Deep Dive published results of healthcare survey:
- 75% of hospitals, doctors and health systems are unprepared for cyberattacks that could compromise PHI of 500 patients or more
- 96% = believe hackers are trouncing security measures in place
- $134 billion will be spent on cybersecurity solutions in the U.S. healthcare industry over next 5 years
- $18 billion to be spent in 2021
- 82% do not believe that money is being spent effectively
- Funds destined for cybersecurity are routinely spent after the breach instead of before
- Departments outside of IT are not consulted to determine where money can be best put to use
- 80% have not conducted a cybersecurity drill
- 14% believe that they have improved cybersecurity practices since 2020
- 26% believe that cybersecurity practices have worsened since 2020
- 93% of patients would switch to another healthcare provider after breach
- Jack Cable of Krebs Stamos Group published research on ransomware:
- $60,270,557.92 in total tracked ransomware payments
- $11.3 million received by REvil/Sadinokibi
- Oklahoma Heart Hospital of Oklahoma City, OK notified an unknown number of patients that their PHI was exposed after mailing error.
- Adobe Corp. issued multiple patches to repair security vulnerabilities in Acrobat, Reader, Illustrator, Framemaker, Dimension and Bridge applications.
- Even though the U.S. Department of Defense announced last year that it shut down the Trickbot hacking group in Russia, it has returned with updated malware, according to BitDefender.
- Dotty’s Gaming and Spirits, owned by Nevada Restaurant Services and Craig Estey,which has 120 locations, notified 300,000 customers that their info may have been exposed after data breach.
- Northeast Radiology, headquartered in New York, and Alliance HealthCare notified 1.2 million patients that their PHI may have been exposed after breach.
- The Millenia Companies, headquartered in Cleveland, OH notified an unknown number of customer residents that their info was exposed after email breach.
- York Animal Hospital of Maine notified an unknown number of customers that their info was exposed after ransomware attack.
- Clover Park School District of Washington notified 1,583 students that their info was exposed after ransomware attack.
- Morgan County School District of West Virginia notified an unknown of students that their info was exposed after ransomware attack.
- Booneville School District of Mississippi notified an unknown number of students that their info may have been exposed after cyberattack.
- Lancaster Independent School District of Texas notified an unknown number of students that their info may have been exposed after cyberattack.
- Whitehouse Independent School District of Texas notified an unknown number of students that their info may have been exposed after cyberattack.
- North Country Healthcare of Whitefield, New Hampshire notified an unknown number of patients that their PHI was exposed after breach.
- Virginia Tech University notified an unknown number of students that their info may have been exposed after cyberattack.
- Florida Blue, headquartered in Jacksonville, FL, notified 30,000 patients that their PHI was exposed after cyber attack.
- ClearBalance of San Diego, CA, notified over 200,000 patients that their PHI was exposed after email phishing attack.
- Forefront Dermatology, headquartered in Manitowoc, WI, notified 2.4 million patients that their PHI was exposed after cyber attack.
- D-Box, with US headquarters in Los Angeles, CA notified an unknown number of customers that their info may have been exposed after ransomware attack.
- DuPage Medical Group, headquartered in Downers Grove, IL notified an unknown number of patients of a “network outage”
- Egress Software published results of insider breach survey:
- 54% of IT leaders believe remote working increases insider breaches
- 97% of employee say they would report breach
- 89% of incidents led to repercussions for employees involved
- 54% think their organization’s security culture trusts and empowers them
- 94% have had data breach in last 12 months
What incidents caused breach
- 84% = human error
- 74% = employees breaking rules
- 73% = email phishing attack
- 66% = malicious leak
What causes IT leaders the most concern
- 28% = intentionally malicious act
- 27% = email phishing attack
- 21% = human error
- 21% = breaking security rules
- 27% of IT leaders feel that existing breach detection solutions would alert them of breach