They Did It Again! You Might as Well Have No Security
I sometimes get aggravated when I read about the ‘newest’ data breach to hit the news. UnityPoint Health is notifying 1.4 million patients that their records may have been breached. Don’t you just love it when the word ‘may’ is used. Either they were hacked, or they were not hacked.
Oh, and this isn’t the first breach this organization experienced. In April, an attack breached the data of 16,000 patients. According to the article I read, “The health system’s business email system was hit by a series of targeted phishing emails that looked like they were sent from an executive within UnityPoint. An employee fell victim to the emails, which gave hackers access to internal email accounts from March 14 until April 3.” What is wrong with this picture? What happened to the ‘may’ have been breached? Sounds to me that it was clear.
Investigators seem to attribute the breach to attempting to divert vendor or payroll payments. Neither system was impacted by the attack – just patients, I guess. The hacked accounts included protected health information, such as names, addresses, medical data, treatment information, lab results, and insurance information. For some of the 1.4 million patients, their payment cards and social security numbers were included in the breach.
What are victims supposed to do? Fine and dandy, if they are offered identity protection, but, come on now, it is after the fact. In this case, UnityPoint didn’t even do that. UnityPoint reset the passwords on the compromised accounts, conducted mandatory phishing education for employees, added security tools to identify suspicious emails, and implemented multi-factor authentication, according to company officials.
There is software available that can reduce these types of attacks. Admittedly, phishing and business email compromise (BEC) are much harder to catch. We offer a technology framework comprising multi-term metadata generation, auto-classification, and taxonomy management. conceptClassifier for Exchange automatically generates multi-term metadata using Concept Searching’s unique compound term processing technology.
Both email attachments and text within the body of emails are addressed by this solution. If needed, users with appropriate authority can change classifications on the fly or via the taxonomy manager.
Workflows can be easily implemented and used to identify the presence of confidential and sensitive information or compliance and governance violations. Authorized end users can develop the workflows using phrases, subjects, and multi-word terms. So similar concepts not included in the search criteria are also identified and retrieved.
With the average cost of a data breach now running at $3.9 million, the price of additional tools to beat the bad guys seems like a drop in the ocean.