BreachExchange mailing list archives

Human error tops Ponemon patient data security study threats


From: Audrey McNeil <audrey () riskbasedsecurity com>
Date: Thu, 13 Mar 2014 19:34:57 -0600

http://healthitsecurity.com/2014/03/12/human-error-tops-ponemon-patient-data-security-study-threats/

The Ponemon Institute's fourth annual Patient Privacy & Data Security Study
reviewed new and expanded threats of patient data security and privacy.
Based on the results of the study, human error continues to be the biggest
source of healthcare data breaches, as 75 percent of organizations view
employee negligence as the greatest breach threat.

The sample size of healthcare providers that Ponemon was able to interview
rose from 80 in 2012 to 91 this year for a total of about 388 1-on-1
interviews completed over a three-month period concluding in January 2014.
The study covered a wide range of topics, including the need to reduce both
internal and external threats, HIPAA compliance trends, mobile device
security and cloud security. Following negligence, organizations said its
biggest security concerns were use of public cloud services (41 percent),
mobile device insecurity (40 percent) and cyber attackers (39 percent).

According to the study, 90 percent of respondents said they've had at least
one data breach over the past two years and 38 percent (down from 45
percent last year) of that 90 percent said that they had more than five
data breaches over the two-year period. "Probably the only positive result
here that was favorable to the healthcare industry is the reality that data
breach frequency and cost declined slightly over the past year when
compared to prior years," Larry Ponemon, chairman and founder of the
Ponemon Institute, said in an interview with HealthITSecurity.com. "This
may be an indication that organizations are making good but modest progress
in managing sensitive patient data."

The primary causes of breaches were lost or stolen computing devices (49
percent), employee mistakes or unintentional actions (46 percent), and
third-party snafus (41 percent). The rate of data breaches with a root
cause of either a malicious insider or hacker has doubled from 20 percent
of all incidents to 40 percent since the Ponemon Institute first started
doing the study 4 years ago. There are some pattern changes, but that's
probably the biggest change of all, said Ponemon.

From an economic standpoint, one or more data breaches for healthcare
organizations in this study ranges from less than $10,000 to more than $1
million over a two-year period. And Ponemon calculated that the average
economic impact of data breaches over the past two years for the healthcare
organizations represented in this study is $2.0 million, down from nearly
$400,000 (17 percent) since last year. Part of these figures is that the
size of the breaches decreased, as the average number of lost or stolen
records per breach went down from 3,000 records to 2,150. At Ponemon's
estimated $188 per record, one breach may cost upwards of $404,200.

Three of the more critical themes in the report were mobile security, cloud
security and HIPAA compliance. According to the report, 88 percent of
organizations allow employees and medical staff to use BYOD devices, but
more than half are not confident that the personally-owned mobile devices
or BYOD are secure. Furthermore, few organizations said they mandate
anti-virus/anti-malware software to reside on the mobile device prior to
connection (23 percent). Even less requirescanning devices for viruses and
malware prior to connection (22 percent) and scanning devices and removal
of all mobile apps that present a security threat prior to connection (14
percent). "We do see that one of the great sources of a data breach is the
loss of devices and now there are more devices, such as tablets or smart
phones, being used in the workplace," Ponemon said.

A mere one-third of respondents said they are very confident or confident
that information in a public cloud environment is secure. However, 40
percent of organizations say they use the cloud (such as backup and
storage, file-sharing applications, business applications and document
sharing and collaboration) heavily, up from 32 percent last year.

And 51 percent of respondents said they are in full HIPAA compliance, while
49 percent report they are not compliant or are only partially compliant.
Additionally, 39 percent say their incident assessment process is not
effective and cite a lack of consistency and inability to scale their
process as the primary reasons. Moreover, 73 percent of organizations are
either somewhat confident (33 percent) or not confident (40 percent) that
their business associates would be able to detect, perform an incident risk
assessment and notify your organization in the event of a data breach
incident as required under the business associate agreement (BAA). And 44
percent of organizations say the HIPAA Omnibus Rule has affected their
programs, while 41 percent say it has not and 15 percent say it is too
early to tell.

Rick Kam, president and co-founder of ID Experts, said part of the strategy
that HIPAA and HITECH covered entities have been taking is to try to just
be compliant without looking at the broader, cross-industry security risks.
As some organizations have learned, compliance with HIPAA doesn't
necessarily mean an organization has good security.

Organizations are trying to do things that OCR or HHS suggests, whether it
be better training or policies and procedures. Where I think they're
missing the boat, as we've seen this in several recent incidents, is that
healthcare ecosystems are becoming more and more complex. Instead of
relying on telling an employee that, for example, that they're responsible
for protecting PHI, there should be technologies and tools in place, such
as encryption, that make it less likely that the employee has to do
anything to protect the data.

Other key findings included:

- Respondents in 69 percent of organizations represented believe the ACA
significantly increases or increases the risk to patient privacy and
security. The primary concerns are insecure exchange of patient information
between healthcare providers and government (75 percent of organizations),
patient data on insecure databases (65 percent) and patient registration on
insecure websites (63 percent of organizations).

- Fifty-one percent of organizations say they are part of an Accountable
Care Organization (ACO) and 66 percent say the risks to patient privacy and
security due to the exchange of patient health information among
participants has increased.

- 72 percent of respondents say they are only somewhat confident (32
percent) or not confident (40 percent) in the security and privacy of
patient data share on HIEs.

- Less than half of the organizations in this study report they are in full
compliance (25 percent) or nearly in full compliance (23 percent) with the
Accounting of Disclosures (AOD) requirement.

- Respondents deemed billing and insurance records and medical files are
the most likely to be lost or stolen.
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss
For inquiries regarding use or licensing of data, e-mail
        sales () riskbasedsecurity com 

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus 
on the right security.  If you need security help or want to provide real risk reduction for your clients contact us!

Current thread: