01.07.2021 Views

Cyber Defense eMagazine July 2021 Edition

Cyber Defense eMagazine July Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine July Edition for 2021 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

cybercriminals targeting the public’s health information as we loosen restrictions over the next few<br />

months.<br />

Gary Cantrell, Head of Investigations at the HHS Office of Inspector General, said hackers tend to steal<br />

medical records because they are like "a treasure trove of information about you." They can contain a<br />

patient's full name, address history, financial information, and National Insurance numbers, which can be<br />

enough information for hackers to take out a loan or set up a line of credit under patients' names.<br />

Increasingly, hackers are selling information for profit on the black market. According to Reuters, buyers<br />

might use the information to create fake IDs to purchase medical equipment or drugs, or to file a false<br />

insurance claim.<br />

The impact of medical data breaches<br />

As we increasingly rely on technology, hackers are finding new ways to attack IT systems, disrupt<br />

computer networks, and steal information. There can be huge benefits when patient data is used<br />

responsibly to save lives and advance medical research, but it is undeniable that it comes with risks.<br />

The potential impact of a data breach often depends on the circumstances. Someone who has a sensitive<br />

medical condition may be much more concerned if part of their medical history was exposed or disclosed.<br />

The possibility that it might fall into the wrong hands could cause them emotional distress.<br />

According to Brandon Reagin, a victim of medical record theft, it's a "mess." Reagin's identity was stolen<br />

in 2004, and the person who accessed Reagin's personal information used it to steal cars and rack up<br />

$20,000 worth of medical procedures. He was reportedly unable to get the charges scrubbed from his<br />

credit report "until the next billing cycle." Then, the process would start all over again.<br />

The person who stole Reagin's identity served time in prison. But, 17 years later, he still hasn't been able<br />

to undo all of the damage, including to the integrity of his own medical files, as the “hospital may still have<br />

his information, his blood type under my name at that hospital… It's a little weird to think".<br />

Proactive steps consumers and healthcare providers can take to protect their data<br />

Healthcare providers and their business associates must balance delivering quality patient care with<br />

protecting patient privacy, always ensuring that they are meeting the strict regulatory requirements set<br />

out in legislation, such as the General Data Protection Regulation (GDPR).<br />

Healthcare staff can protect information with a number of measures including:<br />

• educating staff;<br />

• restricting access to information and applications;<br />

• implementing data usage controls;<br />

• logging, auditing and monitoring use;<br />

• encrypting data both on servers and when it is being transferred;<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>July</strong> <strong>2021</strong> <strong>Edition</strong> 130<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!