HACKED

A few facts and figures

  • Texas-based Integrity Transitional Hospital: lab results of 29,514 patients were compromised
  • New Mexico Hospital, Albuquerque: medical information of over 2,800 patients were sent to incorrect addresses
  • UnityPoint Health-Allen Hospital, Iowa: stolen personal info including social security numbers of 1,620 people
  • Keck Medicin, LA: compromised with Ransomware, data files on two servers were made inaccessible to employees. The hospital did not pay the ransom

WHAT YOU NEED TO KNOW

THREATS
Unauthorized access to protected and unprotected data
Data leaking via endpoints
Viruses, Trojan horses or worms via endpoints
Trafficking and external use of stolen sensitive data
Sending classified information to the wrong recipient
Innocent provision of data, extortion or forced handover of sensitive info
RISKS
People: personal, medical, payments and financial information
Facility: internal and external information, nearly all digital data

THIS MAY HAPPEN

Legal actions by patients or their representatives following misuse of their sensitive information
Potential fines after failing to comply with local standards or to report a successful cyber-attack
Loss of integrity and reputation
Problematic patient and staff retention
Loss of manpower and work hours when handling patient complaints
Heavy financial losses resulting from successful data theft activities
Failing to comply with regulations and standards like like like EU GDPR, or HIPAA
TO PROTECT YOUR DATA
CONTACT US

Data Protection Suite Modules

product
INSPECTOR
Inspector checks both file content and metadata without preventing the natural flow of business.
READ MORE
product
REPORTER
Reporter automatically pulls strategic and periodic information into reports and distributes them to defined recipients.
READ MORE
product
ENCRYPTOR
Encryptor, a smooth-running and transparent data encryption tool, fully protects your company’s private information.
READ MORE
product
DISCOVERER
Discoverer provides the knowledge and insight for security personnel to introduce current and strong data security policies to protect sensitive company information.
READ MORE
product
PROTECTOR
Protector has the flexibility and strength to control your port and device endpoints and to shield your company against external hazards.
READ MORE
product
AUDITOR
Auditor pinpoints all usage of USB, FireWire, PCMCIA, PCI, internal storage and WiFi connections in exportable reports.
READ MORE
Click Here to Download Whitepapers in PDF Format.
Font Resize