{"id":388,"date":"2016-09-20T14:40:11","date_gmt":"2016-09-20T20:40:11","guid":{"rendered":"https:\/\/www.morphis-insights.com\/?p=388"},"modified":"2024-01-26T11:10:19","modified_gmt":"2024-01-26T11:10:19","slug":"data-breaches-healthcare-industry","status":"publish","type":"post","link":"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/","title":{"rendered":"Data Breaches in the Healthcare Industry"},"content":{"rendered":"<p>Large and small companies, banks, other financial organizations, governmental agencies and especially groups in the healthcare industry are all being forced to pay increased attention to cybersecurity. Overseeing cybersecurity threats is becoming more difficult as software systems grow older and are no longer flexible enough to support the needs of modern businesses.<\/p>\n<p>This problem is magnified when we are discussing the healthcare industry, though, as healthcare systems and hospital databases can be a sort of one-stop shop for hackers aiming to steal personal information. Not only are names, addresses, birthdates, Social Security numbers and claims information kept within healthcare databases, but sometimes credit card and bank account numbers used to process payments are also stored there.<\/p>\n<p>As stated by Joseph Conn of <a href=\"http:\/\/www.modernhealthcare.com\/article\/20160806\/MAGAZINE\/308069966\/health-systems-an-ideal-target-for-hackers\" target=\"_blank\" rel=\"noopener\">Modern Healthcare<\/a>, \u201ccriminals regard healthcare records as more valuable than credit card records because their data elements, such as birthdates, addresses and Social Security numbers, can&#8217;t be readily changed.\u201d<\/p>\n<p>As a result of the Affordable Care Act, which requires providers to adopt electronic health records whether or not they were financially prepared to invest in cybersecurity, many healthcare providers are turning to outdated or clunky software systems to store patient records. Unfortunately, these aging systems are far more prone to breaches than modern systems are, leaving patients at risk.<\/p>\n<p>According to the <a href=\"http:\/\/lpa.idexpertscorp.com\/acton\/attachment\/6200\/f-04aa\/1\/-\/-\/-\/-\/Resources - Sixth Annual Benchmark Study on Privacy and Security of Healthcare Data .pdf?cm_mmc=Act-On Software-_-email-_-ID Experts Download - Sixth Annual Benchmark Study on Privacy &amp; Security of Healthcare Data-_-Download Now&amp;sid=TV2:pIRViiona\" target=\"_blank\" rel=\"noopener\">Sixth Annual Benchmark Study on Privacy &amp; Security of Healthcare Data<\/a> by the Ponemon Institute, data breaches could be costing the healthcare industry an estimated $6.2 billion. Some of the recent breaches \u2014 like the <a href=\"http:\/\/www.modernhealthcare.com\/article\/20160803\/NEWS\/160809954\/banner-health-cyberattack-impacts-3-7-million-people\" target=\"_blank\" rel=\"noopener\">Banner Health attack<\/a> in which 3.7 million individuals may have had their personal information compromised \u2014 exhibit the growing nature of this issue.<\/p>\n<p>Banner Health, an Arizona-based health system with locations throughout seven states, said that hackers gained access to credit and debit card information through point-of-sale systems that process data at more than 25 food and beverage outlets serving Banner locations. With 3.7 million affected individuals, the Banner Health breach is <a href=\"https:\/\/ocrportal.hhs.gov\/ocr\/breach\/breach_report.jsf\" target=\"_blank\" rel=\"noopener\">the largest of this year to date<\/a>.<\/p>\n<p>It is crucial to modernize legacy systems in order to protect patients as best as possible. With Morphis\u2019 help, healthcare systems will be able to better protect patient records thereby avoiding harmful data breaches. At Morphis, we provide complete solutions for modernizing legacy applications and, in doing so, eliminate risk while saving our clients both time and money \u2014 <a href=\"https:\/\/www.morphis-insights.com\/contact\/\" target=\"_blank\" rel=\"noopener\">contact us<\/a> before it\u2019s too late.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Large and small companies, banks, other financial organizations, governmental agencies and especially groups in the healthcare industry are all being forced to pay increased attention to cybersecurity. Overseeing cybersecurity threats is becoming more difficult as software systems grow older and are no longer flexible enough to support the needs of modern businesses. This problem is [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":387,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[82],"tags":[100],"class_list":["post-388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-modernization","tag-healthcare"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Application Modernization in Healthcare<\/title>\n<meta name=\"description\" content=\"Healthcare is being forced to pay attention to cybersecurity as data breaches continue. Legacy systems are to blame but application modernization will help!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application Modernization in Healthcare\" \/>\n<meta property=\"og:description\" content=\"Healthcare is being forced to pay attention to cybersecurity as data breaches continue. Legacy systems are to blame but application modernization will help!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/\" \/>\n<meta property=\"og:site_name\" content=\"Morphis-Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-20T20:40:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-26T11:10:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/09\/Healthcare-data-breaches.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bruno Andrade\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruno Andrade\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/\"},\"author\":{\"name\":\"Bruno Andrade\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275\"},\"headline\":\"Data Breaches in the Healthcare Industry\",\"datePublished\":\"2016-09-20T20:40:11+00:00\",\"dateModified\":\"2024-01-26T11:10:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/\"},\"wordCount\":394,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/09\/Healthcare-data-breaches.jpg\",\"keywords\":[\"Healthcare\"],\"articleSection\":[\"Application Modernization\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/\",\"url\":\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/\",\"name\":\"Application Modernization in Healthcare\",\"isPartOf\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/09\/Healthcare-data-breaches.jpg\",\"datePublished\":\"2016-09-20T20:40:11+00:00\",\"dateModified\":\"2024-01-26T11:10:19+00:00\",\"description\":\"Healthcare is being forced to pay attention to cybersecurity as data breaches continue. Legacy systems are to blame but application modernization will help!