Stolen medical information affects 18 out of 20 industries

Stolen medical information is a much more widespread issue than previously thought, affecting 18 out of 20 industries examined, according to the just released Verizon 2015 Protected Health Information Data Breach Report. Yet, most organizations outside of the healthcare sector do not realize they even hold this type of data. Common sources of protected health information are employee records (including workers’ compensation claims) or information for wellness programs and are generally not well protected.

These findings are part of a first-time report from Verizon’s Data Breach Investigations Report (DBIR) team that provides a detailed analysis of confirmed PHI breaches involving more than 392 million records and 1,931 incidents across 25 countries.

“Many organizations are not doing enough to protect this highly sensitive and confidential data,” said Suzanne Widup, senior analyst and lead author for the Verizon Enterprise Solutions report. “This can lead to significant consequences impacting an individual and their family and increasing healthcare costs for governments, organizations and individuals. Protected health information is highly coveted by today’s cybercriminals.”

According to recent studies called out in the report, people are withholding information – sometimes critical information – from their healthcare providers because they are concerned that there could be a data breach.

“Healthcare organizations need to realize that patients trust them with their data and if that trust is broken, the implications can be huge,” Widup added.

For example, the report points out, an unwillingness to fully disclose information could delay a diagnosis of a communicable disease. This is especially true if the disease has an attached social stigma.

How PHI breaches differ from other types of breaches

PHI breaches stand out from prior DBIR data sets in a number of ways. One area of difference is who is carrying out the attacks. In PHI breaches, the number of external and internal actors is nearly equal with just 5 percentage points difference, meaning there is a lot of insider misuse.

According to the report’s findings, medical record data is often taken with malicious intent; however, it is frequently the personable identifiable information (PII), like credit card and social security numbers, that attackers are really after in order to facilitate financial crimes and tax fraud.

Differences are also evident in how the breach occurs. The primary action of attack is theft of lost portable devices (laptop, tablets, thumb drives), followed by error which can simply be sending a medical report to the wrong recipient or losing a laptop. Third is misuse that can result from an employee that abuses his/her access to the information. These three actions make up 86 percent of all breaches of PHI data.

In addition, the time to discovery most frequently falls into the months and sometimes years category. For those incidents taking years to discover, they were three times more likely to be caused by an insider abusing their LAN access privileges and twice as likely to be targeting a server, particularly a database.

What can be done about PHI data breaches

While detailed health records make it easier for criminals to engage in both identity theft and medical billing fraud, the media and industry researchers continue to shine a light on the loss of highly personal data in order to bring much needed attention to this issue.

Sadly nearly half of the population of the Unites States has been impacted by breaches of PHI since 2009, finds the report. Furthermore, the FBI issued a warning to healthcare providers in early 2015 stating that “the healthcare” industry is not as resilient to cyber intrusions compared to the financial and retail sectors, therefore the possibility of increased cyber intrusions is “likely.”

To help address this issue, Verizon offers insights and recommendations in the report on how to best protect data in addition to illuminating the fact that PHI data is contained in many more places than organizations realize.

Don't miss