Posts Tagged with security

by adgrooms on December 17, 2019

We are currently working on a healthcare data breach report, visualizing and analyzing reported breaches from the last ten years. In each blog post, we are releasing a piece of the report which will ultimately be available in one PDF file. The first two posts have focused on the number of individuals whose personal health information has been compromised. This post focuses on the different ...

Read More
by adgrooms on December 14, 2019

We are currently working on a healthcare data breach report, visualizing and analyzing reported incidents from the last ten years. This is the second installment of our data breach report. We will keep releasing portions of the report as we make new discoveries.

Breaches come in all sizes, from a stolen laptop to a database break-in. We can see this in the report data. The scatter graph ...

Read More
by adgrooms on December 13, 2019

Healthcare data is a prime target for hackers. Studies have shown that data breaches cost an average of $8 million for healthcare entities or about $400 per patient record. This emphasizes the need for good defenses and awareness to protect patient health information.

We are creating a report that analyzes at the past 10 years of data from the US Department of Health and Human Services ...

Read More
by adgrooms on November 30, 2019

Healthcare is plagued by constant attacks from hackers trying to obtain valuable patient health information (PHI). Unfortunately, some succeed, keeping healthcare on edge, hoping that they won't be the next breach. As we talk about building better healthcare software, security is an important part of the conversation. It is imperative to keep PHI secure, but as healthcare moves toward a ...

Read More
by adgrooms on July 16, 2019

Healthcare institutions are a constantly changing ecosystem of people on the move, including internal employees, patients, visitors, and contractors, intermixing throughout the day. This makes healthcare institutions particularly vulnerable to the practice of social engineering, or people pretending to be someone they are not. These methods are employed by bad actors who are trying to gain ...

Read More