Healthcare Leaders Admit Serious Gaps in Data Breach Response, Survey Finds

March 5, 2018
When it comes to responding to a cybersecurity attack, healthcare leaders point to serious gaps in the processes about how to respond to a breach, particularly about training and being informed about standard operating procedures, according to a recent poll conducted by KPMG.

When it comes to responding to a cybersecurity attack, healthcare leaders point to serious gaps in the processes about how to respond to a breach, particularly about training and being informed about standard operating procedures, according to a recent poll conducted by KPMG.

In a survey of 154 healthcare and life sciences leaders, KPMG found that more than half (51 percent) of respondents said that written operating procedures about how to respond to a cyber attack either don't exist or they are unaware of what those standards are for responding to varying types of cyber events and elevated incidence that impact an organization. 

With so many different types of threats, from insider threats, to malware, to direct hacking and penetration, organizations need to have multiple cyber response plans and process as well as simulate these through annual "war games,” according to the researchers.

The poll, which was conducted during a recent KPMG webcast, It's not a question of if you will experience a breach, it's a question of when. Are you able to respond to today's cyber threats?, also found:

  • 29 percent of respondents did not know what actions an organization took once a cyber attack or data breach was resolved. Technology upgrades were seen by 15 percent of respondents and training was improved at another 14 percent. Staffing or leadership were changed in a combined 17 percent of respondents' organizations. Another 24 percent responded that they didn't have a breach.
  • 25 percent of respondents said data compromises after a cyber attack were resolved within a day and another 15 percent said "a few days" and 16 percent found the issue to linger more than a week.
  • Lack of training was the biggest weakness in cyber security defenses (29 percent), topping dealing with third parties (20 percent).
  • The loss of confidential information from a cyber-attack was the biggest source of damage from a breach (41 percent), but the second largest response was "reputation damage" at 27 percent. 

"To borrow a phrase from the movie ‘Cool Hand Luke,’ ‘What we've got here is a failure to communicate,' and that certainly applies to healthcare organizations in their cyber attack protocols and response plans," said Michael Ebert, partner, and KPMG's cyber leader for healthcare. "Healthcare IT leaders need communicate more effectively and frequently about the tremendous risks and potential ramifications tied to cyber incidents, and that includes training. If you look at cyber strategy as needing people, processes and technology, many organizations are falling short on the process."

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...