• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Unprecedented Healthcare Data Breach Puts 80M at Risk

Even though many of us are still struggling with remembering to write 2015 and not 2014, we may already have a winner for the biggest hack of the New Year. That unfortunate distinction falls on the Indianapolis, IN-based Anthem, Inc. Anthem, the nation’s second-biggest health insurer, has announced a data breach which could affect a truly staggering 80 million people.

Anthem believes the names, birthdays, addresses and Social Security numbers of current and former customers, as well as employees, were exposed by the breach. At this time, the insurer doesn’t believe hackers were able to gain access to sensitive medical records or credit card or bank account numbers.

The investigation into the mega-breach is still ongoing, so the number of people affected – as well as what was nabbed – could fluctuate. Still, Anthem has already admitted it’s likely that “tens of millions” of records were stolen so it’s doubtful this whole thing is being blown out of proportion. If that 80 million figure turns out to be true, it would top many of the other high-profile, headline-grabbing hacks from the last few years. For example, the J.P. Morgan breach compromised contact information for about 76 million households and Target’s cyberattack affected 40 million payment cards.

If you only look at the healthcare industry, then the Anthem breach becomes essentially unprecedented in magnitude. It dwarfs the previous largest confirmed hacker theft in the healthcare sphere, which was last year’s digital break-in at Community Health Systems, Inc., a hospital operator. That breach involved the records of 4.5 million customers.

The breach has been called “sophisticated” in The Wall Street Journal by security experts and the prevailing theory is that those responsible made use of specialized, “very advanced” techniques instead of more readily available tools. That means this probably wasn’t just any garden variety band of hackers.

There’s some speculation right now that both the Community and the Anthem breaches originated from the same place: China. According to MSN, a few security pros are kicking the tires on the idea that the Anthem breach was really part of a state-sponsored effort to uncover personal info on US defense contractors, but nothing has been confirmed.    

Of course, there’s always the possibility this attack had less-nefarious motives behind it and was simply done for the money. Medical records can fetch a pretty penny on the black market. In fact, they’re even more valuable than certain financial records. According to some estimates provided by NPR, medical records could net a hacker $40-50, while credit card account information may only be worth $4-5.

That could put a giant bulls-eye directly on any organization tied into healthcare, making proper and hardened IT security an even more critical concern for the vertical. The Federal Government is so interested in security that it’s a core part of its recent strategic Healthcare IT plan for 2015-2020. A no-cost security architecture consultation from Arraya can help you secure weaknesses before they can be exploited by hackers. Speak to your Arraya Solutions Account Executive to hear more or click here to set-up your free consultation.   

If you’d like to learn more about Arraya’s healthcare solutions, please visit http://go.arrayasolutions.com/healthcare.html. Follow Arraya on Twitter @ArrayaSolutions

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}