In June 2024 the OCR Breach Portal listed 46 incidents affecting 3,825,082 patients. The most affected group was healthcare providers, reporting 33 incidents affecting 3.5 million patients. This was followed by business associates who reported 6 incidents, affecting 273,373 patients. Health plans also reported 7 incidents, affecting 25,905 patients. We’ll examine what caused June 2024 healthcare breaches and how they could have been prevented.
31 Hacking Incidents Affected 2.5 Million
The majority of the time, hacking incidents are the main cause of healthcare breaches, and in June 2024, this was the case. The 31 hacking incidents reported in June 2024 represented 65% of patients affected by June incidents.
Who reported hacking incidents, and how many patients were affected?
- 22 healthcare providers, 2,234,844 patients
- 5 business associates, 259,009 patientsÂ
- 4 health plans, 6,665 patients
How to Prevent Hacking
As hacking incidents have become the leading cause behind healthcare breaches for several years, minimizing your risk of being targeted is crucial.
Security Risk Assessments and Remediation
Security risk assessments (SRAs) are vital for security and compliance. An SRA aims to identify weaknesses and vulnerabilities in your security practices to prepare yourself against potential threats. Once SRAs have been conducted, it is essential to create remediation plans to address any identified deficiencies.
Employee Cybersecurity Training
A significant portion of hacking incidents results from phishing emails. Employee cybersecurity training is essential to your organization’s overall security posture. Employees should be trained on recognizing phishing attempts and what to do if they suspect an incident has occurred.
12 Incidents of Unauthorized Access or Disclosure
In June 2024, 12 incidents of unauthorized access or disclosure were reported. These incidents affected 1,319,305 patients, representing 34% of patients affected by June incidents.
Who reported these incidents, and how many patients were affected?
- 8 healthcare providers, 1,285,701 patients
- 3 health plans, 19,240 patients
- 1 business associate, 14,364 patients
How to Prevent Unauthorized Access or Disclosure
As we mentioned, there are two ways in which unauthorized access or disclosures occur – inappropriate employee access or unauthorized access by another entity.
Policies and Procedures and Employee Training
HIPAA policies and procedures are essential to HIPAA compliance as they guide employees on what is appropriate. HIPAA requires employee use and disclosure of PHI to be limited to the minimum necessary to perform their job functions. Your policies and procedures should dictate this, and employees should be trained on the policies and procedures to be aware of their obligations.Â
User Authentication, Access Controls, and Audit Controls
To ensure adherence to the minimum necessary standard, you must implement user authentication, access controls, and audit controls. User authentication provides unique login credentials for each employee, while access controls enable administrators to designate different PHI access levels using those unique login credentials. Also, based on the implementation of unique login credentials, audit controls track access to data to ensure that PHI is accessed appropriately by each employee.
June Improper Disposal and Theft of PHI
Three other incidents were reported in April 2024, affecting 4,018 patients. One was classified as improper disposal, and the other two were incidents of PHI theft. These incidents affected 0.11% of patients affected by June 2024 healthcare breaches.Â
Proper PHI Disposal
The Privacy Rule does not dictate that any particular methods to dispose of trash containing PHI be used. Nonetheless, the Department of Health and Human Services (HHS) has developed guidance related to PHI disposal methods. Under this guidance, proper paper PHI disposal methods may include, but are not limited to:
- Shredding,
- Burning,
- Pulping,
- Pulverizing, or
- Other methods that render PHI unreadable and unable to be reconstructed.
Proper PHI disposal may also be accomplished by:
- Maintaining labeled prescription bottles and similar forms of PHI in a secure area in opaque bags; andÂ
- Using a business associate disposal vendor to remove and shred or otherwise destroy the PHI.Â
Other methods of disposal may also be appropriate, depending on the circumstances. Covered entities, in developing their policies and procedures, should consider the steps that other prudent healthcare and health information professionals are taking to protect patient privacy in connection with record disposal. In addition, if a covered entity is winding up a business, the covered entity may wish to consider giving patients the opportunity to pick up their records prior to any disposition by the covered entity.
When covered entities and business associates dispose of ePHI or electronic media that contains ePHI, they should make sure that the ePHI or electronic media are rendered unusable, unreadable, and/or inaccessible.Â
One common method of disposal that ensures data is rendered unusable, unreadable or inaccessible, is known as degaussing. Degaussing involves the application of a magnetic field to magnetic data, fully erasing the data in the process.
Another method of HIPAA ePHI disposal is known as clearing, which is using software or hardware products to overwrite media with non-sensitive data.Â
Entities that do not have degaussing equipment can dispose of electronic media by physically damaging it beyond repair, making the data inaccessible. HIPAA ePHI disposal can also be performed by disintegrating, pulverizing, melting, or incinerating the media. Â
Hardware, such as a physical hard drive, may be disposed of by physically damaging the drive beyond repair. This process is known as physical shredding.