Data Breaches in healthcare 2020

Data Breaches in healthcare 2020


Data breaches in the healthcare sector were widely noted. Many different types of incidents can trigger it, including malware that steals passwords, an attacker that intentionally or unintentionally discloses patient data, or misplaced laptops or other devices. On the black-market Personal Health Information (PHI) is more important than credit card credentials or standard Personal Identification Information (PII). Therefore, cybercriminals are given a better incentive to concentrate on medical records to sell the PHI or use it to their benefit. More than According to the health and human services breach study, 15 million medical data were affected.

data breaches in healthcare sector


An 8-K application to the Securities and Exchange Commission revealed in early May that between 1 August 2018 and 30 March 2019, an American billing service seller had bailed out eight months ago.

At least six entities have reported that their patient data have been compromised by hockey since the breach was disclosed. Most affected providers still investigate the scope of the violation, however, so that for the foreseeable future, the total number of patients affected is still obscure.

Up to now, up to 12 million patients have been affected by Quest Diagnostics. The hacked system includes personal information and financial information, including social security cards and medical data, from the laboratory test giant.


Insurer Dominion National reported on its servers a nine-year hack that could violate 2,96 million patient data.

An internal warning revealed unauthorized access to your systems, leading to a survey. Officials had found that nonauthorized access had begun almost nine years before the violation was discovered in April 2019 as early as 25 August 2010.


The loss of personal health data in 1,57 million of Inmediata Health Group patients has resulted from a disordered database. During the infringement reporting process, the provider mistakenly sent the incorrect letters to the patients.

In January, the compromised database discovered when officials found that a search engine feature enables the indexing of indexed web pages used for business operations.led to some information disclosed on electronic health.

4.     UW MEDICINE: 973,024 PATIENTS

In February, 974,000 patients informed of their data being exposed online over three weeks due to a malformed server by Washington University of Medicine.

The breached was discovered when A file containing patient personal information had been found by a patient in December 2018 when the patient searched file his name. They told UW Medicine that it was an employee mistake three weeks earlier to make internal data public.

UW Medicine worked with Google to clear the stored copies and prevent them from displaying search results since Google saved some files before December 26, 2018. “All files saved have been completely deleted by January 10, 2019, from Google’s servers.”

The database included personal data with the name of some people’s health conditions, including the laboratory test name or the study name.



Data breaches by Email

Since 2010, almost 200 million people have reported that their health information has infringed on federal data in the United States.

This number alone is increasing.

In 2018, 366 breaches registered health data of 13 million people. Its 2% more than the 359 breaches insurers, health systems, and business partners in 2017.

The “trend,” Robert Lord, a co-founder and President of the cyber-security firm Protenus, said: “based on the frequency perspective, breaches continued to escalate.”

In recent years, email attacks have dramatically increased. Since 2017, emails have been the primary source of information on health. This year, 85 email violations, which is almost a fourth of healthcare breaches, were recorded-more than twice as many as in 2016.

In past years, the risk of paper or laptop record theft infringements was higher for health organizations and their business partners.

Savickis proposed that health institutions name a dedicated chief information security officer to improve cyber safety. That staff is updated regularly about the detection of possible threats.

Consequence of data breaches 

In a 2015 study, the Institute of Ponemon published several key findings, including:

Theft of medical identification causes substantial costs. The study paid an average of $13,500 for the settlement of the crime (paying for health care staff, ID providers, or counsel) to 65 percent of victims of medical identity robbers.

  • Healthcare providers seldom notify victims. On average, more than three months after the crime, victims learn how to steal their data. When they are a victim, 30 percent don’t know.
  • Patients expect medical professionals to take a constructive approach to drug prevention and identification.
  • Robbery of identity. Seventy-nine percent of participants say that ensuring the privacy of their records is essential for healthcare providers

How to Avoid

As an afterthought, security can not remain. Violations hurt the patient and the broader health ecosystem. As the progress of the General Data Protection Act shows. At the same time, large-scale breaches occur in the United States in which regulatory oversight fosters transparency; the EU continues to take measures to improve transparency in respect of violations—growing up.

In the authentication security framework of an organization, criminals rely on the gaps. Additional regulators with privacy and security responsibilities will continue to set standards that increase security needs, primarily driven by elected officials and patients affected by violations.

How to avoid data breaches in healthcare

Encrypt data

Data should be encrypted by using Transport Layer Security ( TLS) 1.2, transmitted via the Network or email, and stored during the process. Data encryption defends against the failure by a malice actor to crack communications for accessing sensitive data against other protections and personal attacks. Following are the best approaches we use to make the encryption stronger.


IRM is an encryption technology which keeps the information encrypted. In addition to maintaining privacy, organizations should specify permissions for use with IRM. These allow users to allow or deny users certain actions on a piece of information. Permissions include things like controlling copy and paste, forwarding email, and blocking screenshots, printing, editing.


Modern DLP is also referred to as content-aware, which means that the DLP will analyze the content of emails or files to see whether it is sensible. DLPs typically allow for policy building by administrators. The administrator can determine what sort of blocking information and ways to track it.

Back up everything

Data backups are crucial to fight ransomware attacks. After a successful ransomware attack, the only way to get the systems and devices back to normal is through clean backup. Backup business, medical equipment, email, and other information are on an ongoing basis and maintain a backup in several physical sites.

Applying basic elements

The best practices for security reported in this document provide organizations with a proven and robust defense against cyber robbery. Through adopting these policies, health facilities and organizations will dramatically enhance their protection without sacrificing patient and family services.

Educating the employees about the cyber awareness and Information technology so that they can understand the security measures and make the encryption more secure to prevent from the security breaches in healthcare.