ZOLL Services Company’s Data Breach Analysis Essay

Exclusively available on IvyPanda Available only on IvyPanda

Introduction

Over the last several years the healthcare sector of the USA has witnessed a considerable amount of data breach cases. One such attack took place in March 2019 and compromised data of more than 277,000 ZOLL Services customers due to an error during the server migration (Davis, 2019). The data included medical information, birth dates, and other communications. The purpose of this paper is to discuss what significant concept the organization should have taken into consideration in order to avoid the data breach.

We will write a custom essay on your topic a custom Essay on ZOLL Services Company’s Data Breach Analysis
808 writers online

The Possible Reasons for the Attack

It is possible to note that ZOLL Services, a vendor of medical devices, works with a large amount of its customers’ data, including their personal information. Moreover, one of the tasks of the company is to maintain the information provided (Davis, 2019). This kind of communication might play a significant part in the work of the whole company. It can also affect the reputation and financial condition of the organization. At the same time, dealing with large quantities of personal and medical information might be not an easy matter. According to Cheng, Liu, and Yao (2017), “it is challenging for companies to protect data against information leakage in the era of big data” (p. 2). So, it is obvious, that, in spite of the fact that ZOLL Services pays a considerable amount of attention to security, it has missed an important factor.

In order to find out the problem that has led to ZOLL Services becoming a victim of fraud, it is necessary to give consideration to the performance of a safety structure. A data security system is a complex scheme that encompasses many parts. An error can occur in each of them at any time. Taking into account the opportunities to use stolen information in fraudulent ways, given by the internet, counter-moves are required as soon as possible. Based on the assumption of these facts, it is important for a company to manage control over the data security system efficiently. As it is described by McLaughlin and Olson (2017), “a response procedure or plan should be developed to address situations in which a process fails to perform as it should” (p. 396). So, it is possible to note that ZOLL Services did not manage to create an efficient and rapid breach response mechanism and embody the concept of control in a proper way. The lack of control eventually led to the fraudulent use of the customers’ data.

The Means to Tackle the Problem

The ways to strengthen control and avoid such situations, as the one that ZOLL Services has found itself in, may vary from company to company. They depend on the area of activity of an organization. However, an important step for companies of all working fields is to qualify the case after having detected malicious activity. Researches note that they should investigate the case according to the scope and areas affected (Fowler, 2016). Taking such measures might help to prevent future cases of fraudulent attacks.

Conclusion

To sum up, it might be significant to note that today cybersecurity is an important matter for the USA, especially for the healthcare sector of the country. Recently it has seen an anxiously big number of phishing attacks on medical and healthcare organizations. Companies dealing with healthcare fell victim to such cases of fraudulent activity. Speaking of the case of ZOLL Services, it might be concluded that the attack was possible due to their poor control system. Nowadays, different ways to tackle the problem of cyber-attacks are suggested by researches. Hopefully, the company will use it to avoid similar situations in the future.

References

Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: Causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), 1-14.

Davis, J. (2019). Web.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

Fowler, K. (2016). Data breach preparation and response: Breaches are certain, impact is not. Amsterdam, The Netherlands: Elsevier.

McLaughlin, D., & Olson, J. (2017). Healthcare operations management 3rd ed. Chicago: Health Administration Press.

Print
Need an custom research paper on ZOLL Services Company’s Data Breach Analysis written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2021, August 9). ZOLL Services Company's Data Breach Analysis. https://ivypanda.com/essays/zoll-services-companys-data-breach-analysis/

Work Cited

"ZOLL Services Company's Data Breach Analysis." IvyPanda, 9 Aug. 2021, ivypanda.com/essays/zoll-services-companys-data-breach-analysis/.

References

IvyPanda. (2021) 'ZOLL Services Company's Data Breach Analysis'. 9 August.

References

IvyPanda. 2021. "ZOLL Services Company's Data Breach Analysis." August 9, 2021. https://ivypanda.com/essays/zoll-services-companys-data-breach-analysis/.

1. IvyPanda. "ZOLL Services Company's Data Breach Analysis." August 9, 2021. https://ivypanda.com/essays/zoll-services-companys-data-breach-analysis/.


Bibliography


IvyPanda. "ZOLL Services Company's Data Breach Analysis." August 9, 2021. https://ivypanda.com/essays/zoll-services-companys-data-breach-analysis/.

Powered by CiteTotal, easy citation generator
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1