Unauthorized access and use of protected health information is the most profitable crime in the USA: Are you fully prepared to combat? [Part-2]

In the previous post , we analyzed the magnitude of medicare fraud, protected health information stakeholders and their responsibilities. Let us now examine the causes and discuss how to combat:
Protected Health Information – Threats & Vulnerabilities Threats for protected health information emanate both from external attacks and internal sources.
External Attacks – Health care enterprises come into contact with a variety of people in a variety of ways.  Sensitive information and IT resources need to be exposed or shared with partners, agencies and even customers. All these make the enterprises vulnerable to data breaches and cyber-attacks from amateur and expert hackers.