2020 Healthcare Data Breach Intelligence Report
Learn the most critical controls, top healthcare threats, and lessons learned from reported data breaches.
- The number of reported healthcare breaches in 2019 increased 33% over 2018.
- Business associates were responsible for more than one out of every four data breaches.
- Multifactor authentication and disabling email forwarding rules are in the top four most cited technical security controls.
- 63% of all healthcare data breached in 2019 was due to the breach of a third-party collection agency that 23 healthcare organizations used. That vendor is now out of business and the 23 organizations are left to deal with the fallout.
You will also learn:
- The top 8 healthcare data breach threats.
- The most critical healthcare security controls (as cited by OCR).
- The state that reported the most breaches and the only state without a breach in 2019.
Plus, gain access to a data breach prevention blueprint that you can use in your 2020 planning.
Cybersecurity is at a breaking point.
3,500,000 Unfilled Cybersecurity Jobs By 2021
Rapid Growth of Data and Devices
Constantly Evolving Threats and Vulnerabilities
Organizations Are Struggling to Keep Pace
Reported Data Breaches Since 2013
Source: Identity Theft Resource Center
Challenging times demand an innovative approach.
Breach Analytics-Infused Cybersecurity
Quickly Achieve Your Cybersecurity Goals
Take years off your cybersecurity journey when you work with Go Security Pro. Avoid the pitfalls of trying to DIY what we’ve already perfected and using lower quality consultants.
Grow Your Team's Expertise
We are teachers and infuse training into every consulting engagement. We encourage shadowing and take the extra time to ensure your team fully understands how to improve its cybersecurity posture.
Gain Access to Incredible Resources
When you work with Go Security Pro you gain access to incredible resources from whitepapers to security program templates to video training and our innovative cybersecurity gamification concepts.
Learn from the Best
Led by a Carnegie Mellon University and NSA-grade cybersecurity expert, Go Security Pro brings the highest quality cybersecurity leadership and talent to your team. No need to look around for the best consultants. You’ve found us.
Become Cybersecurity Self-Sufficient
Gain systems and knowledge that will make you more independent and less reliant on consultants. Say goodbye to vendor lock-in and lost momentum once the consultant leaves.
What Others Are Saying
"I'd place my trust in Go Security Pro with Geoff Wilson at the helm. He is an expert on all aspects of cybersecurity backed by both his excellent academic credentials and many of years in the field."
"Geoff possesses strong integrity and is someone who truly cares about the evolution of the security industry. Any time I’m faced with a security related obstacle, he and the Go Security Pro team are first I turn to for advice."
"Geoff has always had a talent for taking in a huge amount of complex data, quickly discerning the most important elements, and conveying information in an easy to understand way to his clients and colleagues. That has been what has made him such a great consultant and highly valued trusted advisor. "
"I long struggled to discover a career that I enjoyed. After I worked with Geoff at Go Security Pro, I knew I wanted to be a security pro, and his training helped me become one. Highly recommended!"
Industry-Leading Cybersecurity Services
Identify your exploitable weaknesses before adversary finds them with our thorough Audit-Ready penetration tests. Our highly skilled red team finds vulnerabilities that other penetration test companies miss.
Identify your compliance gaps, minimize your compliance burden, and gain a prioritized plan to become compliant ASAP. Specializing in NIST, HIPAA, PCI, and SOC 2. Learn about our different approach.
Identify your biggest risks and demonstrate due diligence with our audit-ready risk assessments. Gain a cybersecurity benchmark against which to measure your progress.
Gain a full set of policies that will align with your business goals and keep you compliant. Periodic reviews ensure your policies reflect reality and are easily understood by the intended audience.
Virtual Information Security Officer
Achieve your cybersecurity goals in less time. Gain a cybersecurity leader as an extension of your team. Mesh compliance requirements, best practices, and business needs.
From ransomware to domain compromises, we have you covered. Become incident-ready and secure a trusted partner to assist you with responding to your next incident.