verizon 2015 protected health information data breach report

16
You’re not immune to PHI data breaches. A cyber health warning from the Verizon 2015 Protected Health Information (PHI) Data Breach Report.

Upload: verizon-enterprise-solutions

Post on 13-Jan-2017

25.015 views

Category:

Technology


2 download

TRANSCRIPT

You’re not immune to PHI data breaches.A cyber health warning from the Verizon 2015 Protected Health Information (PHI) Data Breach Report.

This document and any attached materials are the sole property of Verizon and are not to be used by you other than to evaluate Verizon’s service.

© 2015 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its a�liates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners.

Proprietary statement.

2015 Protected Health Information Data Breach Report

2015 Protected Health Information Data Breach Report

Who’s at risk?

90of industries experienced a breach.

Many organizations don’t realize they hold PHI and are at risk.

It can include:

• Name, address, date of birth.• Telephone and email.• Medical insurance numbers.• Social Security numbers.• All biometric data.

2015 Protected Health Information Data Breach Report

What is it?

Name: Kate PorterDOB: 19/05/88SSN: 123-45-6789T: +1 (671) 123-1234 E: [email protected]

Protected health information (PHI) is defined as personally identifiable health information collected from an individual, and covered under one of the state, federal or international data breach disclosure laws.

2015 Protected Health Information Data Breach Report

Attackers are usually looking for data they can use to commit identity theft.

If PHI is taken as part of the theft, organizations must deal with the resulting regulatory fallout and negative exposure.

Causes and symptoms.

2015 Protected Health Information Data Breach Report

A PHI data breach is not always straightforward to diagnose.

It can take just seconds for attackers to compromise your systems. But in 50% of cases it took months or longer to identify that a breach had occurred.

Diagnosis.

Months+

2015 Protected Health Information Data Breach Report

Should the worst happen, treatment must be applied fast. Identify the source, contain it and verify the extent of losses. And take care that vital forensics are not destroyed.

Treatment.

2015 Protected Health Information Data Breach Report

If a breach is left undiscovered victims can continue to su�er long after the data has left their system.

They risk serious regulatory fallout, lasting damage to brand image and loss of trust.

Prognosis.

2015 Protected Health Information Data Breach Report

Prevention of PHI breaches is better than the cure.

Ensure you’re in the best possible shape by regularly examining processes, procedures and technologies that a�ect the security of PHI data.

Prevention.

2015 Protected Health Information Data Breach Report

We’ve identified three attack patterns that account for 85% of incidents — helping you prioritize your defenses.

Prevention.

45

20 20Lost and stolen assets

Privilege misuse Miscellaneous errors

2015 Protected Health Information Data Breach Report

What can you do?

• Encrypt data.• Automate backups.• Lock assets down.

1. Lost and stolen assets.

The loss or theft of laptops, USB drives, printed paper or any other information assets.

2015 Protected Health Information Data Breach Report

2. Privilege misuse.

Misuse of access, typically by insiders — but can also be outsiders and partners.

What can you do?

• Know your data.• Review user behavior for suspicious activity.• Monitor data transfers.

2015 Protected Health Information Data Breach Report

3. Miscellaneous errors.

Any mistake that compromises security — often the result of carelessness and poor processes.

What can you do?

• Implement quality checkpoints.• Learn from your mistakes and those of others.• Teach sta� about secure disposal of assets.

2015 Protected Health Information Data Breach Report

Attack graphs allow you to identify and visualize the paths attackers are most likely to take into your system. That lets you prioritize your defenses and mitigate the risks.

Prevention.

2015 Protected Health Information Data Breach Report

Make sure you’re in the best of health. Download the 2015 Protected Health Information Data Breach Report:

www.verizonenterprise.com/phi

90% of industries have experienced a PHI breach.

2015 Protected Health Information Data Breach Report

2015 Protected Health Information Data Breach Report

© 2015 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. PTEXXXXX 11/15