{"id":313,"date":"2017-08-18T18:48:25","date_gmt":"2017-08-18T18:48:25","guid":{"rendered":"http:\/\/127.0.0.1\/rcm\/osi\/healthcare-data-breaches-caused-by-hacks-are-on-the-rise\/"},"modified":"2017-08-18T18:48:25","modified_gmt":"2017-08-18T18:48:25","slug":"healthcare-data-breaches-caused-by-hacks-are-on-the-rise","status":"publish","type":"post","link":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/2017\/08\/18\/healthcare-data-breaches-caused-by-hacks-are-on-the-rise\/","title":{"rendered":"Healthcare data breaches caused by hacks are on the rise"},"content":{"rendered":"<p>By&nbsp;Rachel Z. Arndt&nbsp;&nbsp;|&nbsp; August 16, 2017<\/p>\n<div data-js=\"body-copy\">\n<p><em>(This story was updated Aug. 18, 2017).<\/em><\/p>\n<p>Data breaches caused by hacking and so-called IT incidents are on the rise, with the number reported in 2017 to set out pace the number reported in 2016, according to data from HHS&#8217; Office for Civil Rights.<\/p>\n<p>Security experts said that&#8217;s because hacking has gotten easier and organizations are now reporting incidents they previously might have kept quiet about.<\/p>\n<p>These trends come together in impressive numbers: Between the beginning of 2017 and Aug. 14, 2017, there were five hacking or IT incidents that have been resolved, according to the OCR&#8217;s breach portal, plus 76 more that are still under investigation. In all of 2016, there were 50 resolved hacking or IT incidents and 63 under investigation.<\/p>\n<p>&#8220;You don&#8217;t need to be a hacker anymore,&#8221; said Bob Anderson, formerly of the FBI and now managing director in Navigant&#8217;s Global Legal Technology Solutions practice. &#8220;That&#8217;s a huge difference.&#8221;<\/p>\n<p>Many of the attacks in the U.S. come from tools bought on the darknet or illicit websites, Anderson said, and there&#8217;s been a particular uptick in attacks that compromise email. To get access to an organization&#8217;s email system, a person might send an email with an attachment that&#8217;s a piece of nefarious software that gives the person access to the organization&#8217;s entire directory, which, in turn, likely contains at least one email password. These kinds of attacks may go unnoticed, he said, &#8220;because it&#8217;s not going to be like someone attacking an endpoint like in a traditional hack.&#8221;<\/p>\n<p>Hackers who gain access to health systems&#8217; files tend to be interested in protected health information, which they can sell on the darknet. &#8220;They&#8217;ll attack whatever part of the infrastructure that&#8217;s going to get them more money,&#8221; Anderson said.<\/p>\n<p>As the frequency of attacks increases, so does the frequency of reporting.<\/p>\n<p>&#8220;A lot of organizations are becoming more aware of their responsibility to report data breaches,&#8221; said Jeff Krull, a partner with Baker Tilly. &#8220;People are reporting things that maybe in the past they may not have known to report.&#8221;<\/p>\n<p>In general, healthcare organizations have been improving their cybersecurity programs, said Lee Kim, director of privacy and security at the Healthcare Information and Management Systems Society. &#8220;Cybersecurity is taken more seriously, and healthcare organizations are making it a higher priority,&#8221; Kim said. &#8220;It is a business and clinical necessity.&#8221;<\/p>\n<p>Still, cybersecurity spending makes up just a sliver of organizations&#8217; budgets. Forty percent of respondents to a recent HIMSS survey said 1% to 2% of their organizations&#8217; budgets goes to cybersecurity, and 32% said 3% to 6% goes to cybersecurity. More than a fifth of respondents didn&#8217;t know what percentage of their organizations&#8217; budgets were spent on cybersecurity.<\/p>\n<p>The key to preventing hacking and other IT incidents is a good response to attacks, said Richard Henderson, a global security strategist at Absolute. &#8220;You need to be able to detect attacks as fast as possible and then respond,&#8221; he said. &#8220;You&#8217;re not going to be perfect, so it&#8217;s how you respond to a breach that really dictates how egregious the offense is going to be.&#8221;<\/p>\n<p>Organizations with chief information security officers may be better-equipped for that, according to the HIMSS survey, which showed that organizations with cybersecurity leaders tended to have better cybersecurity practices at the organization level compared with those who don&#8217;t have such leaders. For instance, 95% of organizations with security leaders reported using the NIST Cybersecurity Framework, compared to under a third of organizations without security leaders. Most organizations with cybersecurity leaders assessed cybersecurity as part of their due diligence for new products or services, while only 57% of those without security leaders conducted such assessments.<\/p>\n<p>Such due diligence is growing increasingly important as connected devices become commonplace. &#8220;More and more stuff is getting connected at a time when organizations are already struggling to keep up with what they already have,&#8221; Krull said. &#8220;It&#8217;s a recipe for more breaches.&#8221;<\/p>\n<\/div>\n<div data-js=\"body-copy\"><\/div>\n<div data-js=\"body-copy\"><strong>Source:&nbsp;<a href=\"https:\/\/thehackernews.com\/2017\/07\/windows-ntlm-security-flaw.html\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/thehackernews.com\/2017\/07\/windows-ntlm-security-flaw.html<\/a><\/strong><\/div>\n","protected":false},"excerpt":{"rendered":"<p>By&nbsp;Rachel Z. Arndt&nbsp;&nbsp;|&nbsp; August 16, 2017 (This story was updated Aug. 18, 2017). Data breaches caused by hacking and so-called IT incidents are on the rise, with the number reported in 2017 to set out pace the number reported in 2016, according to data from HHS&#8217; Office for Civil Rights. Security experts said that&#8217;s because&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-313","post","type-post","status-publish","format-standard","hentry","category-alertas","category-2","description-off"],"aioseo_notices":[],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/posts\/313","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/comments?post=313"}],"version-history":[{"count":0,"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/posts\/313\/revisions"}],"wp:attachment":[{"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/media?parent=313"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/categories?post=313"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/tags?post=313"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}