Health Industry Needs Urgent Cyber Surgery

SHORT-TERM-HEALTH-INSURANCE-resized.png

Cyber hackers have taken their vitamins and are aiming at the healthcare sector in 2015. Anthem recently reported a breach where hackers accessed close to 80 million records (roughly 25% of Americans). Now we are learning the details of the recent Premera Blue Cross hack in which 11 million patients’ data has been compromised. 
This hack is especially alarming in that the hackers gained access to insurance claim data, banking account numbers, clinical information, and even valuable diagnostic codes. Social Security Numbers, birth dates, and other patient identifiers were also compromised. The attack reportedly began back in May of 2014 and is the worst breach to date involving patient medical information. Even though the Anthem hack had a much larger number of medical records compromised, the hackers did not gain access to medical information as with the Premera hack, which was only uncovered recently on Jan. 29, 2015
You might wonder why are hackers so interested in medical records?
If you lurk around in the dark Web, you will quickly learn medical records are highly valuable and often used for insurance fraud scams, which is extremely lucrative. There are so many stolen credit cards available for purchase in the dark Web, and are currently selling for about one dollar per card. Contrast this with the average stolen health credentials fetching up to ten times that and you quickly see the value to cyber thieves and hackers.
What is in a typical medical record that the cyber thieves want?
First, there are great details about an individual’s life—details that some people will not share on social networks. Once a hacker has captured this compromised information, they may effectively use it to access a victim’s bank account information, modify and file a tax return, or even apply for a loan in their name. Hackers often will use medical policy numbers to file false medical claims and attempt to collect a payout and utilize the diagnostic codes. Some of these hackers will even access prescriptions for painkillers to sell illegally. When hackers have detailed family member names, addresses, and birthdays, they can easily socially engineer a situation in which they sound credible. Having access to medical data also allows for effective targeted email phishing attacks where convincing attachments lure unsuspecting individuals to click and reveal further data such as usernames and passwords.
Hackers are lazy and opt for the easy targets.
The credit card companies have invested heavily into advanced fraud detection because of so many compromised credit cards in 2014. Consumers are also beginning to learn the importance and being trained to regularly check their credit card statements for any suspicious activity. The healthcare industry continues to concentrate on patients’ health and not on patients’ security. Security will have to become another metric of healthcare in order for patients to choose providers, make informed decisions and most importantly, keep their medical information secure and private.
What can you do to protect your medical data?
Don’t provide your social security number on the forms at the doctor’s office and hospital. Just leave it Blank. If they insist on you providing your SS#, you can find another doctor or hospital or Only put down the last four digits. Often they claim it is required, but this is not the case as the doctors and hospitals only want your SS# in the event you do not pay your bill and the SS# makes debt collection easier. Medicare and your health insurance company do require your Social Security number S#. If they ask for your driver’s license for ID, give them another form of photo ID with less detailed information on it if they insist.
Remember next time you are asked for more information at the doctor’s office, be careful what you provide as you may be aiding in a cyber hacker’s car payment.
Connected World:  http://bit.ly/1GHhR4W

« Instilling a Culture of Cyber Security
Dark Web Drug Dealers Specialised in ‘party packs’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

SABSACourses

SABSACourses

SABSA is a development process used for solving complex problems such as IT Operations, Risk Management, Compliance & Audit functions.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

Ikerlan

Ikerlan

Ikerlan is an R&D technology centre specialising in areas including embedded systems, industrial automation and industrial cybersecurity.

Electric Imp

Electric Imp

Electric Imp offers an innovative and powerful Internet of Things platform that securely connects devices with advanced cloud computing resources.

OnSystem Logic

OnSystem Logic

OnSystem Logic has developed a unique, patent-pending solution to solve the problem of the exploitation of flaws in application software as a technique for cyber attacks.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

Dualog

Dualog

Dualog provides a maritime digital platform which ensures that services work reliably and securely onboard.

Liongard

Liongard

Liongard automates the management and protection of modern IT environments at scale for IT MSPs - Managed Service Providers and Enterprise IT Operations.

Silicon Cloud International

Silicon Cloud International

Silicon Cloud is a high performance and secure cloud computing platform for engineering and scientific applications.

Bechtle

Bechtle

Bechtle is one of Europe’s leading IT service providers offering a blend of direct IT product sales and extensive systems integration services.

Stone Forest IT (SFIT)

Stone Forest IT (SFIT)

Stone Forest IT specialises in providing advisory, implementation and managed services for IT infrastructure, IT security solutions, business applications (ERP and CRM) and business analytical tools.

Kyndryl

Kyndryl

Kyndryl has a comprehensive portfolio that leverages hybrid cloud solutions, business resiliency, and network services to help optimize your IT workloads and transformations.

RevealSecurity

RevealSecurity

RevealSecurity's TrackerIQ detects malicious activities in enterprise applications.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

CUBE3 AI

CUBE3 AI

CUBE3.AI is a web3 security platform that provides real-time transaction protection for smart contracts, safeguarding against cyber exploits, fraud, and compliance risks.