ZOLL Services Company’s Data Breach Analysis Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

Over the last several years the healthcare sector of the USA has witnessed a considerable amount of data breach cases. One such attack took place in March 2019 and compromised data of more than 277,000 ZOLL Services customers due to an error during the server migration (Davis, 2019). The data included medical information, birth dates, and other communications. The purpose of this paper is to discuss what significant concept the organization should have taken into consideration in order to avoid the data breach.

The Possible Reasons for the Attack

It is possible to note that ZOLL Services, a vendor of medical devices, works with a large amount of its customers’ data, including their personal information. Moreover, one of the tasks of the company is to maintain the information provided (Davis, 2019). This kind of communication might play a significant part in the work of the whole company. It can also affect the reputation and financial condition of the organization. At the same time, dealing with large quantities of personal and medical information might be not an easy matter. According to Cheng, Liu, and Yao (2017), “it is challenging for companies to protect data against information leakage in the era of big data” (p. 2). So, it is obvious, that, in spite of the fact that ZOLL Services pays a considerable amount of attention to security, it has missed an important factor.

In order to find out the problem that has led to ZOLL Services becoming a victim of fraud, it is necessary to give consideration to the performance of a safety structure. A data security system is a complex scheme that encompasses many parts. An error can occur in each of them at any time. Taking into account the opportunities to use stolen information in fraudulent ways, given by the internet, counter-moves are required as soon as possible. Based on the assumption of these facts, it is important for a company to manage control over the data security system efficiently. As it is described by McLaughlin and Olson (2017), “a response procedure or plan should be developed to address situations in which a process fails to perform as it should” (p. 396). So, it is possible to note that ZOLL Services did not manage to create an efficient and rapid breach response mechanism and embody the concept of control in a proper way. The lack of control eventually led to the fraudulent use of the customers’ data.

The Means to Tackle the Problem

The ways to strengthen control and avoid such situations, as the one that ZOLL Services has found itself in, may vary from company to company. They depend on the area of activity of an organization. However, an important step for companies of all working fields is to qualify the case after having detected malicious activity. Researches note that they should investigate the case according to the scope and areas affected (Fowler, 2016). Taking such measures might help to prevent future cases of fraudulent attacks.

Conclusion

To sum up, it might be significant to note that today cybersecurity is an important matter for the USA, especially for the healthcare sector of the country. Recently it has seen an anxiously big number of phishing attacks on medical and healthcare organizations. Companies dealing with healthcare fell victim to such cases of fraudulent activity. Speaking of the case of ZOLL Services, it might be concluded that the attack was possible due to their poor control system. Nowadays, different ways to tackle the problem of cyber-attacks are suggested by researches. Hopefully, the company will use it to avoid similar situations in the future.

References

Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: Causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), 1-14.

Davis, J. (2019). Web.

Fowler, K. (2016). Data breach preparation and response: Breaches are certain, impact is not. Amsterdam, The Netherlands: Elsevier.

McLaughlin, D., & Olson, J. (2017). Healthcare operations management 3rd ed. Chicago: Health Administration Press.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, August 9). ZOLL Services Company's Data Breach Analysis. https://ivypanda.com/essays/zoll-services-companys-data-breach-analysis/

Work Cited

"ZOLL Services Company's Data Breach Analysis." IvyPanda, 9 Aug. 2021, ivypanda.com/essays/zoll-services-companys-data-breach-analysis/.

References

IvyPanda. (2021) 'ZOLL Services Company's Data Breach Analysis'. 9 August.

References

IvyPanda. 2021. "ZOLL Services Company's Data Breach Analysis." August 9, 2021. https://ivypanda.com/essays/zoll-services-companys-data-breach-analysis/.

1. IvyPanda. "ZOLL Services Company's Data Breach Analysis." August 9, 2021. https://ivypanda.com/essays/zoll-services-companys-data-breach-analysis/.


Bibliography


IvyPanda. "ZOLL Services Company's Data Breach Analysis." August 9, 2021. https://ivypanda.com/essays/zoll-services-companys-data-breach-analysis/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1