cyber-security education can stop vigilante hackers gone wild! · • leading cause of data...

Post on 08-Jul-2020

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Cyber-Security Education Can Stop Vigilante Hackers Gone Wild!

Presented by: Christine Arevalo,

VP, Healthcare Fraud Solutions

Our Time Together

1. Top Threats 2. Risks and Trends 3. Recommendation

and Best Practices

“Somehow your

medical records got

faxed to a complete

stranger. He has no

idea what’s wrong

with you either”

Top Threats- The Human Element

“We’re all human, and people are the constant weakness”

Malicious intent by employees

Human errors and mistakes

VS.

30% of companies experience a security incident as a result of employee activities on a social networking site.

The Human Element Explained

• 89% of organizations experienced a data breach

• 79% experienced multiple data breaches

• 45 % had more than five data breaches

• Leading cause of data breaches: • Criminal attacks • Unintentional employee actions • Third-party snafus • Stolen computing devices • Negligent handling of sensitive

patient information

• New threats such as ransomware and malware

• Breach number and frequency has yet to decline significantly in the past six years

Patient Privacy and the Security of Healthcare Data - Research Highlights

Cyber Threats – When its not an accident

New technological developments introduce fresh venues for cyber attacks

What’s going on here?

Which of These is a Breach Threat

A B C

How is it happening?

Plus “Old School” Threats

What are the factors contributing to the problem?

FBI Director Mueller

Recent Events

World’s Biggest Data Breaches

Data Breach = Identity Fraud

Discussing Risk

“What you’re seeing now is hackers gone wild”

Healthcare: Under Attack

111 million Individuals affected by healthcare data breaches

2+ million Victims of medical identity theft

$22, 346 Average cost of a medical identity theft incident

$50 Value of medical identity on black market

$70 to $234 Billion

Amount lost each year through healthcare fraud

Combatting Risk

“Offense is your best defense”

Who Would You Call for a Water Leak?

A B C

Don’t do your own breach response:

• Is breach response what your business does best?

• Business interruption • Consider the problems that may arise: printing

errors, porn hotlines • Ensuring a defensible approach, special

handling of communications

Best Practices

Planning and Defense

Average Cost of a Breach

Ponemon Institute, 2015 Cost of Data Breach Study: United States, May 2015

Good Advice

“Accept that they can get in and then design the strategy with the assumption they are already inside.”

More Good Advice

“When your company is hacked, you will not want to start spending money like a drunken sailor.”

Summary: Key Points

• You are at risk (sorry) • Force the hard

conversations, the sooner the better

• Create and TEST your response plan

• Revisit your response plan frequently

Questions?

Christine Arevalo christine.arevalo@idexpertscorp.com

LMS TECHNOLOGY Fast, Powerful, and Beautifully

Simple

RESOURCES Custom Content

Professional Services

Simply Put:

CONTENT Hundreds of Courses

Subject Matter Experts

Regularly Updated

Free 14-Day Trial

Litmos.com/trial

Thank You!

top related