Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

SCENARIO: A health care system executive left their work - issued laptop, which had access to over 4 0 , 0 0 0 medical records,

SCENARIO:
A health care system executive left their work
-
issued laptop, which had access to over
4
0
,
0
0
0
medical
records, in a locked car while running an errand. The car was broken into, and the laptop stolen.
ATTACK:
Physical theft of an unencrypted device.
Encryption is the process of scrambling readable text so it can only be read by the person who has the decryption key. It creates an added layer of security
for sensitive information.
RESPONSE:
The employee immediately reported the theft to the police and to the health care system
s IT department
who disabled the laptop
s remote access and began monitoring activity. The laptop was equipped with
security tools and password protection. Data stored on the hard drive was not encrypted
this included
sensitive
,
personal patient data. The hospital had to follow state laws as they pertain to a data breach.
The U
.
S
.
Department of Health and Human Services was also notified. Personally Identifiable Information
(
PII
)
and Protected Health Information
(
PHI
)
data require rigorous reporting processes and standards.
After the theft and breach, the health care system began an extensive review of internal policies; they
created a discipline procedure for employees who violate security standards. A thorough review of
security measures with internal IT staff and ancillary IT vendors revealed vulnerabilities.
IMPACT:
The health care system spent over $
2
0
0
,
0
0
0
in remediation, monitoring, and operational improvements. A
data breach does impact a brand negatively and trust has to be rebuilt.
LESSONS LEARNED:
1
Companies must establish and train employees on secure handling of work
-
issued devices.
2
Devices must be safely stored when not in the immediate presence of the employee.
3
Companies must take steps to encrypt data wherever it is stored or transmitted. Employees
should have a clear understanding of the importance of encryption and how to use it
.
4
Companies must understand and know their responsibilities under the data breach notification
laws of the state
(
s
)
in which they operate.
5
A regular review of the company
s security practices is imperative in modern organizations to
prevent incidents, discover vulnerabilities, and to reduce impact of incidents.
DISCUSS:
Knowing how the firm responded, what would you have done differently?
What are some steps you think the firm could have taken to prevent this incident?
Is your business susceptible to this kind of attack? How are you going to reduce your risk?
please add the reference link with the solution.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Understanding Databases Concepts And Practice

Authors: Suzanne W Dietrich

1st Edition

1119827949, 9781119827948

More Books

Students also viewed these Databases questions

Question

6. Explain what causes unsafe acts.

Answered: 1 week ago