Summary : Security breaches in healthcare are a major issue, but not enough attention is being paid to threats from the inside. A vast majority—92%—of healthcare IT decision-makers reported that their organizations are either somewhat or more vulnerable to insider threats, and 49% felt very or extremely vulnerable.
Healthcare Debacle : – The insider security threat in Healthcare industry
Security breaches in healthcare are a major issue, but not enough attention is being paid to threats from the inside. A vast majority—92%—of healthcare IT decision-makers reported that their organizations are either somewhat or more vulnerable to insider threats, and 49% felt very or extremely vulnerable
According to the healthcare-focused results of the 2015 Vormetric Insider Threat Report (ITR), a full 62% of respondents identified privileged users—those who have access to all resources available from systems they manage—as the most dangerous type of insider. Partners with internal access and contractors ranked second and third, respectively.
The report pointed out that healthcare data has become highly desirable to bad actors, healthcare records selling for tens to hundreds of dollars. That’s much more valuable than credit-card information: US credit card records sell for 50 cents or less. The enormous detail available in patient records is the reason for this, making it possible for criminals to not only apply for credit cards or loans, but to generate large sums from fraudulent medical charges, or even to compromise a patient’s existing financial accounts.
In this position many healthcare industries are constantly faced with rising requirements to meet their security risks and combat constant attacks on their It security structure.
The delivery of health care services—primary care to secondary and tertiary levels of care—is the most visible part of any health care system, both to users and the general public. There are many ways of providing health care in the modern world. The place of delivery may be in the home, the community, the workplace, or in health facilities. The most common way is face-to-face delivery, where care provider and patient see each other ‘in the flesh’. This is what occurs in general medicine in most countries. However, with modern telecommunications technology, in absentia health care is becoming more common. This could be when practitioner and patient communicate over the phone, video conferencing, the internet, email, text messages, or any other form of non-face-to-face communication.
Improving access, coverage and quality of health services depends on the ways services are organized and managed, and on the incentives influencing providers and users. Healthcare administrators are individuals or groups of people who act as the central point of control within hospitals. These individuals may be previous or current clinicians, or individuals with other backgrounds. There are two types of administrators, generalists and specialists. Generalists are individuals who are responsible for managing or helping to manage an entire facility. Specialists are individuals who are responsible for the efficient operations of a specific department such as policy analysis, finance, accounting, budgeting, human resources, or marketing.
These administrators often have direct access to confidential patient information which is stored in their data centers. Healthcare administrators have a dedicated technology support team to manage these data centers and IT for managing the healthcare core infrastructure. Leveraging technology for increasing growth has become a key agenda for healthcare industry over the years. In the recent years Healthcare industry has come under constant cyber-attacks specifically targeting patient’s confidential data. Also with cases of privileged users stealing sensitive data have become widely known healthcare industry has become more vulnerable to breaches than ever before.