Data breaches occur when sensitive, confidential, or protected information is accessed or disclosed without proper authorization.
Go deeper: Healthcare data breaches: Insights and implications
These breaches involve the unauthorized access or theft of physical devices or documents.
Example:Community Mercy Health Partners (CMHP) inadvertently disposed of patient lab records in a public recycling dumpster. The records, which included sensitive patient data such as names, health information, and Social Security numbers, were found in the dumpster by law enforcement.
According to the 2020 Internet Crime Report (IC3) report, the FBI received 15,421 internet/digital crime complaints related to tech support fraud and from victims in 60 countries. This makes digital environments a common target for attackers.
Example: In February 2024, Change Healthcare, a subsidiary of UnitedHealth Group, fell victim to a ransomware attack that significantly impacted the US healthcare system. This attack disrupted key services, including claims processing and prescription management, and delayed patient care across the country. Sensitive medical data, such as diagnoses, medications, and test results, was exposed, affecting millions of Americans.
Read also: Types of cyber threats
Threats can also come from within an organization. The 2024 Insider Threat Report found that in the past year, 83% of organizations reported at least one insider attack.
Mistakes can lead to significant data exposure.
Example: A recent example of an accidental breach in the US healthcare sector is the case where a family practice group experienced a breach due to a misdelivery of an email. In this incident, an employee from a billing company sent an email containing sensitive patient information for 70 individuals to the wrong address. The email was not encrypted, and efforts to contact the unintended recipient were unsuccessful. The breach led to the disclosure of protected health information (PHI), and the healthcare group had to comply with HIPAA breach notification requirements.
Organizations rely on third-party vendors, which can become weak links.
Example: In July 2024, HealthEquity fell victim to a supply chain attack that resulted in the theft of sensitive patient data. A compromised personal device of a business partner allowed threat actors to access HealthEquity's systems.
Cybercriminals exploit human behavior to gain access to sensitive information.
Example: On 12 August 2024, Linus Sebastian, the founder of Linus Tech Tips (LTT), received a suspicious email claiming to be from X (Twitter).
In the news: Black Basta Ransomware group targets Microsoft Teams for attacks
While primarily disruptive, DDoS attacks can serve as distractions for data theft.
Example: In early 2023, the KillNet group, a pro-Russian hacking collective, targeted several healthcare organizations with distributed denial-of-service (DDoS) attacks.
Stolen login credentials from previous breaches are used to gain unauthorized access to accounts.
Example: Roku, the streaming service, revealed that 576,000 accounts were compromised due to a credential stuffing attack. Hackers used automated bots to enter stolen login credentials from other websites into Roku's login pages, targeting users who use the same passwords across different platforms.
Unauthorized sharing or exposure of data due to improper handling.
Example: Real Estate Wealth Network accidentally exposed sensitive personal and financial information of millions of individuals, including high-profile celebrities, because they left database folders unprotected by passwords. This was a clear case of unsecured data sharing, as the data was accessible to anyone who knew where to find it, without any cyberattack being involved.
Exploiting weaknesses in software applications can grant attackers unauthorized access.
Example: Between November and December 2023, ResumeLooters, compromised retail and recruitment websites using open source tools and penetration testing frameworks in its SQL injection attacks.
See also: HIPAA Compliant Email: The Definitive Guide
Organizations handling large amounts of personal, financial, or health-related data are at higher risk. This includes industries such as: