SlideShare a Scribd company logo
Hello Shreya,
Detailed analysis of data breaches that occurred in the
healthcare sector
The instances of data breaches have now been prevalent
because the security networks have some loopholes by which
the intruders’ penetration and accessibility become easier and
efficient. The authors also illustrated in the article the diverse
factors that accelerate data breaching concerning technological
advancement (McLeod & Dolezel, 2018). Apart from the
loopholes in the organizational elements, certain gaps in
business procedure also expose the security threats facilitating
data breaches multiple times. In this scenario, technological
availability is one of the major reasons for occurring data
breaches. The healthcare sector incorporates diverse advanced
technologies to secure their stored patients’ information pieces
concerning technological improvements. Lack of technological
skills leads to human errors from where data breaches have
become more general, reflecting the severity of the attack i n the
healthcare sector that is articulated in the article. Accordingly,
employees’ unawareness about the information systems also
leads to data breaches. Due to their lack of concern, the
specifications in the security applications have not been
processed, ultimately leading to the massive failure in securing
the patients’ data.
Reasons of causing those problems
Data breaches that occurred in the healthcare sector
might be caused by insisting on diverse factors. Human error is
an important factor, proliferating the vulnerable areas within
databases and other information systems multiple times. The
intruders acquire the opportunities to access the databases
compromising massive data. The certain erroneous actions of
employees also lead to massive failure in business procedures,
exposing the severity of data breaches. Accordingly, using weak
passwords in databases containing the patients’ information and
leaving those data unencrypted has also led to severe problems,
facilitating easier data hacking methods. In addition, while the
authority does not patch software periodically, the vulnerability
within the software has been exposed from where the hackers
have acquired the possibility for intrusion and proceeded with
data breaches. Due to technological incapability, sometimes, the
healthcare authority does not regulate data transmissions
actively, leaving the stored data susceptible and actively
enhances the risks of exposure to data breaches. Human errors
always enhance these loopholes multiple folds from where the
severe problems have been facilitated.
Potential solutions against the threat factors
Hello DEEPESH,
Technology in healthcare is providing numerous opportunities
to transform and improve the services such as improving
clinical outcomes, reducing human errors, keeping patient data
up to date for research purposes etc. Information Systems,
Internet of medical things, cloud services have transformed the
healthcare industry digitally. Data has become an important part
for the healthcare industry to provide better services. With the
increase in demand to the technology and reliability on data in
healthcare industry, there is also a spike in the data breaching
instances. As per a report, In the United States 600 healthcare
data breaches has been reported in year 2020 which was the
55% increase than the previous year. These figures depict the
increased impact of cybersecurity and data breaches (Vaidya,
2020).
Health insurance companies are the main victims of data
breaches which exposed the personal data of their customers
including birth dates, place, names, addresses, SSN, and other
important info. Financial data easily become unusable as people
can easily change their debit/credit numbers but in case of
medical data, it is unvindicable and hence become so useful for
cybercriminals. Mostly they target data from pharmaceutical
and biotech intellectual property. In the healthcare industry
everything like health application over phone, insulin pumps are
well networked which leaves unique openings for hackers and
leads to security breaches.
Data in technology plays a crucial role, so the necessary steps
should be taken to prevent it from compromising. Healthcare
industry should follow HIPAA security and privacy rules. Apart
from this, educating healthcare staff about the security measures
is also very necessary. Implementing data usage controls,
encrypting data, giving only necessary access to staff, securing
mobile devices, conducting regular risk assessments, mitigating
connected device risks, logging and monitoring use, restricting
access to data and applications, carefully utilizing off-site data
backup are the other important measures to be practiced (Lord,
2020).
Hello Pritesh,
Discussing the case study in detail
According to Wang & Johnson (2018), the discussion is mainly
