As seen in the case of the data breach experienced by Familylinks, the organization noticed suspicious activity in one of their employee email accounts. This suspicious activity led the organization to believe that there may have been an incident that compromised data security.
Suspicious activity is one of the common indicators of a data breach. It can be spotted through monitoring tools and techniques such as network monitoring tools, intrusion detection systems (IDS), security information and event management (SIEM) systems, as well as regular audits and penetration testing.
A HIPAA breach is the unauthorized access of protected health information (PHI). Breaches can occur in the following ways:
An indicator of compromise (IOC) is evidence that someone may have breached an organization's network.
These IOCs and IOAs include unusual network activity, unauthorized access attempts, unexplained file changes or deletions, spikes in help desk activity, and unexpected shutdowns or system crashes.
Breach tools such as network monitoring tools, IDS, and SIEM systems detect threats inside your network and alert you to leaked data that can be used to gain unauthorized access to PHI. They also monitor activity on the dark web to identify illegal trading of personal information.
The following aspects of breach tools are what make it possible to detect breaches:
Take immediate action to isolate and investigate the breach and then fulfill the notification requirements.
The HIPAA Breach Notification Rule requires covered entities and their business associates to provide notification following a breach of PHI.
Train employees on data security best practices and phishing awareness and implement the latest password policies, multi-factor authentication, regular software updates, and data encryption.
Related: Preventing HIPAA violations