logo

Computer Security Breach: Torrance Memorial Medical Center

9 Pages2442 Words105 Views
   

Added on  2020-03-01

Computer Security Breach: Torrance Memorial Medical Center

   Added on 2020-03-01

ShareRelated Documents
PART ACOMPUTER SECURITY BREACH TOOK PLACE AT TORRANCE MEMORIAL MEDICAL CENTERINTRODUCTIONTorrance Memorial Medical Center, a California based medical facility suffered a security data breach on 18th and 19th of April 2017. As per them, two email accounts have been hacked which contain reports which are work related and due to the phishing attack theygot compromised. The attack led to even stealing of the personal data as well. However, therehas been news with regards the misutilization of any data stolen, however this can be no reason for the medical center not taking any steps against the same. As is understood that one of the most methodologies were used for the said attack to be conducted due to which it makes it very clear that the medical centre had failed to take adequate steps to address issues. Unfortunately, phishing is one such campaign which is successful even now, even when it is known by all as to how to safeguard one’s systems against this kind of an attack. Thereby it is clear that the individuals even now fail to be extra cautious before accessing there mails and opening attachments from unknown sources (Socal, 2017). ASSESSMENT OF THE ISSUEOn conducting a thorough investigation of the said case, it is concluded that a simple way of hacking i.e. phishing is used by the malicious people to enter into the system of the medical center and hack two prominent email accounts which contained specific work relatedreports and documents. However, the main issue here is that it is still not known by them whether the stolen data has been used for unscrupulous acts or not (Daily Breeze. 2017). Even if there has been no tampering with the data stolen, yet the theft has occurred of
Computer Security Breach: Torrance Memorial Medical Center_1
sensitive information such as names, address, date of birth, contact number, medical history of patients, health insurance data and such other information which is categorized as critical. The hospital authorities are sending warning letters to all those whose data have been infected thereby ensuring them that they are protected well. However, here the main issue is negligence on the part of the center who have opened up such mails and the attachments within it without taking into the account the sender’s details and whether the same has been sent from an authorized source or not. Not to forget, hospitals are one of the main places fromwhere one can obtain huge amount of income and the fact that the Torrance memorial became a victim makes it clear of the loose ends available in the existing security panels (NewsBreak Live. 2017). SOLUTIONS TO PREVENT SUCH HACKSOne of the biggest solution to such a kind of problem is to be extra cautious before opening up any mails. Checking up of the sender details is a must specially at such important centers like hospitals. Further to this, crucial, sensitive as well as critical data should be shared not via mails but either personally or via very secured sites which have strong encryption facilities. The system also dialed to have a good spam detector facility and also a firewall installed which should be done immediately. The fact that data has been leaked is a big risk as it can be tampered at any moment. Further to this, Torrance Memorial Medical Center should check on the practice and train the people who are employed to be aware of such unwanted spam. Although they have sent notices to all the patients whose data has been compromised, they have even offered them free credit monitoring as well and individuality robbery shield services for a year (DistilNFO HitTrust Advisory. 2017). Last but not the least, the victims are asked to be watchful as well as cautious with regards such occurrences of robbery and fraud, to keep a
Computer Security Breach: Torrance Memorial Medical Center_2
check on the bank account and to scrutinize on a timely basis for no-cost credit reports and explanation of benefits forms for apprehensive actions. It clearly shows that the hackers are always active in a dormant manner and find such traps wherein even a single employee’s casualness can lead to a situation as adverse as this wherein the personal records of various patients are at stake (Davis,2017). One very most important step taken by Torrance Memorialis that they had immediately intimated HHS about the occurrence of the said hack which generally various entities avoid to do so. Lastly, all the patients who are intimated about such a hack, should immediately ensure that the bank account details shared with the medical center be informed to the respective banks about the fact that such a tampering has occurred and thereby not to release payments if request come from unauthorized people or such other suspicious people (Massive Media. 2017). CONCLUSIONThereby on analyzing the entire case of the said security breach, one can summarize the fact that the staff and the employees of the medical center need adequate training with regards the malicious acts that can occur with the systems and how cautious they are requiredto be. Opening up of emails without checking the credentials, can be as fatal as this and in turn even lead to occurrence of unwanted events against the patients. Phishing is one of the most way of hacking and Torrance Memorial failing to take precautions against the same is surprising. Adequate updates about spam is a must without which the system would always remain vulnerable to such attacks. The particular case is a perfect example of negligence which has led to happening of the said security breach.
Computer Security Breach: Torrance Memorial Medical Center_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Yahoo Data Breach Case Assignment
|9
|3207
|30

The Bronx-Lebanon Hospital Center Data Breakage
|10
|2377
|257

Cyber Defense in Web-Based Attacks | Study
|6
|1596
|13

Information System Breaches - Yahoo
|4
|1091
|38

Impact of Database Security Breaches
|5
|680
|32

Marriott Data Breach: Impact and Prevention
|6
|1591
|48