Secuvy

Lessons Learned From Massive Healthcare Cyberattack

It’s not often a cyberattack affects a substantial portion of Americans. In early 2024, UnitedHealth Group confirmed a ransomware attack on its subsidiary, Change Healthcare, resulting in a significant theft of Americans’ private healthcare data. The attack compromised files containing personal and protected health information. A new hacking group, RansomHub, began publishing portions of the stolen data, aiming to extort further ransom from the company.

How The Cyberattack Happened

A ransomware group gained unauthorized access to Change Healthcare’s network by utilizing stolen credentials for a remote access system. The intruders operated within the network for over a week undetected, then executed a ransomware attack. This enabled them to siphon a substantial volume of data from the company’s infrastructure.

The cyberattack triggered widespread disruptions in pharmacies and hospitals across the United States. For an extended period, healthcare professionals encountered difficulties in verifying patient benefits, dispensing medications, and processing necessary authorizations for medical procedures. Two months after the cyberattack, pharmacy services returned to near-normal levels, according to UnitedHealth.

“We know this attack has caused concern and been disruptive for consumers and providers and we are committed to doing everything possible to help and provide support to anyone who may need it,” said Andrew Witty, chief executive officer of UnitedHealth Group.  

As of mid-April, the cyberattack cost UnitedHealth more than $870 million in losses. The impact was so wide-reaching and disruptive, the Biden administration launched an investigation into the attack.

Issues Highlight Needed Guardrails

Two major issues led to the ransomware attack. First, multifactor authentication protocols were not enabled on the application that was hacked, a person familiar with the investigation told the Wall Street Journal. Multifactor authentication (MFA) provides an added layer of security and can help prevent bad actors from gaining access to a platform. The average user is accustomed to MFA, usually through text message codes or access tokens.

The second issue involved the ransomware group working undetected for a week before carrying out the attack. While the investigation is still under way, it’s alarming for any organization to realize hackers can quietly roam through its network. The good news – companies can learn lessons from this attack and ensure it has guardrails in place to reduce its risk and keep intruders out. 

Secuvy Solutions To Prevent Cyberattacks

Secuvy offers comprehensive cybersecurity solutions aimed at preventing cyberattacks on organizations. Our self-learning AI platform is proactive – not reactive. It reduces risk by discovering, and classifying sensitive data while detecting anomalous patterns and potential threats that human oversight might miss. Secuvy delivers a 360° continuous data visibility with 99+% accuracy at 4 times the performance of the current leading data discovery offerings – with a savings of up to 90% of the current costs. 

Through advanced threat detection and prevention mechanisms, Secuvy employs state-of-the-art technologies to safeguard sensitive data and infrastructure from malicious actors. By conducting regular vulnerability assessments and penetration testing, Secuvy identifies potential weak points in an organization’s network and implements robust security measures to mitigate risks effectively. Additionally, Secuvy can help empower your staff to recognize and respond to potential threats proactively.

What Secuvy Offers

We can show you how:

  • To discover & classify ALL sensitive personal data including unstructured and SaaS on a single platform
  •  To quantify your exposure risk
  • To build an inventory of your sensitive data
  • To map your data flows and get visibility into data linkages
  • To automate processing DSR requests including data retention/deletion across endless data silos
  • To build and manage policies to protect personal data access and comply with global privacy laws

Contact us today to schedule a demo and take the next steps in fortifying your organization’s cyber security. 

Related Blogs

Best Practices for Data Classification in ISO 42001 Compliance

Using Data Classification for Effective Compliance When working toward ISO 42001 compliance, data classification is essential, particularly for organizations handling

Getting Started with Data Classification for ISO 42001 Compliance: A How-To Guide

Laying the Groundwork for ISO 42001 Compliance Starting the journey toward ISO 42001 compliance can seem complex, but with a

A Comprehensive Guide To Data Subject Access Request (DSARs)

A Data Subject Access Request (DSAR) is the means by which a consumer can make a written request to enterprises

November 15, 2024

Using Data Classification for Effective Compliance When working toward ISO 42001 compliance, data classification is essential, particularly for organizations handling large amounts of data. Following...

November 12, 2024

Laying the Groundwork for ISO 42001 Compliance Starting the journey toward ISO 42001 compliance can seem complex, but with a strategic approach, companies can lay...

November 07, 2024

A Data Subject Access Request (DSAR) is the means by which a consumer can make a written request to enterprises to access any personal data...

November 07, 2024

VRM deals with managing and considering risks commencing from any third-party vendors and suppliers of IT services and products. Vendor risk management programs are involved...

October 30, 2024

With organizations storing years of data in multiple databases, governance of sensitive data is a major cause of concern. Data sprawls are hard to manage...

October 30, 2024

 There has been a phenomenal revolution in digital spaces in the last few years which has completely transformed the way businesses deal with advertising, marketing,...

October 30, 2024

In 2023, the California Privacy Rights Act (CPRA) will supersede the California Consumer Privacy Act (CCPA), bringing with it a number of changes that businesses...

October 09, 2024

For years, tech companies have developed AI systems with minimal oversight. While artificial intelligence itself isn’t inherently harmful, the lack of clarity around how these...

September 25, 2024

Navigating the Shift in AI Compliance Regulations The latest revisions in the Justice Department’s corporate compliance guidelines signal a significant shift for companies that rely...

September 18, 2024

Introduction The threat landscape around data security evolves each year due to factors like a lack of robust security measures, improper data handling, and increasingly...

August 09, 2024

On July 25, 2024, the European Commission released its Second Report on the Application of the General Data Protection Regulation (GDPR), offering an in-depth look...

August 06, 2024

In today’s fast-paced technological landscape, the intersection of AI, data security, and compliance has become a focal point for enterprises aiming to leverage AI’s capabilities...

July 16, 2024

Today Artificial Intelligence (AI) is a part of our day-to-day activities, and knowingly or unknowingly, it impacts our actions and decision-making. With the growing use...

July 03, 2024

Single platform, privacy-driven security is the future To our colleagues in the data privacy and security space, Over the past few months, I’ve been asked...

July 03, 2024

Growing concerns over data breaches have led to a flurry of data regulations around the world that are aimed at protecting sensitive information about individuals....

June 11, 2024

Data Subject Request. What’s the Impact of Not Fulfilling? In today’s digital age, data privacy has become a paramount concern for individuals and regulatory bodies....

May 13, 2024

It’s not often a cyberattack affects a substantial portion of Americans. In early 2024, UnitedHealth Group confirmed a ransomware attack on its subsidiary, Change Healthcare,...

May 08, 2024

Inventorize personal information with data mapping and meet compliance requirements Organizations have numerous data sources spread across their IT landscape, which they use to collect,...

May 02, 2024

The State of Washington passed the My Health My Data Act (MHMDA), which is a groundbreaking data privacy law focused on protecting personal health data....

April 15, 2024

Essential CPRA Compliance Checklist: Ensuring Business Adherence to California’s Data Privacy Regulation The residents of California have a legal right to know what personal information...

Ready to learn more?

Subscribe to our newsletters and get the latest on product updates, special events, and industry news. We will not spam you or share your information, we promise.

Career Form

By subscribing, you consent to the processing of your personal data via our Privacy Policy. You can unsubscribe or update your preferences at any time.