Skip to main content

Deep Dive published results of healthcare survey:

  • 75% of hospitals, doctors and health systems are unprepared for cyberattacks that could compromise PHI of 500 patients or more
  • 96% = believe hackers are trouncing security measures in place
  • $134 billion will be spent on cybersecurity solutions in the U.S. healthcare industry over next 5 years
  • $18 billion to be spent in 2021
  • 82% do not believe that money is being spent effectively
  • Funds destined for cybersecurity are routinely spent after the breach instead of before
  • Departments outside of IT are not consulted to determine where money can be best put to use
  • 80% have not conducted a cybersecurity drill
  • 14% believe that they have improved cybersecurity practices since 2020
  • 26% believe that cybersecurity practices have worsened since 2020
  • 93% of patients would switch to another healthcare provider after breach


  • Jack Cable of Krebs Stamos Group published research on ransomware:
    • $60,270,557.92 in total tracked ransomware payments
    • $11.3 million received by REvil/Sadinokibi
  • Oklahoma Heart Hospital of Oklahoma City, OK notified an unknown number of patients that their PHI was exposed after mailing error.
  • Adobe Corp. issued multiple patches to repair security vulnerabilities in Acrobat, Reader, Illustrator, Framemaker, Dimension and Bridge applications.
  • Even though the U.S. Department of Defense announced last year that it shut down the Trickbot hacking group in Russia, it has returned with updated malware, according to BitDefender.
  • Dotty’s Gaming and Spirits, owned by Nevada Restaurant Services and Craig Estey,which has 120 locations, notified 300,000 customers that their info may have been exposed after data breach.
  • Northeast Radiology, headquartered in New York, and Alliance HealthCare notified 1.2 million patients that their PHI may have been exposed after breach.
  • The Millenia Companies, headquartered in Cleveland, OH notified an unknown number of customer residents that their info was exposed after email breach.
  • York Animal Hospital of Maine notified an unknown number of customers that their info was exposed after ransomware attack.
  • Clover Park School District of Washington notified 1,583 students that their info was exposed after ransomware attack.
  • Morgan County School District of West Virginia notified an unknown of students that their info was exposed after ransomware attack.
  • Booneville School District of Mississippi notified an unknown number of students that their info may have been exposed after cyberattack.
  • Lancaster Independent School District of Texas notified an unknown number of students that their info may have been exposed after cyberattack.
  • Whitehouse Independent School District of Texas notified an unknown number of students that their info may have been exposed after cyberattack.
  • North Country Healthcare of Whitefield, New Hampshire notified an unknown number of patients that their PHI was exposed after breach.
  • Virginia Tech University notified an unknown number of students that their info may have been exposed after cyberattack.
  • Florida Blue, headquartered in Jacksonville, FL, notified 30,000 patients that their PHI was exposed after cyber attack.
  • ClearBalance of San Diego, CA, notified over 200,000 patients that their PHI was exposed after email phishing attack.
  • Forefront Dermatology, headquartered in Manitowoc, WI, notified 2.4 million patients that their PHI was exposed after cyber attack.
  • D-Box, with US headquarters in Los Angeles, CA notified an unknown number of customers that their info may have been exposed after ransomware attack.
  • DuPage Medical Group, headquartered in Downers Grove, IL notified an unknown number of patients of a “network outage”


  • Egress Software published results of insider breach survey:
    • 54% of IT leaders believe remote working increases insider breaches
    • 97% of employee say they would report breach
    • 89% of incidents led to repercussions for employees involved
    • 54% think their organization’s security culture trusts and empowers them
    • 94% have had data breach in last 12 months

What incidents caused breach

  • 84% = human error
  • 74% = employees breaking rules
  • 73% = email phishing attack
  • 66% = malicious leak

What causes IT leaders the most concern

  • 28% = intentionally malicious act
  • 27% = email phishing attack
  • 21% = human error
  • 21% = breaking security rules


  • 27% of IT leaders feel that existing breach detection solutions would alert them of breach

If you like something I've posted please feel free to click the "like" button!

Original Post

Add Reply

Post
×
×
×
×
Link copied to your clipboard.
×
×