on the data breach incident in Equifax. This cyber-attack case
happened in March 2017, where the personal data of millions of
people was stolen from the system of Equifax. Through this
incident, Equifax has faced a lot of financial problems, and the
condition of the people's health also became a great concern for
the company. This case study shows some of the important
information of how the situation has happened in the company
and what things are lacking within the system for which the
attackers get the chance to involve within the system.
Reasons for having this data breach problem
As per the cyber-security experts' report, several security lapses
within the system allow the attackers to enter into the system.
Another reason is an SSL certificate that they used for security
purposes also expired, and for that incoming traffic network
could not be decrypted properly. The attackers get the chance to
involve and encrypt their activities and make some decent
changes within Equifax's server. It is seen that Equifax was
unaware of the suspicious activities, and also they are lack in
this situation's knowledge, and for that reason, this problem has
arisen within the system. Around 143 million customers
suffered from this incident, and this is one of the biggest data
breach incidents that causes a big failure to the company's
reputation, work culture and trust that they gained from the
customers all goes in vain with this incident. The technologies
that have been involved within the company did not work as it
required to be done, and for that, they fail to protect this
personal data of the customers, and this made a big blunder for
the company to manage the situation well.
Potential solutions
As per the discussed situation, it could be said that Equifax
needs to update the SSL certificate procedure first as it the main
equipment of Equifax to protect any unethical or unauthorized
operation done within the
Hello Akif,
Cause of the problem
Data is very vulnerable at the same time, very important
for any organisation. A lot of data is generated in different
organizations. They are also doing a lot to make sure that the
data is protected in the right manner. In healthcare as well, the
concept of data integrity has become a major concern (Pandey et
al., 2020). Data breaches in healthcare can result in a lot of
consequences. Managing the data in healthcare is very critical,
but it is also very difficult to handle them due to composite it
since it is also complex in the hospital and can feel capacity
pressure. The leakage of patient information is very vulnerable.
Due to huge complexity and constant pressure, it becomes very
difficult to handle the data in the right order.
The solution to the problem
The Healthcare sector is one of the vulnerable areas, and thus it
is important to solve the problem, but initially, it is important to
find the issue through which it occurred so that we can go in
finding the right solution to mitigate the risk. One of the areas
is human error, as per which there are various reasons why
humans become an unknown reason for the data breach. Due to
a lack of consciousness or any carelessness of the internal
associate, the problem may take place, and thus it is important
to have detailed information about the same (Chernyshev et al.,
2019). Thus it is very important to have a good policy that
employees of the organisation should follow. The data breach
situation can also be resolved with the help of proper
technological equipment in the company. The new data help fill
the gap between the two ministers; the companies need to keep
updating uses and adopt new approaches that will help better
understand.
It is essential to give the staff in the organisation a proper
understanding of what is to be done if the need use any quick
action can be taken. The restriction must be there concerning
the data and its access so that it will be more secure, and thus
the action and track of people will be kept. It is important to
keep monitoring because the update and all can be properly
taken place with. For the double security aspect, it is beneficial
to always encrypt the data as the data will remain safe even if it
is stolen since then, the attacker will not be able to harm me.
Mobile devices are connected with security and all of those
aspects (Seh et al., 2020). Various risks are also incorporated
with the connected devices, and thus it is important to keep
track of the same. It is also used to mitigate the risk so that it
wouldn't be transferred. It is also a good action to keep doing
the risk assessment since it will be well known what is to be
done in the case of the risk. It is also important to keep the
password, and other protecting elements keep changing since it
blocks the path of the mitigation.
Hello Shreya,Detailed analysis of data breaches that occurred in

