Medicare to Be Reviewed After Recent Data Breach

Just recently, Medicare got to experience the beauty that is a security breach. For a quick refresher, hackers obtained Medicare details and sold them on the dark web under the guise “The Medicare Machine”.

The breach was acknowledged after several victims purchased their own Medicare card numbers off the dark web, in hopes of evading trouble.

“It follow revelations a Guardian Australia journalist was able to buy their own Medicare details from a darknet trader who is illegally selling the information by “exploiting a vulnerability” in a government system.”

Since then, an official statement has been released describing the upcoming activities in the Medicare world: the government is demanding a review be done.

“The Turnbull government has commissioned a review of the accessibility by health providers of Medicare card numbers. The system, which has not been significantly altered since being brought in 8 years ago, has to be both convenient and utterly secure.”

Leading the review will be the former head of the department of Prime Minister and Cabinet, Professor Peter Shergold.

Since the public acknowledgement of the breach, “The Medicare Machine” is still up and active. On the other hand, the information is much less sensitive now that the card numbers can no longer be used.

Medicare users exposed in the breach are also receiving new card numbers. In addition to the review on the Medicare system, users are also promised an updated system with unmatchable security features.

“The review will also investigate the online connection between external medical software providers and the online database, as well as the security checks used to prevent people from accessing numbers illegally.”

In today’s cyber generation, we no longer have the opportunity to avoid cyber threats. One way or another, they will hit us . . . and we need to be prepared. If every company is actively strengthening their online wards, then ultimately a colossal breach can be avoided.

At least, that’s a best case scenario.

Related posts

Apple Addressed Two Zero-Day Flaws In Intel-based Macs

Really Simple Security Plugin Flaw Risks 4+ Million WordPress Websites

Glove Stealer Emerges A New Malware Threat For Browsers