On 3rd August 2016, Arizona situated Banner Thunderbird Medical Center a provider of healthcare declared identifying a security hack into the computers the organization maintained and that it'd soon inform staff, doctors and patients about the incident which leaked financial and personal data.
Over the year 2015, the Dark Web had been profusely holding leaked medical information. During the past month and a half, a hacker going by the handle The Dark Overlord posted nearly 10m patient data of the United States of America citizens on the Internet.
A total of 3.7m health plan users, patients, vendors and consumers were potential targets whose private details might've succumbed to the cyber assault. One of these targets was Managing Director Howard Chen of Banner Thunderbird Medical Center itself situated inside Glendale, Ariz. The data breach has been the biggest thus far this year i.e., 2016. In it, hackers acquired admission into the computer servers of Banner Health, some of the servers that processed credit or debit cards for purchases of 'food & beverages.'
At Banner Health, soon as attackers hacked the food & beverage server, the whole network became accessible to them. The incident yet again shows how important systems mapping and data mapping are for locating, recognizing and safeguarding key servers which contain secured health information. This operation would make other devices accessible too which aren't necessarily under the control of the health center while impose additional controls on them. These other devices could be of third parties maintaining a close association with the clinic.
According to Dr. Chen's attorney Rob Carey who processed the lawsuit against the organization for Banner's MD, the negligence which Banner adopted impacted innumerable people. He further stated that it was essential as per law that Banner cured the severe perils that had been created for all of Banner's stakeholders.
Dr. Chen within the lawsuit claims that identity protection and credit monitoring aren't sufficient for safeguarding individuals as online attackers would rather wait a few years before they can exploit the stolen information, usually post the credit monitoring term. Beckershospitalreview.com posted this dated August 8, 2016.