What do criminals do? They act for profit. Cyber criminals are still just criminals. They steal for monetary gain. Ransomware and just plain demanding ransoms is part of their weaponary. Exposing health and other personal information happens if the crooks think that will get the money they are after.
As the Guardian reports in Medibank says sample of stolen customer data includes details of medical procedures, the data stolen from Medibank includes details of medical procedures. The Australian has an article in a similar vein with Medibank hackers stole data on medical conditions customers and treatment. This shouldn’t be surprising. What is less understandable is how the sensitive health data was commingled with other records? Why was it not properly encrypted? Why wasn’t it siloed?
I have been writing on cyber security and data breaches for so long that I find the breathless quality of Australian media reporting of the Medibank data breach curious. It is as if this is the only and worst data breach involving health records. It isn’t by a long chalk. The Sydney Morning Herald writes of ‘Immense harm’: Federal police investigating threat to sell Australians’ health data. While the Australian enters into policy speculation with Medibank hack sparks call to end companies creating data ‘honeypots’ for hackers. Where the Australian gets it wrong is that under the current Privacy Act collection of personal information should only be for a specific purpose and used for that purpose. The legislation is deeply flawed but if properly enforced action should have been taken against companies who collect and hold onto data because it suits them. The enforcement was weak. It has always been weak. Until now no Government has not much cared.
The key is for companies to take their responsibilities seriously. That means proper regulation and enforcement whereby the cost of non compliance is high. The next issue is to make sure that when there is a data breach it is dealt with methodically and thoroughly and not turned into a cause celebre. It helps not at all if it becomes a political battleground. The company affected has to respond appropriately and quickly and the regulator may need to get involved. There will always be media coverage but it shouldn’t develop a life of its own as seems to be the case with the latest spate of data breaches in Australia. It is always worth remembering that it is a legal issue, complying with the law.
The Australian Financial Review undertakes an analysis and critique of Medibank’s responses so far with Medibank’s ransomware response is a lesson in what not to do. It is replete with talking heads wanting to get their name out as experts prognosticating on this, that or other things relating to the Medibank data breach. Much of it is speculation over analysis. That said the Medibank response has been dreadful, as bad as Optus but in a different way. Going through its media releases has been the privacy equivalent of a slow motion car crash involving a crash test dummy. Whatever data breach response plan it had was sub standard. The first 24 hours should be regarded as the Golden Hours. Getting as much information about the breach, starting on remediation and crafting a notice to the market, the clients, to government and the media is critical. Information to hand will always be incomplete but being as forthcoming
It’s latest update, Medibank cyber incident response, provides:
As we have worked through this cyber incident, Medibank has committed to transparency about what we know, and how that could impact our customers, our people, and the broader community.
This cyber incident is now the subject of an investigation by the Australian Federal Police.
We know that our customers, people, and the community want to know what data has been stolen, and how that may affect them. Read the rest of this entry »