxPlease read the following questions and answer the questions.docx
Please read the following questions and answer the questions.docx
 
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docxPRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
 
Must Be a hip-hop concert!!!!attend a .docx
Must Be a             hip-hop concert!!!!attend a           .docxMust Be a             hip-hop concert!!!!attend a           .docx
Must Be a hip-hop concert!!!!attend a .docx
 
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docxMini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
 
Please write these 2 assignments in first person.docx
Please write these 2 assignments in                 first person.docxPlease write these 2 assignments in                 first person.docx
Please write these 2 assignments in first person.docx
 
Personal Leadership Training plan AttributesColumbia South.docx
Personal Leadership Training plan  AttributesColumbia South.docxPersonal Leadership Training plan  AttributesColumbia South.docx
Personal Leadership Training plan AttributesColumbia South.docx
 
Need help on researching why women join gangs1.How does anxi.docx
Need help on researching why women join gangs1.How does anxi.docxNeed help on researching why women join gangs1.How does anxi.docx
Need help on researching why women join gangs1.How does anxi.docx
 
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docxJung Typology AssessmentThe purpose of this assignment is to ass.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
 
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docxJournal of Organizational Behavior J. Organiz. Behav. 31, .docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
 
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docxLDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
 
In this paper, you will select an ethics issue from among the topics.docx
In this paper, you will select an ethics issue from among the topics.docxIn this paper, you will select an ethics issue from among the topics.docx
In this paper, you will select an ethics issue from among the topics.docx
 
In the past few weeks, you practiced observation skills by watchin.docx
In the past few weeks, you practiced observation skills by watchin.docxIn the past few weeks, you practiced observation skills by watchin.docx
In the past few weeks, you practiced observation skills by watchin.docx
 
Overview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docxOverview After analyzing your public health issue in Milestone On.docx
Overview After analyzing your public health issue in Milestone On.docx
 
Judicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docxJudicial OpinionsOverview After the simulation, justices writ.docx
Judicial OpinionsOverview After the simulation, justices writ.docx
 
IntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docxIntroductionReview the Vila Health scenario and complete the int.docx
IntroductionReview the Vila Health scenario and complete the int.docx
 
In studying Social Problems, sociologists (and historians) identify .docx
In studying Social Problems, sociologists (and historians) identify .docxIn studying Social Problems, sociologists (and historians) identify .docx
In studying Social Problems, sociologists (and historians) identify .docx
 
I need help correcting an integrative review.This was the profes.docx
I need help correcting an integrative review.This was the profes.docxI need help correcting an integrative review.This was the profes.docx
I need help correcting an integrative review.This was the profes.docx
 