More Related Content

DOCX
Systems Thinking on a National Level, Part 2Drew David.docx
DOCX
Systems AdminstratorAs your systems administrator  person I am.docx
DOCX
Running head Information security threats 1Information secur.docx
PDF
Health Information Technology Implementation Challenges and Responsive Soluti...
PDF
Why healthcare is the biggest target for cyberattacks-converted.pdf
DOCX
Article 1 currently, smartphone, web, and social networking techno
PDF
Cybersecurity Challenges in the Healthcare Industry.pdf
PDF
An Improved Method for Preventing Data Leakage in an Organization
Systems Thinking on a National Level, Part 2Drew David.docx
Systems AdminstratorAs your systems administrator  person I am.docx
Running head Information security threats 1Information secur.docx
Health Information Technology Implementation Challenges and Responsive Soluti...
Why healthcare is the biggest target for cyberattacks-converted.pdf
Article 1 currently, smartphone, web, and social networking techno
Cybersecurity Challenges in the Healthcare Industry.pdf
An Improved Method for Preventing Data Leakage in an Organization

Similar to Hello Shreya,Detailed analysis of data breaches that occurred in (20)

PPTX
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
PDF
A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...
DOCX
Posting 1 Reply required for belowBusiness costs or risks of p.docx
DOCX
HCAD_600_Paper1_Amer
PDF
Dealing with Data Breaches Amidst Changes In Technology
PDF
Electronic Healthcare Record Security and Management in Healthcare Organizations
PDF
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
PDF
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
PDF
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
PDF
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
PDF
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
PDF
A Survey On Data Leakage Detection
DOCX
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
DOCX
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
DOCX
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
DOCX
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
PDF
E-Health Care Cloud Solution
PDF
Harnessing AI for Data Privacy through a Multidimensional Framework
PDF
Harnessing AI for Data Privacy through a Multidimensional Framework
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
A Case Analysis on Involvement of Big Data during Natural Disaster and Pandem...
Posting 1 Reply required for belowBusiness costs or risks of p.docx
HCAD_600_Paper1_Amer
Dealing with Data Breaches Amidst Changes In Technology
Electronic Healthcare Record Security and Management in Healthcare Organizations
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
A Survey On Data Leakage Detection
Running head EFFECTIVENESS OF HEALTH CARE IT SYSTEMS 1EFFE.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Running head ORGANIZATIONAL SECURITY1ORGANIZATIONAL SECURITY.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
E-Health Care Cloud Solution
Harnessing AI for Data Privacy through a Multidimensional Framework
Harnessing AI for Data Privacy through a Multidimensional Framework
Ad

More from SusanaFurman449 (20)

DOCX
Please read the description of the Religion ethnography carefully an.docx
DOCX
PLEASE read the question carefully.  The creation of teen ido.docx
DOCX
Please reflect on the relationship between faith, personal disciplin.docx
DOCX
Please read the following questions and answer the questions.docx
DOCX
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
DOCX
Must Be a hip-hop concert!!!!attend a .docx
DOCX
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
DOCX
Please write these 2 assignments in first person.docx
DOCX
Personal Leadership Training plan AttributesColumbia South.docx
DOCX
Need help on researching why women join gangs1.How does anxi.docx
DOCX
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
DOCX
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
DOCX
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
DOCX
In this paper, you will select an ethics issue from among the topics.docx
DOCX
In the past few weeks, you practiced observation skills by watchin.docx
DOCX
Overview After analyzing your public health issue in Milestone On.docx
DOCX
Judicial OpinionsOverview After the simulation, justices writ.docx
DOCX
IntroductionReview the Vila Health scenario and complete the int.docx
DOCX
In studying Social Problems, sociologists (and historians) identify .docx
DOCX
I need help correcting an integrative review.This was the profes.docx
Please read the description of the Religion ethnography carefully an.docx
PLEASE read the question carefully.  The creation of teen ido.docx
Please reflect on the relationship between faith, personal disciplin.docx
Please read the following questions and answer the questions.docx
PRAISE FOR CRUCIAL CONVERSATIONS Relationships ar.docx
Must Be a hip-hop concert!!!!attend a .docx
Mini-Paper #3 Johnson & Johnson and a Tale of Two Crises - An Eth.docx
Please write these 2 assignments in first person.docx
Personal Leadership Training plan AttributesColumbia South.docx
Need help on researching why women join gangs1.How does anxi.docx
Jung Typology AssessmentThe purpose of this assignment is to ass.docx
Journal of Organizational Behavior J. Organiz. Behav. 31, .docx
LDR535 v4Organizational Change ChartLDR535 v4Page 2 of 2.docx
In this paper, you will select an ethics issue from among the topics.docx
In the past few weeks, you practiced observation skills by watchin.docx
Overview After analyzing your public health issue in Milestone On.docx
Judicial OpinionsOverview After the simulation, justices writ.docx
IntroductionReview the Vila Health scenario and complete the int.docx
In studying Social Problems, sociologists (and historians) identify .docx
I need help correcting an integrative review.This was the profes.docx
Ad

