Posts Tagged with PHI

by adgrooms on January 14, 2020

We have been putting together a report on healthcare data breaches by analyzing data from the Department of Health and Human Services breach portal. Our progress so far has included looking at the numbers from the perspective of geography, entity, and cost. In this post, we look at the breach types. It is common to think of a breach as just stealing PHI to be sold on the dark web. But there ...

Read More
by adgrooms on January 9, 2020

Healthcare interoperability still has gaps to bridge, and many different entities are trying to come up with solutions. We talked about two companies that are trying to fill the gaps in our last post. Both have networks that entities can plug into to exchange data, but neither was a comprehensive solution ...

Read More
by adgrooms on December 19, 2019

Our recent posts have been sections of a data breach report that we are preparing. Its purpose is to gain insight into the trends and implications of reported incidents over the last ten years. This is our fifth installment with a look at the financial cost of healthcare data breaches.

Data breaches are costly in every business sector worldwide, but when reviewing the information [gathered ...

Read More
by adgrooms on December 17, 2019

We are currently working on a healthcare data breach report, visualizing and analyzing reported breaches from the last ten years. In each blog post, we are releasing a piece of the report which will ultimately be available in one PDF file. The first two posts have focused on the number of individuals whose personal health information has been compromised. This post focuses on the different ...

Read More
by adgrooms on December 14, 2019

We are currently working on a healthcare data breach report, visualizing and analyzing reported incidents from the last ten years. This is the second installment of our data breach report. We will keep releasing portions of the report as we make new discoveries.

Breaches come in all sizes, from a stolen laptop to a database break-in. We can see this in the report data. The scatter graph ...

Read More