Paubox Weekly Fully Automated - A HIPAA compliant email security Podcast
Fully Automated is your weekly rundown of the biggest healthcare cybersecurity stories, delivered in a conversational format by Alex and Jen, two AI hosts who break down breaches, vulnerabilities, and compliance news with clarity, a little dark humor, and always a practical takeaway. Perfect for healthcare IT leaders, administrators, and compliance officers who want to stay informed without wading through the noise.
Paubox Weekly Fully Automated - A HIPAA compliant email security Podcast
Navia Benefit Solutions announces breach impacting nearly 3 million
Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.
Another week, another round of breach notifications in our inboxes. How are you holding up, Jen?
SPEAKER_00Oh, you know, reading about nearly three million people's data exposed before my first coffee. Living the dream.
SPEAKER_01That's the Navia story, right? The benefits administrator?
SPEAKER_00Yeah. Three weeks.
SPEAKER_01The attackers had access for three weeks before anyone noticed. And Navia works with over 10,000 employers. So this isn't just one organization's problem.
SPEAKER_00Exactly. And here's the thing: no financial data was taken, but names, social security numbers, dates of birth, that's plenty for phishing campaigns. Or identity theft. Or both.
SPEAKER_01The takeaway here for administrators?
SPEAKER_00Know your vendors. Really know them. What's their detection capability? How fast can they spot unauthorized access? Because their blind spots become your blind spots.
SPEAKER_01Speaking of access, there's this Iran-linked group, Pay2Key, that hit a US healthcare provider.
SPEAKER_00Right. And the entry point? A compromised admin account. They sat in there for days before deploying ransomware. Days. Days. And this wasn't some sophisticated zero-day exploit. It was a privileged account that wasn't being monitored properly.
SPEAKER_01So the fix isn't exotic. It's fundamentals.
SPEAKER_00Privileged access management.
SPEAKER_01Let's talk about Kettering Health. 44 lawsuits after a ransomware attack delayed patient care.
SPEAKER_00The Interlock group claimed they exfiltrated almost a terabyte of data before encrypting systems. And when the ransom wasn't paid, they followed through.
SPEAKER_01These lawsuits allege patients were actually harmed by delays in treatment.
SPEAKER_00Which is the nightmare scenario, right? It's not just about data anymore. It's about care delivery, about someone not getting their medication on time, or their surgery postponed.
SPEAKER_01What should health systems be thinking about here?
SPEAKER_00Resilience. Can you maintain operations during an attack? Do you have offline workflows? Have you actually tested your incident response plan? Or is it just a PDF somewhere?
SPEAKER_01And then there's Open Loop, telehealth platform. A lone threat actor claims to have data from over 3 million people.
SPEAKER_00And reportedly, Open Loop paid him to take down the listing.
SPEAKER_01Does that work?
SPEAKER_00I mean, does it ever? You're trusting a criminal to honor a deal, and you've just signaled to every other threat actor that you'll pay. So what's the better path? Invest in prevention, detection. Have a real plan before you're negotiating with someone who calls himself stuck in 2019.
SPEAKER_01We should mention Essen Medical Associates.$4 million settlement after their 2023 breach.
SPEAKER_00Nearly a million individuals affected. The lawsuit alleged negligence. And now there's a settlement fund, class representatives getting service awards. It's expensive.
SPEAKER_01The cost of a breach isn't just the breach.
SPEAKER_00It's the litigation, the remediation, the reputation hit, the settlement. It compounds.
SPEAKER_01So when we look at all of this together, Navia, pay to key, kettering, open loop, essen, what's the thread?
SPEAKER_00None of this is bad luck. It's bad configurations, blind spots, gaps that were probably fixable before the attack happened.
SPEAKER_01Privileged accounts without proper monitoring, vendors without adequate detection, incident response plans that weren't tested.
SPEAKER_00And the good news, if we can call it that, is that most of this is addressable. It's not about buying some magic solution. It's about doing the fundamentals consistently.
SPEAKER_01Which is easier said than done, but still within reach.
SPEAKER_00It is. And honestly, that should be motivating, not depressing.
SPEAKER_01On that almost optimistic note, thanks for listening, everyone.
SPEAKER_00Stay patched, stay vigilant, and maybe audit those admin accounts this week. See you next time.