The U.S. HHS Health Care Industry Cybersecurity Task Force and the U.K.'s ICO in separate reports highlight need to better protect patients' information What does the U.S. and the U.K. have in common when it comes to healthcare? Their healthcare sector continues to be under siege, and renewed efforts need to be made to lift the level of focus on protecting patient information. It is as if a Sword of Damocles hangs over this sector.As asinine as it sounds, we may have finally reached the tipping point where patients are now accepting, by default, their information will be at risk when they accept medical care?Government entities, one in the U.S. and another in the U.K. recently issued reports on the state of affairs within the healthcare sector. The U.S. Department of Health and Human Services (HHS) Health Care Industry Cybersecurity Task Force issued its first report to Congress, and the HHS Office of Inspector General (IG) submitted its semi-annual report to Congress. In the U.K., the Information Commissioner’s office (ICO) released its “data protections and concerns” report. The content demonstrates how the issues being faced on the IT side of the healthcare equation know no borders.The HHS Task Force recognized how vulnerable the sector is with its observation: “Over the next few years, most machinery and technology involved in patient care will connect to the internet; however, a majority of this equipment was not originally intended to be internet accessible nor designed to resist cyber attacks.” The HHS Task Force recognizes that a cultural change is required if cybersecurity and patient privacy are to be kept from “digitally sourced harm”—a fancy way of saying being affected by a breach. Interestingly, the HHS IG report highlights as areas of concern enhancing safety and quality care, efficiency of operations, reducing fraud and improper payments, and improving “data integrity and information security.” The HHS IG recognizes the bang that can be acquired via implementing big data analytics to the fraud equation as a means to detect and prevent improper payments. Similarly, the HHS IG identifies “penetration testing” as its area of focus. While across the pond in the U.K., the ICO notes the 31.5 percent increase in the number of self-reported incidents of data mishandling in the healthcare sector. The report also identifies with specificity that care homes (known in the U.S. as assisted living or nursing homes) continually avoid responding to IOC’s requests. The Register notes how data breaches within the health sector accounted for 43 percent of all data breaches in the UK. What is not surprising is the amount of breaches across both the U.S. and U.K. that are caused by human error. Sharing patient information in press releases or presentations is a self-inflicted wound. Copying data in a clear-text state to a storage medium, again a self-inflicted wound. Throwing patient files away via normal garbage disposal methods instead of destroying patient data, again a self-inflicted wound. The recent WannaCry crisis brought the U.K.’s health service to its knees was also a self-inflicted wound because they continued to use Window XP machines (an operating system that was end-of-life in April 2014). And of course, the “clicking” of links within emails that serve as the hook-setting event for some of the larger breaches, a lack of awareness by the insider. Patients need to be asking, “How is my data being protected?” The U.K., interestingly enough, has provided via the ICO a means for an individual to check if their information is being handled correctly. It’s up to you. Are you prepared to trade your privacy for treatment? Hold your healthcare providers accountable for how they handle your information. Related content news analysis China’s MSS using LinkedIn against the U.S. The head of the U.S. National Counterintelligence and Security Center says China's MSS is using social networks, specifically LinkedIn, to target, access, and recruit U.S. sources. By Christopher Burgess Aug 31, 2018 4 mins Social Engineering Cybercrime Security news analysis Tesla insider with expired NDA spills the tech beans A former Tesla engineer with an expired non-disclosure agreement (NDA) shared inside technical information on an obscure forum, which was quickly shared across multiple social media platforms. By Christopher Burgess Aug 30, 2018 3 mins Risk Management Security news analysis Horizon Air tragedy highlights airline insider threat vulnerability The ease at which a Horizon Air employee was able to steal and crash a Bombardier Q400 turboprop will likely prompt airlines to develop an insider threat mitigation strategy to close this vulnerability. By Christopher Burgess Aug 13, 2018 4 mins Security news analysis How did the TimeHop data breach happen? Compromise of an employee's credentials, lack of multi-factor authentication, and weak insider threat analysis all played a factor in the recent TimeHop data breach in which 21 million user accounts were compromised. By Christopher Burgess Aug 10, 2018 4 mins DLP Software Analytics Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe