Montana Health Department Hacked - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Comments
Montana Health Department Hacked
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
marcomputer
50%
50%
marcomputer,
User Rank: Apprentice
7/4/2014 | 10:07:04 AM
Husband love Inversion table
My Husband Buy It on Amazon and He love It So much.

He Create a Blog About Inversion table
Alison_Diana
50%
50%
Alison_Diana,
User Rank: Author
6/30/2014 | 12:06:00 PM
Re: Re : Montana Health Department Hacked
That is a definite worry. Programmer Barnaby Jack hacked pacemakers -- for a good cause. And he died just before he was going to demonstrate how to attack implanted heart devices he said could kill someone from 30 feet away. If one person can do that, who knows how many other smart people can accomplish the same thing? Add a network to IoT implanted devices and you have a lot of potentially dangerous devices.
SachinEE
50%
50%
SachinEE,
User Rank: Ninja
6/30/2014 | 11:44:01 AM
Re : Montana Health Department Hacked
In a world that is going connected with IOT in healthcare systems as well (where everything is controlled using sensor outputs), hackers may be using this sensitive data to alter the healthcare systems offered to a patient (sounds sci-fi, but the scenarios can be present where hackers can remotely switch off the life support systems for a patient who is an important political figure).
Alison_Diana
50%
50%
Alison_Diana,
User Rank: Author
6/30/2014 | 11:22:15 AM
Re: Unlawful brushing to servers on the increase
Providing 12-months of monitoring has become the default CYA whenever there's a breach. What happens on Day 366 or 367, I wonder? This question isn't aimed specifically at Montana. They're following the customary pattern, a pattern we see day in, day out. I can't think of a better solution and it's always easier to criticize than resolve a problem, but I do wonder if there isn't a better approach -- other than ensuring data is more secure from the get-go, of course!
SachinEE
50%
50%
SachinEE,
User Rank: Ninja
6/28/2014 | 6:19:17 AM
Re: Unlawful brushing to servers on the increase
Hackers breached a server in the State of Montana's Department of Public Health and Human Services, prompting officials to notify 1.3 million people of the incident. No evidence has been found to show that this information was used maliciously but worse could have been done. The institution is right to offer free credit to patients offering them the security of their personal information and identity. Institutions should now be careful and cautious in order to avoid being victims of this rising of breaches into systems.
Alison_Diana
50%
50%
Alison_Diana,
User Rank: Author
6/27/2014 | 3:58:19 PM
Re: A least they notified everyone
I asked, @BryanB but they were really close-mouthed about the products, tools, or practices they use. And, to be honest, i can't blame them from not wanting to share what they use -- since that would probably make it easier for hackers to break in again. And they also didn't want to discuss their newer tools, unsurprisingly. It is impressive how fast they notified people, especially when you think about the long lapses often involved in retail data thefts.
Alison_Diana
50%
50%
Alison_Diana,
User Rank: Author
6/27/2014 | 3:56:31 PM
Re: The Other Side
That's a great point. The last time I applied for a credit card online I had to answer a secondary round of questions about past addresses, people in my household, and cars -- that really put my mind at ease because it adds a second layer of security. It really should be on credit card companies, loan companies, and other financial (and other) service providers to no longer merely accept those three pieces of information as adequate for opening an account.
BryanB881
50%
50%
BryanB881,
User Rank: Apprentice
6/27/2014 | 1:28:23 PM
A least they notified everyone
Atleast they reported it quicker than most private companies who never report a breach.  Curious what tools they used, multi scanning, dynamic or static analysis.  Really how they found the breach.
jagibbons
50%
50%
jagibbons,
User Rank: Ninja
6/26/2014 | 4:54:48 PM
Re: The Other Side
That is an issue that needs to be addressed. There need to be more mechanisms in place that make it harder to use someone else's identity. It's very similar to the cell phone kill switch that is now coming out. If we can find ways to take the value out of the stolen data by making it less usable, that will help address the demand.

It still doesn't negate the need for stronger security, though.
Number 6
50%
50%
Number 6,
User Rank: Moderator
6/26/2014 | 10:41:17 AM
The Other Side
The other side of these hacking stories needs to be covered, too. Why is it so easy for someone to get credit in your name with only 3 pieces of info- name, SSN, birthdate? Hackers gaining financially from the data they're stealing provides much of the motivation to do it.
Page 1 / 2   >   >>


State of the Cloud
State of the Cloud
Cloud has drastically changed how IT organizations consume and deploy services in the digital age. This research report will delve into public, private and hybrid cloud adoption trends, with a special focus on infrastructure as a service and its role in the enterprise. Find out the challenges organizations are experiencing, and the technologies and strategies they are using to manage and mitigate those challenges today.
Commentary
Get Your Enterprise Ready for 5G
Mary E. Shacklett, Mary E. Shacklett,  1/14/2020
Commentary
Modern App Dev: An Enterprise Guide
Cathleen Gagne, Managing Editor, InformationWeek,  1/5/2020
Slideshows
9 Ways to Improve IT and Operational Efficiencies in 2020
Cynthia Harvey, Freelance Journalist, InformationWeek,  1/2/2020
Register for InformationWeek Newsletters
Video
Current Issue
The Cloud Gets Ready for the 20's
This IT Trend Report explores how cloud computing is being shaped for the next phase in its maturation. It will help enterprise IT decision makers and business leaders understand some of the key trends reflected emerging cloud concepts and technologies, and in enterprise cloud usage patterns. Get it today!
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll