• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security

Security Lessons from the Anthem Data Breach

An Anthem data breach exposed an estimated 80 million medical records. We need to learn from their loss.

April 29, 2015 Jonathan Blackwood Leave a Comment

Health insurance provider Anthem was recently the victim of a data breach that saw the loss of medical information for up to 80 million Americans. From what has been gathered, an IT administrator at Anthem became aware of a database query with his credentials attached. Further investigation by Anthem IT led to the discovery that client protected health information (PHI) was being held in an offside public cloud storage service. That’s when the FBI was called in to help investigate what turned out to be the largest data breach to a healthcare company.

While no credit card information nor personal health records were exposed, thieves came away with names, social security, numbers, addresses, and health coverage ID numbers, which is potentially more damaging. The use of healthcare IDs fraudulently are harder to prove, and even so, when another person uses your medical information, your medical records are changed, causing potentially life-threatening issues. Not to mention, according to Ponemon Research, PHI information can fetch as much as 10-50 dollars per record, as opposed to 1-5 dollars for credit card info.

Throwing more money at this problem isn’t necessarily the solution. Focus in recent years has been on strengthening preventive defenses against APTs and elusive malware, resulting in technologies such as sandboxing, which increases signatureless threat protection. What has been missing is an emphasis on post-infection strategies like containment. Organizations need to deploy the best preventative security possible, but as important is the need for the same level of commitment to post-infection security. Techniques like leveraging evasive ports and protocols, riding on hidden data channels, or the use of polymorphic malware that fools sandboxes, are getting past even the best security. As much as security providers believe their preventative products won’t be breached, it happens, and you need to be prepared in case it does.

Data isn’t lost until it leaves the network. That’s the mission of the malware, and it is not complete until the data is stolen. The gap between malware infection and detection and where data exfiltration occurs, is not being covered. Even if detection security, without the means to automatically stop malware data will continue to leave the network even as you work on solving the problem.

In order to close this gap, technology must detect and contain malicious data transfers:

  • Network Anomaly Detection will be critical factor to post-infection security.
  • Automatic containment is the key to reducing data exfiltration.
  • Actionable intelligence delivered in real-time speeds remediation.

With recent breaches fresh in mind, companies will want to increase network and data security efforts. Just be sure that you are closing the gaps, covering the bases, and securing all aspects of prevention, detection, and containment. Learn from the mistakes of the past and don’t get burnt in the future.

Read the full white paper at iboss Cybersecurity

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Jonathan Blackwood
Jonathan Blackwood

Jonathan Blackwood is the Editor-in-Chief of TechDecisions. Jonathan joined TechDecisions in 2014 and writes about technologies that help to innovate and improve practices for companies of all sizes, K-12 and higher education, government, healthcare, hospitality, retail and large venue spaces. He is especially interested in the future of work and education and the Internet of Things. Follow him @BlackwoodTweets.

Tagged With: Corporate, Data Backup & Recovery, Data Security, Disaster Recovery, Privacy

Related Content:

  • Cybersecurity and information or network protection. Future technology web services for business and internet project CrowdStrike Cyber Armageddon: How Do Firms Now Build…
  • DDoS, NETSCOUT Arbor Insight 7 Layers of DDoS Attacks and How To…
  • cisco webex-rooms-modern-space AVI-SPL Receives Cisco 2023 Reimagine Workspaces Partner of…
  • data breach Nearly 900 Schools Impacted by National Student Clearinghouse…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.