cyber-security education can stop vigilante hackers gone wild! · • leading cause of data...
TRANSCRIPT
Cyber-Security Education Can Stop Vigilante Hackers Gone Wild!
Presented by: Christine Arevalo,
VP, Healthcare Fraud Solutions
Our Time Together
1. Top Threats 2. Risks and Trends 3. Recommendation
and Best Practices
“Somehow your
medical records got
faxed to a complete
stranger. He has no
idea what’s wrong
with you either”
Top Threats- The Human Element
“We’re all human, and people are the constant weakness”
Malicious intent by employees
Human errors and mistakes
VS.
30% of companies experience a security incident as a result of employee activities on a social networking site.
The Human Element Explained
• 89% of organizations experienced a data breach
• 79% experienced multiple data breaches
• 45 % had more than five data breaches
• Leading cause of data breaches: • Criminal attacks • Unintentional employee actions • Third-party snafus • Stolen computing devices • Negligent handling of sensitive
patient information
• New threats such as ransomware and malware
• Breach number and frequency has yet to decline significantly in the past six years
Patient Privacy and the Security of Healthcare Data - Research Highlights
Cyber Threats – When its not an accident
New technological developments introduce fresh venues for cyber attacks
What’s going on here?
Which of These is a Breach Threat
A B C
How is it happening?
Plus “Old School” Threats
What are the factors contributing to the problem?
FBI Director Mueller
Recent Events
World’s Biggest Data Breaches
Data Breach = Identity Fraud
Discussing Risk
“What you’re seeing now is hackers gone wild”
Healthcare: Under Attack
111 million Individuals affected by healthcare data breaches
2+ million Victims of medical identity theft
$22, 346 Average cost of a medical identity theft incident
$50 Value of medical identity on black market
$70 to $234 Billion
Amount lost each year through healthcare fraud
Combatting Risk
“Offense is your best defense”
Who Would You Call for a Water Leak?
A B C
Don’t do your own breach response:
• Is breach response what your business does best?
• Business interruption • Consider the problems that may arise: printing
errors, porn hotlines • Ensuring a defensible approach, special
handling of communications
Best Practices
Planning and Defense
Average Cost of a Breach
Ponemon Institute, 2015 Cost of Data Breach Study: United States, May 2015
Good Advice
“Accept that they can get in and then design the strategy with the assumption they are already inside.”
More Good Advice
“When your company is hacked, you will not want to start spending money like a drunken sailor.”
Summary: Key Points
• You are at risk (sorry) • Force the hard
conversations, the sooner the better
• Create and TEST your response plan
• Revisit your response plan frequently
LMS TECHNOLOGY Fast, Powerful, and Beautifully
Simple
RESOURCES Custom Content
Professional Services
Simply Put:
CONTENT Hundreds of Courses
Subject Matter Experts
Regularly Updated
Thank You!