Threats, Vulnerabilities and Countermeasures

2347 Words10 Pages
Threats, Vulnerabilities and Countermeasures | SPS and SMF November 16th 2011 Breach of Security | Table of Contents Threat Successfully Breached 3 Analysis of Breach4 Consequences4 Countermeasures5 Countermeasure 15 Countermeasure 25 Countermeasure 35 Countermeasure 46 Conclusion6 Appendix A: Security Incidents Reporting Example7 Appendix B: Incidents Involving Personally Identifiable Information (PII) Example:10 References12 Threat Successfully Breached Sutter Physicians Services (SPS) and Sutter Medical Foundation (SMF) – two affiliates within the Sacramento California based Sutter Health network of care – announced the theft of a company-issued password-protected unencrypted desktop computer from SMF’s administrative offices in Sacramento the weekend of October 15, 2011[Micro, Trend 2011] . Following the discovery of the theft, Sutter Health took a month to notify individuals of their healthcare information being breached. Also, Sutter did not alert all effected; reason given: the others were in a too broad a category to contact about the breach. Sutter also stated, the computer did not contain patient financial records, social security numbers, patients’ health plan identification numbers or medical records. While no medical records themselves were on the computer, some medical information was included for a portion of patients. According to Sutter Health notification page, the stolen computer held a database that included two types of information: For approximately 3.3 million patients whose health care provider is supported by Sutter Physician Services (SPS), the database included only the following patient demographic information dated from 1995 to January 2011: name, address, date of birth, phone number and email address (if provided), medical record number and the name of the patient’s health insurance plan. SPS is an

More about Threats, Vulnerabilities and Countermeasures

Open Document