If you’re a member of my generation living in the U.S., you may remember the Bubble Boy. His story grabbed the national consciousness and was made into a TV movie featuring John Travolta. It was a sad tale of how a boy with a severe immune deficiency was forced to live his life inside a plastic bubble to protect him from pathogens. A single breach of that perimeter could end his life.

Patching the Bubble

In a way, an organization that relies on perimeter controls for critical data protection is in a similar sensitive situation. According to results of a recent survey from Accenture, one in four U.S. consumers have had their personal medical information stolen. Twenty-five percent of them switched health care providers as a result. It can be easy for attackers to breach barriers using stolen credentials or via SQL injection. On top of that, organizations need to stay competitive by having data flow through traditional boundaries, such as to the cloud and through mobile applications.

Data needs to break free of barriers so that your organization can thrive, but it must have a strong security immune system to protect it every step of the way. Data protection is not a single silver bullet; it relies on an ecosystem of security disciplines along with collaboration and expertise.

Health Care Industry Struggles With Data Protection

Vendors are often so focused on showing off product capabilities that they forget there are compelling security issues to be solved. Their job is to bring the pieces together and show the art of the possible.

The findings of the same Accenture survey showed that half of those who experienced a breach were victims of medical identity theft and had to pay approximately $2,500 in out-of-pocket costs per incident on average.

The problem of a weak security immune system really hit home for me after my health care data was breached twice in 2015. Sure, I was angry, but beyond that, I wanted to demonstrate that there is a better way to protect data and that all organizations can do better.

Out of this experience was born a real-life demonstration that we built on the cloud. To me, it’s much more effective than PowerPoint slides in demonstrating a more robust approach to data protection that leverages an integrated, layered approach to security.

Whether you work in health care or not, we can all relate to getting medical treatment — that’s where our story begins. In this on-demand webinar, you will see how attacks occur and a demonstration of how a security immune system can help you detect and prevent loss of your valuable data.

The System Response

Just as your body needs a strong immune system to ward off illness, your system needs integrated, enterprise security tools and point products to shield and recover from attacks. Security tools that not only detect but also isolate, respond, mitigate and eradicate advanced threats.

Like Janet, you can learn from this experience and avoid having your bubble popped.

More from Healthcare

Why safeguarding sensitive data is so crucial

4 min read - A data breach at virtual medical provider Confidant Health lays bare the vast difference between personally identifiable information (PII) on the one hand and sensitive data on the other.The story began when security researcher Jeremiah Fowler discovered an unsecured database containing 5.3 terabytes of exposed data linked to Confidant Health. The company provides addiction recovery help and mental health treatment in Connecticut, Florida, Texas and other states.The breach, first reported by WIRED, involved PII, such as patient names and addresses,…

Ransomware on the rise: Healthcare industry attack trends 2024

4 min read - According to the IBM Cost of a Data Breach Report 2024, the global average cost of a data breach reached $4.88 million this year, a 10% increase over 2023.For the healthcare industry, the report offers both good and bad news. The good news is that average data breach costs fell by 10.6% this year. The bad news is that for the 14th year in a row, healthcare tops the list with the most expensive breach recoveries, coming in at $9.77…

Cybersecurity risks in healthcare are an ongoing crisis

4 min read - While healthcare providers have been implementing technical, administrative and physical safeguards related to patient information, they have not been as diligent in securing their medical devices. These devices are critical to patient care and can leave hospitals at risk for cyberattacks, causing major disruptions to patient care. In fact, 88 million individuals were affected by large breaches, compromising vast amounts of electronic protected health information (ePHI) last year according to the U.S. Department of Health & Human Services. This year,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today