Health Industry Needs Urgent Cyber Surgery

SHORT-TERM-HEALTH-INSURANCE-resized.png

Cyber hackers have taken their vitamins and are aiming at the healthcare sector in 2015. Anthem recently reported a breach where hackers accessed close to 80 million records (roughly 25% of Americans). Now we are learning the details of the recent Premera Blue Cross hack in which 11 million patients’ data has been compromised. 
This hack is especially alarming in that the hackers gained access to insurance claim data, banking account numbers, clinical information, and even valuable diagnostic codes. Social Security Numbers, birth dates, and other patient identifiers were also compromised. The attack reportedly began back in May of 2014 and is the worst breach to date involving patient medical information. Even though the Anthem hack had a much larger number of medical records compromised, the hackers did not gain access to medical information as with the Premera hack, which was only uncovered recently on Jan. 29, 2015
You might wonder why are hackers so interested in medical records?
If you lurk around in the dark Web, you will quickly learn medical records are highly valuable and often used for insurance fraud scams, which is extremely lucrative. There are so many stolen credit cards available for purchase in the dark Web, and are currently selling for about one dollar per card. Contrast this with the average stolen health credentials fetching up to ten times that and you quickly see the value to cyber thieves and hackers.
What is in a typical medical record that the cyber thieves want?
First, there are great details about an individual’s life—details that some people will not share on social networks. Once a hacker has captured this compromised information, they may effectively use it to access a victim’s bank account information, modify and file a tax return, or even apply for a loan in their name. Hackers often will use medical policy numbers to file false medical claims and attempt to collect a payout and utilize the diagnostic codes. Some of these hackers will even access prescriptions for painkillers to sell illegally. When hackers have detailed family member names, addresses, and birthdays, they can easily socially engineer a situation in which they sound credible. Having access to medical data also allows for effective targeted email phishing attacks where convincing attachments lure unsuspecting individuals to click and reveal further data such as usernames and passwords.
Hackers are lazy and opt for the easy targets.
The credit card companies have invested heavily into advanced fraud detection because of so many compromised credit cards in 2014. Consumers are also beginning to learn the importance and being trained to regularly check their credit card statements for any suspicious activity. The healthcare industry continues to concentrate on patients’ health and not on patients’ security. Security will have to become another metric of healthcare in order for patients to choose providers, make informed decisions and most importantly, keep their medical information secure and private.
What can you do to protect your medical data?
Don’t provide your social security number on the forms at the doctor’s office and hospital. Just leave it Blank. If they insist on you providing your SS#, you can find another doctor or hospital or Only put down the last four digits. Often they claim it is required, but this is not the case as the doctors and hospitals only want your SS# in the event you do not pay your bill and the SS# makes debt collection easier. Medicare and your health insurance company do require your Social Security number S#. If they ask for your driver’s license for ID, give them another form of photo ID with less detailed information on it if they insist.
Remember next time you are asked for more information at the doctor’s office, be careful what you provide as you may be aiding in a cyber hacker’s car payment.
Connected World:  http://bit.ly/1GHhR4W

« Instilling a Culture of Cyber Security
Dark Web Drug Dealers Specialised in ‘party packs’ »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NuHarbor Security

NuHarbor Security

NuHarbor is a leading information security consulting and advisory firm specializing in Information Security, Compliance, and Risk Management.

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum is a catalyst platform designed to create a more resilient and better cyberworld for all.

David Hayes-Export Controls

David Hayes-Export Controls

David Hayes-Export Controls provides assistance to companies affected by export controls or who are considering entering the market but are unsure of the commercial and regulatory implications.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

Panacea Infosec

Panacea Infosec

Panacea Infosec is a leading provider of information security compliance services. We help our clients in protecting their data, reducing security risks and fighting cybercrime.

VISTA InfoSec

VISTA InfoSec

VISTA InfoSec is a global Information Security Consulting firm with offices based in US, UK, Singapore and India.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

Harbottle & Lewis

Harbottle & Lewis

Harbottle & Lewis is a leading UK-based law firm focused on the Private Client and Technology, Media and Entertainment sectors.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

Infinavate

Infinavate

Infinavate Fort CyberVault offers end-to-end services that comprehensively responds to the organization’s information security and privacy needs.