x
Limited Time Offer: Save up to 20% on a new CIS SecureSuite Membership | Learn more
×
Why CIS Solutions Join CIS Resources
CIS WorkBench Sign-in CIS WorkBench Sign In CIS Hardened Images CIS Hardened Images Support CIS Support


Why CIS

Who We Are

CIS is an independent, nonprofit organization with a mission to create confidence in the connected world



About Us Leadership Principles Testimonials

Solutions

secure your organization
Secure Your Organization


secure specific platforms
Secure Specific Platforms


cis securesuite CIS SecureSuite® Learn More      Apply Now  
u s state local tribal and territorial governments
U.S. State, Local, Tribal & Territorial Governments


View All Products & Services  

Join CIS

Get Involved

Join CIS as a member, partner, or volunteer - or explore our career opportunities



CIS SecureSuite® Membership Multi-State ISAC (MS-ISAC®) Elections Infrastructure ISAC (EI-ISAC®) CIS CyberMarket® Vendors CIS Communities Careers

Resources

resources
Resources


learn
Learn


filter by topic
Filter by Topic


View All Resources  
CIS Logo Show Search Expand Menu

Data Breaches: In the Healthcare Sector

It seems that every day another hospital is in the news as the victim of a data breach. The routine is familiar - individuals receive notification by email of the breach, paired reassuringly with two free years of credit and identity monitoring. (One might wonder - Is there anyone left who isn’t being monitored?)

According to the Ponemon Institute and Verizon Data Breach Investigations Report, the health industry experiences more data breaches than any other sector. Although, there may be some potential for bias in this claim, due to the well-defined, legally mandated reporting requirements of the Health Insurance Portability and Accountability Act (HIPPA). The Act makes it more likely healthcare breaches will be reported compared to breaches in other sectors.

Causes of Healthcare Sector Breaches

Breaches are widely observed in the healthcare sector. These can be caused by many different types of incidents, including credential-stealing malware, an insider who either purposefully or accidentally discloses patient data, or lost laptops or other devices.

Personal Health Information (PHI) is more valuable on the black market than credit card credentials or regular Personally Identifiable Information (PII). Therefore, there is a higher incentive for cyber criminals to target medical databases. They can sell the PHI and/or use it for their own personal gain. At the time of this writing, over 15 million health records have been compromised by data breaches, according to the health and human services breach report.

Why is PHI More Valuable than PII?

The average cost of a data breach incurred by a non-healthcare related agency, per stolen record, is $158. For healthcare agencies the cost is an average of $355. Credit card information and PII sell for $1-$2 on the black market, but PHI can sell for as much as $363 according to the Infosec Institute. This is because one’s personal health history, including ailments, illnesses, surgeries, etc., can’t be changed, unlike credit card information or Social Security Numbers.

PHI is valuable because criminals can use it to target victims with frauds and scams that take advantage of the victim’s medical conditions or victim settlements. It can also be used to create fake insurance claims, allowing for the purchase and resale of medical equipment. Some criminals use PHI to illegally gain access to prescriptions for their own use or resale.

Alternate Analysis: A recent report by McAfee Labs contests the claim that PHI is more valuable, arguing that the lucrativeness of credit card data is more important that the longevity of PHI. The report still acknowledges there is a strong market for PHI.

What Laws are in Place to Protect PHI?

The Federal HIPAA Security Rule requires health service providers to protect electronic health records (EHR) using proper physical and electronic safeguards to ensure the safety of health information. Breaches of over 500 records, whether due to a hacking incident, accidental disclosure, lost or stolen devices, or unauthorized internal access, must be reported. As of July, this also includes ransomware infections.

Recommendations

Proper application security and network security are important to prevent a compromise from happening in the first place. Encryption is the best way to protect patient data from being accessed once someone has found their way onto healthcare systems.

It is important that encryption is implemented both at rest and in transit, and that third parties and vendors that have access to healthcare networks or databases are also properly handling patient data. Training on proper usage and handling of PHI is recommended to reduce data breaches caused by employee error, such as a lost device or accidental disclosure.

U.S. hospitals can get access to Malicious Domain Blocking and Reporting (MDBR) to help defend against data breaches at no cost.