Protecting Your Healthcare Portal - PowerPoint PPT Presentation

About This Presentation
Title:

Protecting Your Healthcare Portal

Description:

In fact, health care insurance related data breaches are already 10 times more frequent than data breaches in the financial services sector. – PowerPoint PPT presentation

Number of Views:4
Slides: 7
Provided by: sanjay2015
Category:

less

Transcript and Presenter's Notes

Title: Protecting Your Healthcare Portal


1
health care insurance
2
Protecting Your Healthcare Portal
The evolution from paper to online medical
records is an opportunity to engage patients more
fully in their care while making healthcare
organizations more efficient. However, while
patients enjoy the convenience of self-service
access to all of their medical information, the
portals offer cybercriminals a one-stop-shop for
identity theft as well.
3
According to Identity Theft Resource Center in
San Diego, medical identity theft is the fastest
growing type of identity theft, increasing at 32
annually. And unlike stolen credit card
information, which is often detected within a few
transactions, medical identity theft often goes
undetected for over a year.
In fact, health care insurance related data
breaches are already 10 times more frequent than
data breaches in the financial services sector.
4
Stolen medical identities are used by criminals
in two ways obtaining medical care under the
victims identity and using the identities to
fraudulently bill for services or durable goods,
which were never delivered. Problem lists,
which are a mandated component of patient
portals, are particularly useful to criminals,
because they allow classification of each victim
by the type of fraud which their identity could
support. 
5
Most patient portals use simple password
protection, which can be easily captured by
key-logging malware. This type of malware lays
dormant on the victims machine, waiting for the
victim to log into a patient portal site. When
the patient logs in, the malware wakes up and
captures the victims username and password.
Using the stolen credentials, the criminals can
get into the site, and once in can collect
extensive information about the victim.
6
Follow us on
https//www.facebook.com/BajajAllianz
http//www.linkedin.com/company/653474
https//plus.google.com/BajajAllianzGIC/posts
https//twitter.com/BajajAllianz
https//www.youtube.com/user/BajajAllianzGIC
https//instagram.com/bajajallianzgeneral/
Write a Comment
User Comments (0)
About PowerShow.com