Discuss cyber policies that are tailored for specific environments, such as small business, health care (larger organizations), and at a national level. (CO 4, 5)
Communicate challenges regarding the implementation of cyber policy. (CO 4, 5)
Discuss regulations like HIPAA and SOX as well as some challenges related to implementation. (CO 4, 5)
Discuss why some agencies and legislators seek additional cybersecurity regulation and guidance. (CO 5, 6)
According to a 2016 IBM threat report, 2015 was the year of health care attacks. Some notable attacks of 2015 included Anthem, Premera BlueCross, and Excellus BlueCross BlueShield. In 2016, cyber-attacks were successfully launched against more than 100 other health care facilities. One major breach against 21st Century Oncology resulted in the theft of more than 2 million patients’ records. Breaches that affect more than 500 individuals and put health information at risk are accessible to the public. You can review this in the following resource: