Healthcare Data Breaches Lag Other Industries
Dom Nicastro, for HealthLeaders Media
, August 20, 2010
Monitor and filter egress network traffic: Incoming traffic is one thing, but monitor, understand, and control outbound traffic.
Change your approach to event monitoring and log analysis. "In most attacks, the victim has several days or more before data are compromised," the report says. "Breaches take a long time to discover and when that finally happens, it usually isn't the victim who finds it. Finally, almost all victims have evidence of the breach in their logs. It doesn't take much to figure out that something is amiss and a few changes are in order."
Dom Nicastro is a contributing writer. He edits the Medical Records Briefings newsletter and manages the HIPAA Update Blog.