Another health care data breach was just reported this week, this time it was Milwaukee City employees who were the victims. The breach happened after a Dynacare employee’s car was stolen. In the car was the employees’ purse that had a flash drive in it containing personal health care information (PHI) the Milwaukee Journal Sentinel reports.

The city handed the data over to Froedtert Health, a public health organization. Foredtert Health then passed the data along to Dynacare who they have their clinical laboratory needs contracted out to. The stolen flash drive contained the names, addresses, DOB, genders and social security numbers of 6,000 employees, as well as an additional 3,000 spouse/partners names. The data was stolen on October 22 and was not reported by Dynacare to the city until November 15th. Apparently they reported the breach to Health and Human services prior to the city, but the city is still very upset at the late notice. What is most concerning is that fact that the data was given to Froedtert encrypted, but it was not encrypted as it changed hands down the line.

Being that this breach was just reported it is still unknown just how bad this could turn out and how much it will end up costing the involved parties. In our blog last week, University Health was responsible for providing credit monitoring and identity theft for one year to those individuals whose data was lost. Providing this service is pretty commonplace, it is safe to assume that they will responsible for providing similar services at the very least. Costs can add up quickly, so there is a strong possibility that they will be on the hook for more.

This is simply another case of not having a proper procedure from beginning to end. While the data did not walk off from the facility, it might as well have. There needs to be a strict process in place that all vendors and third party business associates need to follow. This process needs to be enforced and adhered to every step of the way. It doesn’t matter who is the most responsible for the breach, all parties involved are responsible in the end, and it’s their patients that are taking a hit.

[vc_row type=”grid” row_type=”section” bg_image_repeat=”repeat” padding_top=”24″ padding_bottom=”24″][vc_column dp_animation=””][vc_separator][/vc_column][/vc_row][vc_row type=”grid” video_bg=””][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-left”][/vc_column][vc_column width=”1/2″ dp_animation=””][vc_widget_sidebar sidebar_id=”posts-footer-block-right”][/vc_column][/vc_row]

case studies

See More Case Studies

Datacenters are a cybersecurity target

I’m a recovering intelligence officer. I’m always a recovering intelligence officer for one trauma or another. And I’ve had the benefit, the pleasure, the honor to apply a lot of those skills I use in defense of our nation in the commercial section and in the commercial world as well, rising all the way to chief operating officer of a company that I thought was pretty obscure.

Learn more

Loss of data hurts everyone

Whether I’m a nation state targeting data, whether I’m a criminal enterprise targeting data, or a transnational organization targeting that, that data is valuable. And while it’s valuable to me, there is a negative externality to the people that I’m taking it from as well. It’s not a victimless crime, right?

Learn more

Datacenters are the obvious target

Anybody ever watch storage wars?
You can go on the dark web and buy drives like you were buying a storage unit. “I’ll give you a thousand dollars for that storage unit”. I know there’s got to be a couple thousand bucks worth of stuff in it. Your data out there is the same way.

Learn more
Contact us

Why risk it alone?
Get started today.

We’re happy to answer any questions you may have and help you determine which of our services best fit your needs.
Your benefits:
What happens next?
1

Schedule a call at your convenience

2

We do a discovery and consulting meeting 

3

We prepare a proposal 

Schedule a Free Consultation