\",\"breadcrumb\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#primaryimage\",\"url\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/09\/Healthcare-data-breaches.jpg\",\"contentUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/09\/Healthcare-data-breaches.jpg\",\"width\":800,\"height\":450,\"caption\":\"Data Breaches in the Healthcare Industry\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/morphis-tech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Breaches in the Healthcare Industry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#website\",\"url\":\"https:\/\/morphis-tech.com\/blog\/\",\"name\":\"Legacy Modernization - Blog\",\"description\":\"Legacy to Cloud\",\"publisher\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/morphis-tech.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#organization\",\"name\":\"Morphis Tech\",\"url\":\"https:\/\/morphis-tech.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg\",\"contentUrl\":\"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg\",\"width\":344,\"height\":51,\"caption\":\"Morphis Tech\"},\"image\":{\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/morphis_technologies\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275\",\"name\":\"Bruno Andrade\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g\",\"caption\":\"Bruno Andrade\"},\"url\":\"https:\/\/morphis-tech.com\/blog\/author\/bruno-andrade\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Application Modernization in Healthcare","description":"Healthcare is being forced to pay attention to cybersecurity as data breaches continue. Legacy systems are to blame but application modernization will help!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/","og_locale":"en_GB","og_type":"article","og_title":"Application Modernization in Healthcare","og_description":"Healthcare is being forced to pay attention to cybersecurity as data breaches continue. Legacy systems are to blame but application modernization will help!","og_url":"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/","og_site_name":"Morphis-Tech Blog","article_published_time":"2016-09-20T20:40:11+00:00","article_modified_time":"2024-01-26T11:10:19+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/09\/Healthcare-data-breaches.jpg","type":"image\/jpeg"}],"author":"Bruno Andrade","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruno Andrade","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#article","isPartOf":{"@id":"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/"},"author":{"name":"Bruno Andrade","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275"},"headline":"Data Breaches in the Healthcare Industry","datePublished":"2016-09-20T20:40:11+00:00","dateModified":"2024-01-26T11:10:19+00:00","mainEntityOfPage":{"@id":"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/"},"wordCount":394,"commentCount":0,"publisher":{"@id":"https:\/\/morphis-tech.com\/blog\/#organization"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#primaryimage"},"thumbnailUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/09\/Healthcare-data-breaches.jpg","keywords":["Healthcare"],"articleSection":["Application Modernization"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/","url":"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/","name":"Application Modernization in Healthcare","isPartOf":{"@id":"https:\/\/morphis-tech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#primaryimage"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#primaryimage"},"thumbnailUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/09\/Healthcare-data-breaches.jpg","datePublished":"2016-09-20T20:40:11+00:00","dateModified":"2024-01-26T11:10:19+00:00","description":"Healthcare is being forced to pay attention to cybersecurity as data breaches continue. Legacy systems are to blame but application modernization will help!","breadcrumb":{"@id":"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#primaryimage","url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/09\/Healthcare-data-breaches.jpg","contentUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2016\/09\/Healthcare-data-breaches.jpg","width":800,"height":450,"caption":"Data Breaches in the Healthcare Industry"},{"@type":"BreadcrumbList","@id":"https:\/\/morphis-tech.com\/blog\/data-breaches-healthcare-industry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/morphis-tech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Breaches in the Healthcare Industry"}]},{"@type":"WebSite","@id":"https:\/\/morphis-tech.com\/blog\/#website","url":"https:\/\/morphis-tech.com\/blog\/","name":"Legacy Modernization - Blog","description":"Legacy to Cloud","publisher":{"@id":"https:\/\/morphis-tech.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/morphis-tech.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/morphis-tech.com\/blog\/#organization","name":"Morphis Tech","url":"https:\/\/morphis-tech.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg","contentUrl":"https:\/\/morphis-tech.com\/blog\/wp-content\/uploads\/2024\/06\/Logo_Blog_2024-1.svg","width":344,"height":51,"caption":"Morphis Tech"},"image":{"@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/morphis_technologies\/"]},{"@type":"Person","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/b6d9d149d3091b09f3ee9bd007183275","name":"Bruno Andrade","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/morphis-tech.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b26e477ef67cba42b8bc646722ca9ae122b8dc44bf6f5bf0c4072c2e36902b59?s=96&d=mm&r=g","caption":"Bruno Andrade"},"url":"https:\/\/morphis-tech.com\/blog\/author\/bruno-andrade\/"}]}},"_links":{"self":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/comments?post=388"}],"version-history":[{"count":1,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/388\/revisions"}],"predecessor-version":[{"id":6934,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/posts\/388\/revisions\/6934"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/media\/387"}],"wp:attachment":[{"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/media?parent=388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/categories?post=388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/morphis-tech.com\/blog\/wp-json\/wp\/v2\/tags?post=388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}