Reports that Huddersfield health officials have launched a high-level enquiry after a laptop containing 1,500 patient records was stolen, has been met with incredulity by Credant Technologies.
According to Sean Glynn, the endpoint data protection specialist's vice president, unlike most NHS laptop thefts, the notebook was not used as a portable and/or standalone device, but apparently formed an integral part of Calderdale Royal Hospital's electromyography scanning system.
"This probably means that the health trust didn't apply its usual risk management procedures to the device, since it ostensibly formed part of the EMG patient scanning system. The data on the system should, however, have been encrypted, if only to prevent prying eyes looking at the patient records, especially since this was a scanner looking for a potentially serious clinical condition," he said.
"What the case highlights is the fact that patient data within the NHS needs to be protected at all times, preferably using encryption, but also, where the IT system has components - such as a laptop in this case - much higher levels of security clearly need to be employed," he added.
And, he went on to say, since the EMG scanner was located in a public place, namely a hospital, with members of the public wandering in and out, the laptop should have been both physically and electronically secured, to prevent theft.
This, says the Credant vice president, clearly didn't happen, meaning that that the trust's patient data and IT security policies were broken on several fronts.
"It's no wonder that the local press in Huddersfield is reporting that the health trust has launched a full investigation. This wasn't a routine case of a laptop being stolen due to a member of staff's carelessness," he said.
"Managers should have performed a full risk analysis, and defended both the scanner’s portable component - in this case a valuable laptop - and even more importantly, the confidential patient data it contained. This is a serious lapse of NHS security policies," he added.
Glynn noted that Credant's summer 2010 research into portable data security threats - and which took in the views of 277 IT security professionals - showed that laptop and other portable data-carrying devices are the security equivalent of a ticking time bomb.
"With 11 per cent of respondents to that survey having experienced a data breach early last year, it's clearly a case of not if, but when, a laptop is likely to be stolen in a public-facing environment," he said.
"The fact that the laptop was probably classed as a medical scanner component, rather than a portable device, did not matter a jot to the thief. A laptop is a laptop, and laptops can - and do - go walkabout with annoying frequency," he added.
Meanwhile, Noa Bar-Yosef, Senior Security Strategist at Imperva, reveals how a UK-based IT expert could have hacked into the servers of game developer Zynga and stole $12m worth of gaming chips:
According to the report, the hacker gained unauthorized access by posing as a Zynga site administrator. There are a couple of possibilities to gain this access:
a. Through SQL Injection
b. Obtaining the credentials through phishing, a keylogger or bruteforcing.
Another way to view “chips” in the context of Zynga is as values in the database. Once the hacker gained the admin controls, he was able to just update the number in the relevant database records.
As this column is highly sensitive, after all, these “chips” translate to money; it would seem to be a good idea to rigorously monitor the relevant table. Such monitoring would track access to that table and alert on abnormal and suspicious behavior.