brain scan

More Than One Billion Medical Images Remain Unprotected On The Web

Some security experts and lawmakers have criticized the Department of Health and Human Services for failing to enforce privacy laws and fine organizations that did not protect patient records.

Over a billion medical images remain exposed due to hospitals, medical offices and imaging centers running insecure storage systems, according to a TechCrunch report.

The storage systems allow anyone with an internet connection and free software to access the sensitive images, about half of which belong to patients in the U.S. The number of exposed images has only increased since the issue was first revealed in September by ProPublica.

At first, a security firm found that the number of images was 720 million. Now, the problem has grown to 1.19 billion scans, and medical offices have not taken action to secure their servers since being notified by security researchers who discovered the issues.

“The amount of data exposed is still rising, even considering the amount of data taken offline due to our disclosures,” Dirk Schrader, who led research at the security firm Greenbone Networks, told TechCrunch, adding: “It seems to get worse every day.”

Patients are largely unaware of the fact that their medical images are being stored online for nearly anyone to see, and that the exposed information puts them at a higher risk of being targeted for insurance fraud and identity theft, according to TechCrunch.

Nearly 600 million images could be secured if all remaining medical offices removed their accessible servers from the internet. But even after being contacted by the news outlet about the status of their servers, many did not take action.

Lawmakers and former Department of Health and Human Services officials say that more must be done to address the lack of privacy and security standards for health organizations. While medical records are protected by HIPAA, the main privacy law for medical patients, HHS has not done enough to enforce penalties for security lapses, according to Sen. Mark Warner (D-Va.).

“To my knowledge, Health and Human Services has done nothing about it,” Warner told TechCrunch. “As Health and Human Services aggressively pushes to permit a wider range of parties to have access to the sensitive health information of American patients without traditional privacy protections attached to that information, HHS’s inattention to this particular incident becomes even more troubling.”

Last year, one Tennessee medical imaging company was fined $3 million for accidentally exposing a server containing 300,000 records. Former government officials said that there needs to be more security assistance available to smaller health organizations so that HHS would have more resources to dedicate to enforcing security violations.

“It may be too big of a problem for any single law enforcement agency to truly put a dent in,” said Deven McGraw, a former top privacy official in HHS’ Office of Civil Rights, which enforces the law.

In response to the criticism, the Office of Civil Rights defended its past actions to enforce HIPAA security violations.

“OCR has taken enforcement action in the past to address violations concerning unprotected storage servers, and continues robust enforcement of the HIPAA rules,” a spokesperson told TechCrunch.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.