March 2024 Healthcare Breach Report

In another banner month for healthcare breaches, the OCR Breach Portal listed 57 incidents affecting 2,248,065 patients. The most affected group was healthcare providers, reporting 41 incidents affecting 1.3 million patients. This was followed by business associates who reported 10 incidents, affecting 920,522 patients. Health plans also reported 6 incidents, affecting 20,159 patients. We’ll examine what caused March 2024 healthcare breaches and how they could have been prevented.

42 Hacking Incidents Affected 2.2 Million

There were 42 hacking incidents reported in March 2024. These incidents affected 2,199,709, representing 97.85%% of patients affected by March incidents.

Who reported hacking incidents, and how many patients were affected?

  • 31 healthcare providers, 1,282,273 patients
  • 13 business associates, 945,852 patients 
  • 3 health plans, 4,575 patients

How to Prevent Hacking

As hacking incidents have become the leading cause behind healthcare breaches for several years, minimizing your risk of being targeted is crucial.

Security Risk Assessments and Remediation

Security risk assessments (SRAs) are vital for security and compliance. An SRA aims to identify weaknesses and vulnerabilities in your security practices to prepare yourself against potential threats. Once SRAs have been conducted, it is essential to create remediation plans to address any identified deficiencies.

Employee Cybersecurity Training

A significant portion of hacking incidents results from phishing emails. Employee cybersecurity training is essential to your organization’s overall security posture. Employees should be trained on recognizing phishing attempts and what to do if they suspect an incident has occurred.

11 Incidents of Unauthorized Access or Disclosure

There were 11 incidents of unauthorized access or disclosure reported in March 2024. These incidents affected 35,941, representing 1.6% of patients affected by March incidents.

Who reported these incidents, and how many patients were affected?

  • 5 healthcare providers, 16,961 patients
  • 3 health plans, 15,584 patients
  • 1 business associate, 3,396 patients

How to Prevent Unauthorized Access or Disclosure

As we mentioned, there are two ways in which unauthorized access or disclosures occur – inappropriate employee access or unauthorized access by another entity.

Policies and Procedures and Employee Training

HIPAA policies and procedures are essential to HIPAA compliance as they guide employees on what is appropriate. HIPAA requires employee use and disclosure of PHI to be limited to the minimum necessary to perform their job functions. Your policies and procedures should dictate this, and employees should be trained on the policies and procedures to be aware of their obligations. 

User Authentication, Access Controls, and Audit Controls

To ensure adherence to the minimum necessary standard, you must implement user authentication, access controls, and audit controls. User authentication provides unique login credentials for each employee, while access controls enable administrators to designate different PHI access levels using those unique login credentials. Also, based on the implementation of unique login credentials, audit controls track access to data to ensure that PHI is accessed appropriately by each employee.

March Theft

There were five other incidents reported March 2024, affecting 12,415 patients. Three incidents were reported as theft of PHI, one incident of loss, and one classified as improper disposal of PHI. These incidents affected less than 0.55% of patients affected by March 2024 healthcare breaches. 

Proper PHI Disposal

The Privacy Rule does not dictate that any particular methods to dispose of trash containing PHI be used. Nonetheless, the Department of Health and Human Services (HHS) has developed guidance related to PHI disposal methods. Under this guidance, proper paper PHI disposal methods may include, but are not limited to:

  1. Shredding,
  2. Burning,
  3. Pulping,
  4. Pulverizing, or
  5. Other methods that render PHI unreadable and unable to be reconstructed.

Proper PHI disposal may also be accomplished by:

  1. Maintaining labeled prescription bottles and similar forms of PHI in a secure area in opaque bags; and 
  2. Using a business associate disposal vendor to remove and shred or otherwise destroy the PHI. 

Other methods of disposal may also be appropriate, depending on the circumstances. Covered entities, in developing their policies and procedures, should consider the steps that other prudent healthcare and health information professionals are taking to protect patient privacy in connection with record disposal. In addition, if a covered entity is winding up a business, the covered entity may wish to consider giving patients the opportunity to pick up their records prior to any disposition by the covered entity.

When covered entities and business associates dispose of ePHI or electronic media that contains ePHI, they should make sure that the ePHI or electronic media are rendered unusable, unreadable, and/or inaccessible. 

One common method of disposal that ensures data is rendered unusable, unreadable or inaccessible, is known as degaussing. Degaussing involves the application of a magnetic field to magnetic data, fully erasing the data in the process.

Another method of HIPAA ePHI disposal is known as clearing, which is using software or hardware products to overwrite media with non-sensitive data. 

Entities that do not have degaussing equipment can dispose of electronic media by physically damaging it beyond repair, making the data inaccessible. HIPAA ePHI disposal can also be performed by disintegrating, pulverizing, melting, or incinerating the media.  

Hardware, such as a physical hard drive, may be disposed of by physically damaging the drive beyond repair. This process is known as physical shredding.

Healthcare Compliance Software - CG

Prevent Healthcare Breaches

Don’t fall victim to breaches. Protect your business by becoming compliant today!