Avoidable ‘Collateral Damage’ from Data Breaches

May 1, 2014
A report released on April 29 by Javelin Strategy and Research has found that a high percentage of consumers avoid doing businesses that have experienced data breaches. The report focuses on three industries: healthcare, as well as the financial and retail sectors.

A report released on April 29 by Javelin Strategy and Research has found that a high percentage of consumers avoid doing businesses that have experienced data breaches. The report focuses on three industries: healthcare, as well as the financial and retail sectors.

Among healthcare providers, 30 percent of patients will seek a new provider if their hospital or doctor’s office suffers a data breach. It also noted that, to supplement the limited resources of the Department of Health and Human Services (HHS), state attorneys general may now pursue civil cases related to data breaches on behalf of the federal agency. These civil cases may open the door to costly fines in addition to brand damage of the breached healthcare providers, it says.

In addition to declining revenue, the report said that post-breach expenditures go up significantly. The offer of identity protection services is a common practice across all of the industries surveyed, but especially so in healthcare: 54 percent of providers offer victim identity protection services (IDPS). The report maintains that while consumers may benefit due to the wide range of sensitive personal identifiable information and personal health information they share with their providers, IDPS generally offers poor protection against medical identity fraud.  This results in unnecessary costs to the provider organization and a false sense of security for consumers, it says.

The report recommends that provider organizations conduct ongoing risk assessments as a preventative measure, and that the process should incorporate a “sensitive data management” program, which can be tailored to each organization. Such a program should include five steps:

  1. Sift through irrelevant data to identify sensitive information;
  2. Classify sensitive information and assign accountability to manage and protect it;
  3. Secure unprotected files and remove at-risk data;
  4. Centrally monitor policies, actions, and good behavior going forward; and
  5. Report compliance with policy and regulation.

The survey was conducted among 5,634 U.S. adults over age 18 in October 2013. The report was sponsored by Identity Finder, LLC. Javelin maintains independence in its data collection, findings and analysis, and says the sponsor was not involved with the tabulation of the survey data or analysis.

Sponsored Recommendations

A Cyber Shield for Healthcare: Exploring HHS's $1.3 Billion Security Initiative

Unlock the Future of Healthcare Cybersecurity with Erik Decker, Co-Chair of the HHS 405(d) workgroup! Don't miss this opportunity to gain invaluable knowledge from a seasoned ...

Enhancing Remote Radiology: How Zero Trust Access Revolutionizes Healthcare Connectivity

This content details how a cloud-enabled zero trust architecture ensures high performance, compliance, and scalability, overcoming the limitations of traditional VPN solutions...

Spotlight on Artificial Intelligence

Unlock the potential of AI in our latest series. Discover how AI is revolutionizing clinical decision support, improving workflow efficiency, and transforming medical documentation...

Beyond the VPN: Zero Trust Access for a Healthcare Hybrid Work Environment

This whitepaper explores how a cloud-enabled zero trust architecture ensures secure, least privileged access to applications, meeting regulatory requirements and enhancing user...