Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
26
27
29
30
31
1
2
5
7
8
12
13
14
16
17
21
22
23
24
25
26
27
28
1
Proper Management of Medicare/Medicaid Overpayments to Limit Risk of False Claims
2015-01-28    
1:00 pm - 3:00 pm
January 28, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST Topics Covered: Identify [...]
EhealthInitiative Annual Conference 2015
2015-02-03 - 2015-02-05    
All Day
About the Annual Conference Interoperability: Building Consensus Through the 2020 Roadmap eHealth Initiative’s 2015 Annual Conference & Member Meetings, February 3-5 in Washington, DC will [...]
Real or Imaginary -- Manipulation of digital medical records
2015-02-04    
1:00 pm - 3:00 pm
February 04, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Orlando Regional Conference
2015-02-06    
All Day
February 06, 2015 Lake Buena Vista, FL Topics Covered: Hot Topics in Compliance Compliance and Quality of Care Readying the Compliance Department for ICD-10 Compliance [...]
Patient Engagement Summit
2015-02-09 - 2015-02-10    
12:00 am
THE “BLOCKBUSTER DRUG OF THE 21ST CENTURY” Patient engagement is one of the hottest topics in healthcare today.  Many industry stakeholders consider patient engagement, as [...]
iHT2 Health IT Summit in Miami
2015-02-10 - 2015-02-11    
All Day
February 10-11, 2015 iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging [...]
Starting Urgent Care Business with Confidence
2015-02-11    
1:00 pm - 3:00 pm
February 11, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Managed Care Compliance Conference
2015-02-15 - 2015-02-18    
All Day
February 15, 2015 - February 18, 2015 Las Vegas, NV Prospectus Learn essential information for those involved with the management of compliance at health plans. [...]
Healthcare Systems Process Improvement Conference 2015
2015-02-18 - 2015-02-20    
All Day
BE A PART OF THE 2015 CONFERENCE! The Healthcare Systems Process Improvement Conference 2015 is your source for the latest in operational and quality improvement tools, methods [...]
A Practical Guide to Using Encryption for Reducing HIPAA Data Breach Risk
2015-02-18    
1:00 pm - 3:00 pm
February 18, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Compliance Strategies to Protect your Revenue in a Changing Regulatory Environment
2015-02-19    
1:00 pm - 3:30 pm
February 19, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Dallas Regional Conference
2015-02-20    
All Day
February 20, 2015 Grapevine, TX Topics Covered: An Update on Government Enforcement Actions from the OIG OIG and US Attorney’s Office ICD 10 HIPAA – [...]
Events on 2015-02-03
EhealthInitiative Annual Conference 2015
3 Feb 15
2500 Calvert Street
Events on 2015-02-06
Orlando Regional Conference
6 Feb 15
Lake Buena Vista
Events on 2015-02-09
Events on 2015-02-10
Events on 2015-02-11
Events on 2015-02-15
Events on 2015-02-20
Dallas Regional Conference
20 Feb 15
Grapevine
Articles

Aug 23 : 4½ Million Medical Records Compromised. Are Your Health Secrets Safe?

personal medical data

We’ve got yet another major data breach to report that affects millions of users, this one of a very personal nature. This week, it was revealed that Chinese hackers compromised 4.5 million medical records from Community Health Systems, a hospital network with 206 facilities in the United States. Ask your doctor today if identity theft prevention is right for you.

For hackers, medical records are a valuable target, netting an average of $50 per record on the black market. Do the math; these hackers made off pretty good. Medical records are valuable because they’re loaded with sensitive information, including a patient’s name, Social Security number, birthday, address, phone numbers, and more.

It’s taken a few months for the extent of the breach to come to light, and it turns out that every patient of the Community Health Systems is directly affected and at serious risk of identity theft. Due to the large volume of personal data packed into a single medical record, a hacker with this stolen information would be able to do something as drastic as to apply for a credit card or loan under the victim’s name–a move that would ruin one’s credit.

Community Health Systems operates in 28 states, with the bulk of their offices located in Alabama, Mississippi, Oklahoma, Pennsylvania, Florida, Texas, and Tennessee. The FBI determined that the breach took place between April and June of 2014, and they’re currently investigating the crime and tracking down the criminals. The FBI suspects that those responsible are also guilty of other high-profile hacking cases.

In response to the hack, Community Health Systems is offering their customers identify theft protection, but for many, the damage may have already been done. Under the Health Insurance Portability and Accountability Act of 2006 (HIPAA), patients have the right to sue over the loss of their personal information. Therefore, the fallout from such a massive breach promises to be very messy.

Data breaches like this aren’t limited to the Healthcare Industry. Every kind of business is at risk of having their data compromised. In fact, research from the Ponemon Institute estimates that, in the U.S., each compromised record costs the affected organization $184-to-$194 per capita.

Can your business afford to be victimized by a hacker like this? Probably not. Thankfully, network security monitoring from Network-911 is a preventive solution that’s affordable. With our Managed IT services, we can detect unusual activity on your company’s network. In times like this where so many hacking stories are hitting the news, your customers will appreciate knowing that you’ve taken extensive preventative measures like managed IT to help keep their personal data safe.

Another great security solution we offer is an enterprise-level network firewall that comes with our Unified Threat Management tool. With a strong firewall, you can keep out the virtual invaders. Call Network-911 today to learn more about how we can protect your sensitive data!

Source