Page 117 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 117

1
            the United States.  This is unfortunately not surprising as statistics show that medical records are 50
            times  more  valuable  than  traditional  financial  information  –  the  risk/reward  is  worth  it  to  the  cyber
            criminals.

            Even in the early months of 2025, the trend persists. In its February 2025 Data Breach Report, the HIPPA
            Journal reported on 46 large health care data breaches (incidents involving 500 or more individuals),
                                           2
            affecting 1.2 million individuals.  While this showed a month-over-month reduction, the high number of
            breaches throughout 2024 suggests this may be a temporary dip in an otherwise upward trajectory.

            The causes behind this epidemic are multifaceted. According to the reported data, foremost among them
            are hacking and other IT incidents, which accounted for 74% of reported breaches in February 2025 and
            exposed the protected health information (PHI) of over 1.1 million individuals (89% of the total affected).

            These incidents encompass a range of malicious activities, including data theft, ransomware attacks, and
            the compromise of email accounts through phishing campaigns. Health providers network servers remain
            the primary target, reflecting the wealth of sensitive information they often contain. The persistent success
            of email-related breaches, with 14 such incidents reported in February 2025, underscores the critical
            need for robust email security measures and user awareness training.

            However,  the  threat  landscape  extends  beyond  external  actors.  Insider  threats,  both  in  the  form  of
            unintentional errors and deliberate malicious actions, also pose a significant risk. While perhaps less
            frequent than hacking, insider breaches can directly compromise patient privacy and erode trust in health
            care providers.
                          1
            Furthermore,  the  interconnected  nature of  the  health  care  industry  introduces  vulnerabilities  through
            business associates – third-party entities that handle PHI on behalf of covered entities. In 2024, the 2025
            Breach  Barometer  connected  breaches  involving  business  associates  to  a  remarkable  77%  of  all
                               1
            breached records.  This highlights the extended attack surface and the critical importance of ensuring
            robust security practices throughout the entire health care ecosystem.

            Despite increasing awareness and regulatory mandates like HIPAA, many health care organizations
            continue to exhibit fundamental failings in their cybersecurity posture. A significant concern is the lack of
            comprehensive  risk  analysis  and  risk  management  processes.  Without  a  thorough  understanding  of
            potential threats and vulnerabilities, organizations struggle to implement effective safeguards.

            Inadequate access controls often grant unauthorized personnel access to sensitive electronic protected
            health information (ePHI). Moreover, a recent survey produced by the HIPAA Journal indicated that at
            least 43% of HIPAA-covered entities either rely on manual processes or may not track HIPAA compliance
                  3
            at  all.   This  reliance  on  outdated  methods  can  lead  to  inconsistent  record-keeping,  increased
            administrative burdens, and a higher risk of non-compliance and subsequent breaches.

            Weaknesses in email security infrastructure, including the absence of advanced threat protection and
            multi-factor authentication, contribute significantly to the success of phishing attacks and email account
            compromises. Delayed patch management cycles leave critical systems vulnerable to known exploits,
            providing easy entry points for cybercriminals. Finally, insufficient oversight and due diligence regarding
            business associates can lead to breaches occurring within these third-party systems, with cascading
            effects.





                                                                                                            117
   112   113   114   115   116   117   118   119   120   121   122