Recently uploaded (20)

PDF
RMMM.pdf make it easy to upload and study
PPTX
Lesson notes of climatology university.
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Trump Administration's workforce development strategy
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Digestion and Absorption of Carbohydrates, Proteina and Fats
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Unit 4 Skeletal System.ppt.pptxopresentatiom
RMMM.pdf make it easy to upload and study
Lesson notes of climatology university.
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Supply Chain Operations Speaking Notes -ICLT Program
Trump Administration's workforce development strategy
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Digestion and Absorption of Carbohydrates, Proteina and Fats
Chinmaya Tiranga quiz Grand Finale.pdf
Final Presentation General Medicine 03-08-2024.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Practical Manual AGRO-233 Principles and Practices of Natural Farming
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Indian roads congress 037 - 2012 Flexible pavement
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Unit 4 Skeletal System.ppt.pptxopresentatiom

Hello Shreya,Detailed analysis of data breaches that occurred in

  • 1. Hello Shreya, Detailed analysis of data breaches that occurred in the healthcare sector The instances of data breaches have now been prevalent because the security networks have some loopholes by which the intruders’ penetration and accessibility become easier and efficient. The authors also illustrated in the article the diverse factors that accelerate data breaching concerning technological advancement (McLeod & Dolezel, 2018). Apart from the loopholes in the organizational elements, certain gaps in business procedure also expose the security threats facilitating data breaches multiple times. In this scenario, technological availability is one of the major reasons for occurring data breaches. The healthcare sector incorporates diverse advanced technologies to secure their stored patients’ information pieces concerning technological improvements. Lack of technological skills leads to human errors from where data breaches have become more general, reflecting the severity of the attack i n the healthcare sector that is articulated in the article. Accordingly, employees’ unawareness about the information systems also leads to data breaches. Due to their lack of concern, the specifications in the security applications have not been processed, ultimately leading to the massive failure in securing the patients’ data. Reasons of causing those problems Data breaches that occurred in the healthcare sector might be caused by insisting on diverse factors. Human error is an important factor, proliferating the vulnerable areas within databases and other information systems multiple times. The intruders acquire the opportunities to access the databases compromising massive data. The certain erroneous actions of employees also lead to massive failure in business procedures, exposing the severity of data breaches. Accordingly, using weak passwords in databases containing the patients’ information and
  • 2. leaving those data unencrypted has also led to severe problems, facilitating easier data hacking methods. In addition, while the authority does not patch software periodically, the vulnerability within the software has been exposed from where the hackers have acquired the possibility for intrusion and proceeded with data breaches. Due to technological incapability, sometimes, the healthcare authority does not regulate data transmissions actively, leaving the stored data susceptible and actively enhances the risks of exposure to data breaches. Human errors always enhance these loopholes multiple folds from where the severe problems have been facilitated. Potential solutions against the threat factors Hello DEEPESH, Technology in healthcare is providing numerous opportunities to transform and improve the services such as improving clinical outcomes, reducing human errors, keeping patient data up to date for research purposes etc. Information Systems, Internet of medical things, cloud services have transformed the healthcare industry digitally. Data has become an important part for the healthcare industry to provide better services. With the increase in demand to the technology and reliability on data in healthcare industry, there is also a spike in the data breaching instances. As per a report, In the United States 600 healthcare data breaches has been reported in year 2020 which was the 55% increase than the previous year. These figures depict the increased impact of cybersecurity and data breaches (Vaidya, 2020). Health insurance companies are the main victims of data breaches which exposed the personal data of their customers including birth dates, place, names, addresses, SSN, and other important info. Financial data easily become unusable as people can easily change their debit/credit numbers but in case of medical data, it is unvindicable and hence become so useful for cybercriminals. Mostly they target data from pharmaceutical
