March 7, 2018 By Shane Schick 2 min read

The shift toward digital solutions for managing patient data may be contributing to the increasing volume of security breaches in healthcare, a recent report suggested.

According to the “2018 Thales Data Threat Report,” 70 percent of healthcare organizations around the world have experienced a data breach. The survey, which included responses from approximately 1,200 global security professionals, also found that 55 percent of healthcare companies feel either “extremely” or “very vulnerable” to cyberattacks.

Technology Adoption Drives Up Security Breaches in Healthcare

Like almost every other industry sector, healthcare organizations have been adopting new technologies to boost productivity, cut down costs, improve communication and solve problems. Infosecurity Magazine noted that 93 percent of firms in the Thales study said they are using analytics software to manage big data, hosting data in the cloud or leveraging the Internet of Things (IoT) in some way. Security breaches may be on the rise simply because there are more points of vulnerability for cybercriminals to target.

Medical records often include data that is more valuable that credit card information, ComputerWeekly reported. Although 70 percent of healthcare professionals who responded to the Thales survey said that adhering to regulation and compliance requirements is an “extremely” or “very” effective way to avoid security breaches, it’s obviously not keeping all electronic health records and personal health information safe.

Insider Threats on the Rise

Thales isn’t the only firm taking a closer look at this sector. Verizon’s “2018 Protected Health Information Data Breach Report (PHIDBR)” revealed that nearly 6 in 10 security breaches in healthcare stem from either malicious or negligent employees. Another study from consulting firm Accenture found that nearly a quarter of U.S. healthcare employees know of at least one co-worker who had illegally sold usernames, passwords or other private information to unauthorized outsiders.

While insider threats are common in many other markets, the Verizon report noted that 70 percent of security breaches in healthcare that involved malicious code were ransomware attacks. Ransomware campaigns frequently target unsuspecting users, suggesting a need for increased security awareness and employee education.

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today