Recently uploaded

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

Healthcare Data Breaches: Causes and Solutions

  • 1. Hello Shreya, Detailed analysis of data breaches that occurred in the healthcare sector The instances of data breaches have now been prevalent because the security networks have some loopholes by which the intruders’ penetration and accessibility become easier and efficient. The authors also illustrated in the article the diverse factors that accelerate data breaching concerning technological advancement (McLeod & Dolezel, 2018). Apart from the loopholes in the organizational elements, certain gaps in business procedure also expose the security threats facilitating data breaches multiple times. In this scenario, technological availability is one of the major reasons for occurring data breaches. The healthcare sector incorporates diverse advanced technologies to secure their stored patients’ information pieces concerning technological improvements. Lack of technological skills leads to human errors from where data breaches have become more general, reflecting the severity of the attack i n the healthcare sector that is articulated in the article. Accordingly, employees’ unawareness about the information systems also leads to data breaches. Due to their lack of concern, the specifications in the security applications have not been processed, ultimately leading to the massive failure in securing the patients’ data. Reasons of causing those problems Data breaches that occurred in the healthcare sector might be caused by insisting on diverse factors. Human error is an important factor, proliferating the vulnerable areas within databases and other information systems multiple times. The intruders acquire the opportunities to access the databases compromising massive data. The certain erroneous actions of employees also lead to massive failure in business procedures, exposing the severity of data breaches. Accordingly, using weak passwords in databases containing the patients’ information and
  • 2. leaving those data unencrypted has also led to severe problems, facilitating easier data hacking methods. In addition, while the authority does not patch software periodically, the vulnerability within the software has been exposed from where the hackers have acquired the possibility for intrusion and proceeded with data breaches. Due to technological incapability, sometimes, the healthcare authority does not regulate data transmissions actively, leaving the stored data susceptible and actively enhances the risks of exposure to data breaches. Human errors always enhance these loopholes multiple folds from where the severe problems have been facilitated. Potential solutions against the threat factors Hello DEEPESH, Technology in healthcare is providing numerous opportunities to transform and improve the services such as improving clinical outcomes, reducing human errors, keeping patient data up to date for research purposes etc. Information Systems, Internet of medical things, cloud services have transformed the healthcare industry digitally. Data has become an important part for the healthcare industry to provide better services. With the increase in demand to the technology and reliability on data in healthcare industry, there is also a spike in the data breaching instances. As per a report, In the United States 600 healthcare data breaches has been reported in year 2020 which was the 55% increase than the previous year. These figures depict the increased impact of cybersecurity and data breaches (Vaidya, 2020). Health insurance companies are the main victims of data breaches which exposed the personal data of their customers including birth dates, place, names, addresses, SSN, and other important info. Financial data easily become unusable as people can easily change their debit/credit numbers but in case of medical data, it is unvindicable and hence become so useful for cybercriminals. Mostly they target data from pharmaceutical
  • 3. and biotech intellectual property. In the healthcare industry everything like health application over phone, insulin pumps are well networked which leaves unique openings for hackers and leads to security breaches. Data in technology plays a crucial role, so the necessary steps should be taken to prevent it from compromising. Healthcare industry should follow HIPAA security and privacy rules. Apart from this, educating healthcare staff about the security measures is also very necessary. Implementing data usage controls, encrypting data, giving only necessary access to staff, securing mobile devices, conducting regular risk assessments, mitigating connected device risks, logging and monitoring use, restricting access to data and applications, carefully utilizing off-site data backup are the other important measures to be practiced (Lord, 2020). Hello Pritesh, Discussing the case study in detail According to Wang & Johnson (2018), the discussion is mainly on the data breach incident in Equifax. This cyber-attack case happened in March 2017, where the personal data of millions of people was stolen from the system of Equifax. Through this incident, Equifax has faced a lot of financial problems, and the condition of the people's health also became a great concern for the company. This case study shows some of the important information of how the situation has happened in the company and what things are lacking within the system for which the attackers get the chance to involve within the system. Reasons for having this data breach problem As per the cyber-security experts' report, several security lapses within the system allow the attackers to enter into the system. Another reason is an SSL certificate that they used for security purposes also expired, and for that incoming traffic network could not be decrypted properly. The attackers get the chance to involve and encrypt their activities and make some decent
  • 4. changes within Equifax's server. It is seen that Equifax was unaware of the suspicious activities, and also they are lack in this situation's knowledge, and for that reason, this problem has arisen within the system. Around 143 million customers suffered from this incident, and this is one of the biggest data breach incidents that causes a big failure to the company's reputation, work culture and trust that they gained from the customers all goes in vain with this incident. The technologies that have been involved within the company did not work as it required to be done, and for that, they fail to protect this personal data of the customers, and this made a big blunder for the company to manage the situation well. Potential solutions As per the discussed situation, it could be said that Equifax needs to update the SSL certificate procedure first as it the main equipment of Equifax to protect any unethical or unauthorized operation done within the Hello Akif, Cause of the problem Data is very vulnerable at the same time, very important for any organisation. A lot of data is generated in different organizations. They are also doing a lot to make sure that the data is protected in the right manner. In healthcare as well, the concept of data integrity has become a major concern (Pandey et al., 2020). Data breaches in healthcare can result in a lot of consequences. Managing the data in healthcare is very critical, but it is also very difficult to handle them due to composite it since it is also complex in the hospital and can feel capacity pressure. The leakage of patient information is very vulnerable. Due to huge complexity and constant pressure, it becomes very difficult to handle the data in the right order. The solution to the problem
  • 5. The Healthcare sector is one of the vulnerable areas, and thus it is important to solve the problem, but initially, it is important to find the issue through which it occurred so that we can go in finding the right solution to mitigate the risk. One of the areas is human error, as per which there are various reasons why humans become an unknown reason for the data breach. Due to a lack of consciousness or any carelessness of the internal associate, the problem may take place, and thus it is important to have detailed information about the same (Chernyshev et al., 2019). Thus it is very important to have a good policy that employees of the organisation should follow. The data breach situation can also be resolved with the help of proper technological equipment in the company. The new data help fill the gap between the two ministers; the companies need to keep updating uses and adopt new approaches that will help better understand. It is essential to give the staff in the organisation a proper understanding of what is to be done if the need use any quick action can be taken. The restriction must be there concerning the data and its access so that it will be more secure, and thus the action and track of people will be kept. It is important to keep monitoring because the update and all can be properly taken place with. For the double security aspect, it is beneficial to always encrypt the data as the data will remain safe even if it is stolen since then, the attacker will not be able to harm me. Mobile devices are connected with security and all of those aspects (Seh et al., 2020). Various risks are also incorporated with the connected devices, and thus it is important to keep track of the same. It is also used to mitigate the risk so that it wouldn't be transferred. It is also a good action to keep doing the risk assessment since it will be well known what is to be done in the case of the risk. It is also important to keep the password, and other protecting elements keep changing since it blocks the path of the mitigation.