Posts

by adgrooms on January 21, 2020

In our ongoing look at data breach information from the past ten years, we have looked at the types of breaches over time. In this post, we will look at the types again, and this time, look more closely at how the type and location (or media) of the breach are related. As a reminder, the data we are working with are reported data breach incidents where the personal health information (PHI) of ...

Read More
by adgrooms on January 16, 2020

We are getting close to finishing up a complete report on data breaches from the last 10 years. We started with a wide view and in our last few posts, we took a more focused view of the types and locations of breaches. In this post, we will look at the trends of the different types of breaches over time.

The image below is an overall view of the different types of breaches over the last 10 ...

Read More
by adgrooms on January 15, 2020

Yesterday we talked about breaches from the perspective of the type of breach. Another dimension is the location of the data. Over the last 10 years, patient health information (PHI) has transitioned from paper files to servers and clouds. This is reflected in the breach reports.

In the first chart, we see that paper/films is the top location for data breaches, followed by network server ...

Read More
by adgrooms on January 14, 2020

We have been putting together a report on healthcare data breaches by analyzing data from the Department of Health and Human Services breach portal. Our progress so far has included looking at the numbers from the perspective of geography, entity, and cost. In this post, we look at the breach types. It is common to think of a breach as just stealing PHI to be sold on the dark web. But there ...

Read More
by adgrooms on January 9, 2020

Healthcare interoperability still has gaps to bridge, and many different entities are trying to come up with solutions. We talked about two companies that are trying to fill the gaps in our last post. Both have networks that entities can plug into to exchange data, but neither was a comprehensive solution ...

Read More