Posts Tagged with PHI

by adgrooms on January 23, 2020

We have been working on a report looking at a decade of reported healthcare data breaches. In the last few posts, we have looked at the types and locations of breaches in terms of impact and changes over time. In this post, we are taking a look at trends of breaches including the number of incidents and the number of individuals affected.

The average number of incidents per year has ...

Read More
by adgrooms on January 21, 2020

In our ongoing look at data breach information from the past ten years, we have looked at the types of breaches over time. In this post, we will look at the types again, and this time, look more closely at how the type and location (or media) of the breach are related. As a reminder, the data we are working with are reported data breach incidents where the personal health information (PHI) of ...

Read More
by adgrooms on January 16, 2020

We are getting close to finishing up a complete report on data breaches from the last 10 years. We started with a wide view and in our last few posts, we took a more focused view of the types and locations of breaches. In this post, we will look at the trends of the different types of breaches over time.

The image below is an overall view of the different types of breaches over the last 10 ...

Read More
by adgrooms on January 15, 2020

Yesterday we talked about breaches from the perspective of the type of breach. Another dimension is the location of the data. Over the last 10 years, patient health information (PHI) has transitioned from paper files to servers and clouds. This is reflected in the breach reports.

In the first chart, we see that paper/films is the top location for data breaches, followed by network server ...

Read More
by adgrooms on January 14, 2020

We have been putting together a report on healthcare data breaches by analyzing data from the Department of Health and Human Services breach portal. Our progress so far has included looking at the numbers from the perspective of geography, entity, and cost. In this post, we look at the breach types. It is common to think of a breach as just stealing PHI to be sold on the dark web. But there ...

Read More