Tagged: #biometircs
- This topic has 7 replies, 5 voices, and was last updated 1 year, 6 months ago by Saranath.
-
AuthorPosts
-
-
2022-09-17 at 5:51 pm #38139Hazem AbouelfetouhParticipant
1. Provide a brief description of the story.
A total of 3 recent healthcare data breach incidents were reported in Oklahoma. Healthback Holdings, a home health company based in Oklahoma discovered unauthorized activity within its employee email environment on June 1. The data breach occurred between October 5, 2021 and May 15, 2022. During this period, an unauthorized party gained access to a limited number of employee email accounts.Also, The City of Newport, Rhode Island detected unusual network activity on June 9 that rendered certain systems unavailable.
Massachusetts-based Minuteman Senior Services (MSS) discovered suspicious activity on an employee’s email account on June 1, 2022 as well.
2. What is/are the impact of this data breach? Consequences of the data breach.
A total of 21,114 individuals in Healthback company were affected by this data breach. Investigators determined that the accounts contained names, health insurance information, clinical information, and Social Security numbers. The home health company mailed letters to impacted individuals on July 29, and encouraged them to review their healthcare statements for accuracy.The City of Newport, Rhode Island informed 6,109 past and current employees of a data breach that impacted their personal information. Further investigation revealed that an unauthorized party obtained files stored on the city’s file servers. The files contained the names, addresses, Social Security numbers, financial account information, birth dates, and group health insurance information of current and former employees and their spouses and dependents.
4,000 individuals were impacted by the email breach in Massachusetts-based Minuteman Senior Services (MSS). The types of information that may have been in the account included names, birth dates, gender, addresses, health insurance information, service utilization, and diagnoses.
3. How did the data breach occur?
Investigators were unable to determine whether any emails were viewed by the unauthorized party. Further investigation by MSS determined that an unauthorized party had maintained access to the account for less than 24 hours.4. What should be the main cause of the data breach? Provide a brief explanation of the cause of data breach, such as phishing, ransomware, HIPAA violation, database misconfiguration, human error, third-party vendor error)?
While Investigations in the 3 incidents were unable to determine the main cause. It appears to be a combination of insecure system architecture, phishing, and human errors.5. How could you prevent this data breach attack?
To help prevent something like this from happening again, we should strengthen email security protocols and provide additional training to employees on how to detect and avoid phishing emails.
Also, We should enhance the security of the network and implement additional administrative and technical safeguards to further secure the information. -
2022-09-19 at 8:31 am #38155ABDILLAH FARKHANParticipant
I like your topic and the way you elucidate.
Let me add a suggestion that may enrich data breaches prevention strategies. I think actualize yearly or monthly network security assessment is important. It would help organization to make early detecion and response to any malicious email breach committed by unauthorized party.
Best.-
2022-09-24 at 3:32 pm #38304Hazem AbouelfetouhParticipant
Thank you Abdillah, I agree with you. I think the system security team should test employees’ awareness with test attacks in addition to regular training
-
-
2022-09-20 at 1:10 pm #38190Zarni Lynn KyawParticipant
Your summary of the incident was comprehensive.
In terms of other preventive measures to avoid the attack, we should not only look at the technical attacks, we should also be aware of the physical attack to the systems. You explained provide additional training to employees already, so you are already promoting barriers to physical attacks but should we also promote employees to log off their computer when they leave the desk and use of biometrics or smart cards when they log into the systems to make sure the physical vulnerabilities are minimized.
-
2022-09-24 at 3:37 pm #38305Hazem AbouelfetouhParticipant
Thank you Zarni, Fully agree with you. Accessing a system with unauthorized access to Physical servers is very common.
-
-
2022-09-21 at 9:10 pm #38226Siriphak PongthaiParticipant
I agree with you that we should strengthen security protocol and training.
By having an automatically early detection of suspicious emails is the first step to prevent phishing. However, to have password change policy every 90 days and two-factor authentication system are additional methods in verifying and identifying individuals.-
2022-09-24 at 3:39 pm #38306Hazem AbouelfetouhParticipant
Thank you Siriphak, Agree with you.
-
-
2022-09-24 at 4:14 pm #38308SaranathKeymaster
Thanks Hazem for sharing and thanks all for the fruitful discussion.
-
-
AuthorPosts
You must be logged in to reply to this topic. Login here