[et_pb_section fb_built=”1″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.20.4″ hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″]
According to HIPAA, all covered entities and their business associates are required provide notification following a breach of unsecured protected health information.
These breaches of unsecured protected health information affecting 500 or more individuals are then posted on HHS.gov.
What is considered a breach? A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information.
The top two types of breaches
According to the report that lists all breaches reported within the last 24 months that are currently under investigation by the Office for Civil Rights, the top two types of attacks are hacking at 32.6 percent and unauthorized access at 21.3 percent.
Unauthorized access was added in 2016 when the ITRC noticed that the term Unauthorized Access/Disclosure was being used in a significant number of breaches posted on the HHS.gov website as well as in other notifications.
Definitions
Hacking: includes phishing and ransomware, is readily recognized as a malicious intrusion to access a company’s data, whether it’s personal or business related.
Unauthorized Access: defined as breaches which involve some kind of access to the data but the publicly available breach notification letters do not explicitly include the term hacking.
According to the January 2018 report from ITRC, the number of data breaches in the medical/healthcare industry dropped slightly from January 2017 from 29.1% to 28.9%.
Medical/Healthcare
# of Breaches: 31
# of Records: 232,589
% of Breaches: 26.7
% of Records: 7.4%
Protect your data
The time is now to begin a proactive approach to cyber risk management. Here are the steps we recommend:
1. Find out where your security gaps are.
2. Improve and harden your organization’s security program.
3. Strengthen your human firewall.
4. Monitor your security infrastructure.
5. Make sure data is accessible no matter what.
[/et_pb_text][et_pb_cta title=”Phish Your Users” button_url=”https://info.knowbe4.com/phishing-security-test-partner?utm_medium=partnerurl&utm_source=Cybriant” button_text=”Free Tool ” _builder_version=”4.16″ global_colors_info=”{}” button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”]Find out what percentage of your employees are Phish-prone.
[/et_pb_cta][/et_pb_column][/et_pb_row][/et_pb_section]