10 Top Security Policies from the Knowledge Network
Prevent security breaches with a solid security plan.
It's no secret that health data is a big time target for hackers and identity thieves, nor is it news that the information stolen from insurance companies or health care databases make headlines.
Why do they do it? To get rich through identity theft. ZDNet posted an article by Dana Blankenhorn who, interviewing Michael Maloof, CTO of TriGeo Network Security, pointed out that thieves want Social Security numbers, birth dates and addresses so they can get credit or other monetary gains using other people's identities. The article stated:
TriGeo offers an appliance that can sit behind your firewall, track user traffic, and detect problem patterns, even detect when someone is plugging in a USB thumb drive. This not only protects against outside criminals, but disgruntled insiders.
That's all well and good about electronic protection, but Blankenhorn originally linked to a report from the Identity Theft Resource Center as the background for his piece, and while the report is over a year old, I think the information is still relevant. And what Blankenhorn missed was a vital concern of the report: Most laws in place to protect information only focus on electronic data, not paper data. The ITRC report stated:
Unfortunately, more than 25% of the breaches year to date are paper breaches. Paper breaches are often documents with personal information disposed in trash cans or dumpsters, left for the taking by those who didn't take the time to shred them.
Even if the report isn't brand new, this is important food for thought. We worry so much about how to protect data on the computer-as we should-that sometimes the old-fashioned methods of exchanging information gets forgotten. And thieves will grab the information any way they can get it.