Posts Tagged with phi

by adgrooms on January 24, 2020

We have looked at several different perspectives of healthcare data breach information in recent posts. We are close to combining the observations from all of the previous posts into a full report. In the data from HHS that we have been analyzing, some of the breaches are accompanied with a detailed explanation of the cause and corrective action taken. These give more insight into some of the ...

Read More
by adgrooms on January 23, 2020

We have been working on a report looking at a decade of reported healthcare data breaches. In the last few posts, we have looked at the types and locations of breaches in terms of impact and changes over time. In this post, we are taking a look at trends of breaches including the number of incidents and the number of individuals affected.

The average number of incidents per year has ...

Read More
by adgrooms on January 21, 2020

In our ongoing look at data breach information from the past ten years, we have looked at the types of breaches over time. In this post, we will look at the types again, and this time, look more closely at how the type and location (or media) of the breach are related. As a reminder, the data we are working with are reported data breach incidents where the personal health information (PHI) of ...

Read More
by adgrooms on January 16, 2020

We are getting close to finishing up a complete report on data breaches from the last 10 years. We started with a wide view and in our last few posts, we took a more focused view of the types and locations of breaches. In this post, we will look at the trends of the different types of breaches over time.

The image below is an overall view of the different types of breaches over the last 10 ...

Read More
by adgrooms on January 15, 2020

Yesterday we talked about breaches from the perspective of the type of breach. Another dimension is the location of the data. Over the last 10 years, patient health information (PHI) has transitioned from paper files to servers and clouds. This is reflected in the breach reports.

In the first chart, we see that paper/films is the top location for data breaches, followed by network server ...

Read More