{"id":349,"date":"2020-02-25T08:32:25","date_gmt":"2020-02-25T13:32:25","guid":{"rendered":"http:\/\/apexcompliance.net\/blog\/target\/the-healthcare-breach-report-breaches-on-the-upsurge\/"},"modified":"2020-03-21T09:58:16","modified_gmt":"2020-03-21T13:58:16","slug":"the-healthcare-breach-report-breaches-on-the-upsurge","status":"publish","type":"post","link":"https:\/\/apexcompliance.net\/blog\/2020\/02\/25\/the-healthcare-breach-report-breaches-on-the-upsurge\/","title":{"rendered":"The Healthcare Breach Report: Breaches on the Upsurge"},"content":{"rendered":"

The vast majority of healthcare organizations utilize and store protected health information (PHI), which is composed of patients\u2019 sensitive information. HIPAA, the privacy rule that classifies PHI, describes protected health information as medical history, Social Security numbers, personal financial data, and more.<\/p>\n

In this sixth annual Healthcare Breach Report, Bitglass analyzes and compiles data from the US Department of Health and Human Services\u2019 \u201cWall of Shame.\u201d Upon analyzing the data, Bitglass uncovered the state of security for healthcare organizations in 2019. This database, composed of PHI breaches that affected over 27M individuals, is broken into four categories: hacking or IT incidents, unauthorized access or disclosure, loss or theft, and other. A snapshot of some of this data is provided below.<\/p>\n

The Rise of Mega Breaches <\/strong><\/p>\n

In 2019, there were 386 breaches \u2013 an increase of 33% since the previous year. This is due to an array of breaches that affected 15 healthcare organizations linked to Texas Health Resources \u2013 each of which impacted 20,000 \u2013 30,000 individuals. As such, Texas had the most healthcare breaches of 2019, with a total of 47 it nearly doubled the amount for California (25). Typically, this is consistent with the state population (wherein Texas and California usually rank first and second, respectively), however, this year Texas experienced far more breaches than any other state in the past.<\/p>\n

[…]<\/strong><\/p>\n

This is an excerpt from a previously published article.<\/strong><\/em><\/p>\n

Click here to view full original article at securityboulevard.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

The vast majority of healthcare organizations utilize and store protected health information (PHI), which is composed of patients\u2019 sensitive information. HIPAA, the privacy rule that classifies PHI, describes protected health information as medical history, Social Security numbers, personal financial data, and more.<\/p>\n

In this sixth annual Healthcare Breach Report, Bitglass analyzes and compiles data from the US Department of Health and Human Services\u2019 \u201cWall of Shame.\u201d Upon analyzing the data, Bitglass uncovered the state of security for healthcare organizations in 2019.… Read More <\/a><\/p>","protected":false},"author":1,"featured_media":194,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,3,49],"tags":[50,17,19,13,16,23],"_links":{"self":[{"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/posts\/349"}],"collection":[{"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/comments?post=349"}],"version-history":[{"count":0,"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/posts\/349\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/media\/194"}],"wp:attachment":[{"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/media?parent=349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/categories?post=349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/apexcompliance.net\/wp-json\/wp\/v2\/tags?post=349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}