<img height="1" width="1" src="https://www.facebook.com/tr?id=156746741685952&amp;ev=PageView &amp;noscript=1">
SCHEDULE A CALL
Show all

Breach Risk Analysis: A Four-Step Plan

Data breaches have long been a nuisance for many industries, including healthcare and financial services.

In the age of our current public health crisis, HIPAA-covered entities must follow all reasonable safeguards to protect the privacy of their patients who may be infected with the novel coronavirus (COVID-19).  However, the HIPAA Privacy Rule does offer some accommodations in such cases.

Business owners need to be prepared, and should always have a plan in place should a worst-case scenario occur.  One method of preparation is to understand what is a Breach Risk Analysis.

In this blog, we will give tips on how to plan for a data breach and what to do when it occurs.

Got breached? Implement a four-step plan

taskin-ashiq-_X-f0s20tcM-unsplash

A data breach occurs when sensitive information about an individual is lost, stolen, hacked, or inappropriately disclosed.  Any time an organization suspects that one of these incidents has occurred, it should immediately perform a Breach Risk Analysis. 

This analysis can be conducted by implementing this four-step plan:

  1. Determine what type of data was involved
  2. Determine which person or organization the data was stolen by or disclosed to
  3. Determine if the person or organization acquired or viewed the data
  4. Document mitigating actions that were taken by the organization.

Let's stay a closer look at each step. 

Determine the type of data that was stolen

The first step the organization should take is to examine the type of data that was involved in a breach.  This step is crucial, as it helps the organization understand the significance of the data that may have been exposed. 

Even if the information breached seems minimal, it needs to be determined if information about an individual can be reconstructed.

If the breached data is found to contain sensitive information, such as client names, dates of birth, and social security numbers, the organization may have to enact extra services like extending credit reporting to the affected individuals. 

Determine which person or organization the data was stolen by or disclosed to

This step allows the organization to understand the parties involved in the breach and their responsibilities and motivations as they related to the exposed data.

For example, if a healthcare organization accidentally discloses Protected Health Information to another healthcare organization, that healthcare organization is still bound by HIPAA rules to protect the privacy and security of that patient data. However, if the same patient information is inadvertently disclosed to a private business or individual, the obligation to protect data is not in place.

If the data is found to be accessed by criminals, such as hackers, the organization must assume more nefarious attention. 

Hackers are more likely to sell data so crimes like fraud or identity theft are likely committed. Anytime sensitive data is accessed by hackers or criminals, the organization should consider involving legal representation and law enforcement.

Contact Us For a Security Risk Assessment Proposal

Determining if the person or organization acquired or viewed the data 

This difficult but necessary step allows an organization to determine if sensitive information was actually viewed by an unauthorized third party. 

Therefore, if the data breach involved something like spyware or ransomware, the organization must perform a forensic analysis to ascertain if not only information was viewed, but also ex-filtrated.

Other instances of breaches may involve sensitive information being sent to the wrong party, such as errant fax or email.  In these instances, it is important for the organization to confirm that the recipient has properly disposed of the sensitive information.

Document mitigating actions made

Data Breach markus-spiske-KeFyYzxqmH0-unsplash

Organizations should not wait until the level of exposure from a breach is determined before they start performing mitigating actions.  If the breach had a technical aspect, such as ransomware, the organization must document actions such as restoring backups, removing malicious software, and any forensic analysis that was performed.

If the breach involved improper disclosure, the organization should document that the data was properly disposed of by the third party.

Organizations will always be at risk for data breaches.  The best step they can take is to be prepared for when this happens, not if.

It is always a best practice to have a breach response plan in place, and any organization can put one together by incorporating the four steps described in this blog.

Take it a step further and talk to an expert. 24By7Security provides Cyber Incident Management and a host of Training options to empower you.  

Anirudh Nadkarni
Anirudh Nadkarni

Anirudh Nadkarni holds a Bachelor of Arts degree with a major in History from the University of Florida. As a Senior Security Analyst at 24By7 Security, Inc., his main focus in on compliance. Anirudh’s role includes performing on-site Security Risk Assessments, assisting in the development of Privacy and Security Policies & Procedures, and conducting HIPAA training for healthcare providers and their staff. Anirudh is certified as a Health Care Information Security and Privacy Practitioner (HCISPP) from ISC2, HITRUST Certified CSF Practitioner (CCSFP) and as a Certified Data Privacy Professional (CDPP) from Network Intelligence. Sign up for the 24By7Security blog and follow Anirudh’s musings.

Related posts

December, 10 2024
August, 20 2024
August, 6 2024

Comments are closed.

Telehealth, Video Tech Tools and HIPAA Compliance
Foresight 2020: Rock the CASB for Cloud Security
Subscribe to our Blog!