  • 3. and biotech intellectual property. In the healthcare industry everything like health application over phone, insulin pumps are well networked which leaves unique openings for hackers and leads to security breaches. Data in technology plays a crucial role, so the necessary steps should be taken to prevent it from compromising. Healthcare industry should follow HIPAA security and privacy rules. Apart from this, educating healthcare staff about the security measures is also very necessary. Implementing data usage controls, encrypting data, giving only necessary access to staff, securing mobile devices, conducting regular risk assessments, mitigating connected device risks, logging and monitoring use, restricting access to data and applications, carefully utilizing off-site data backup are the other important measures to be practiced (Lord, 2020). Hello Pritesh, Discussing the case study in detail According to Wang & Johnson (2018), the discussion is mainly on the data breach incident in Equifax. This cyber-attack case happened in March 2017, where the personal data of millions of people was stolen from the system of Equifax. Through this incident, Equifax has faced a lot of financial problems, and the condition of the people's health also became a great concern for the company. This case study shows some of the important information of how the situation has happened in the company and what things are lacking within the system for which the attackers get the chance to involve within the system. Reasons for having this data breach problem As per the cyber-security experts' report, several security lapses within the system allow the attackers to enter into the system. Another reason is an SSL certificate that they used for security purposes also expired, and for that incoming traffic network could not be decrypted properly. The attackers get the chance to involve and encrypt their activities and make some decent
  • 4. changes within Equifax's server. It is seen that Equifax was unaware of the suspicious activities, and also they are lack in this situation's knowledge, and for that reason, this problem has arisen within the system. Around 143 million customers suffered from this incident, and this is one of the biggest data breach incidents that causes a big failure to the company's reputation, work culture and trust that they gained from the customers all goes in vain with this incident. The technologies that have been involved within the company did not work as it required to be done, and for that, they fail to protect this personal data of the customers, and this made a big blunder for the company to manage the situation well. Potential solutions As per the discussed situation, it could be said that Equifax needs to update the SSL certificate procedure first as it the main equipment of Equifax to protect any unethical or unauthorized operation done within the Hello Akif, Cause of the problem Data is very vulnerable at the same time, very important for any organisation. A lot of data is generated in different organizations. They are also doing a lot to make sure that the data is protected in the right manner. In healthcare as well, the concept of data integrity has become a major concern (Pandey et al., 2020). Data breaches in healthcare can result in a lot of consequences. Managing the data in healthcare is very critical, but it is also very difficult to handle them due to composite it since it is also complex in the hospital and can feel capacity pressure. The leakage of patient information is very vulnerable. Due to huge complexity and constant pressure, it becomes very difficult to handle the data in the right order. The solution to the problem
  • 5. The Healthcare sector is one of the vulnerable areas, and thus it is important to solve the problem, but initially, it is important to find the issue through which it occurred so that we can go in finding the right solution to mitigate the risk. One of the areas is human error, as per which there are various reasons why humans become an unknown reason for the data breach. Due to a lack of consciousness or any carelessness of the internal associate, the problem may take place, and thus it is important to have detailed information about the same (Chernyshev et al., 2019). Thus it is very important to have a good policy that employees of the organisation should follow. The data breach situation can also be resolved with the help of proper technological equipment in the company. The new data help fill the gap between the two ministers; the companies need to keep updating uses and adopt new approaches that will help better understand. It is essential to give the staff in the organisation a proper understanding of what is to be done if the need use any quick action can be taken. The restriction must be there concerning the data and its access so that it will be more secure, and thus the action and track of people will be kept. It is important to keep monitoring because the update and all can be properly taken place with. For the double security aspect, it is beneficial to always encrypt the data as the data will remain safe even if it is stolen since then, the attacker will not be able to harm me. Mobile devices are connected with security and all of those aspects (Seh et al., 2020). Various risks are also incorporated with the connected devices, and thus it is important to keep track of the same. It is also used to mitigate the risk so that it wouldn't be transferred. It is also a good action to keep doing the risk assessment since it will be well known what is to be done in the case of the risk. It is also important to keep the password, and other protecting elements keep changing since it blocks the path of the mitigation.