Bernard Aybouts - Blog - Miltonmarketing.com

Approx. read time: 3.6 min.

Post: Privacy commissioner investigating security of patient health records at Alberta Health Services

Expanded Analysis: Privacy and Security Concerns in Alberta Health Services (AHS)

Overview: Security Risks in Alberta Netcare Portal

The Alberta Netcare Portal, central to Alberta’s healthcare system, serves as a hub for electronic health records (EHR). It provides healthcare providers access to critical patient data, including lab results, prescription records, and diagnostic reports. However, the system came under scrutiny in 2018 after Procyon Security Group identified 108 vulnerabilities, raising alarms about patient data protection and compliance with the Health Information Act (HIA).

Historical Context of Security Concerns

In May 2018, Procyon’s assessment revealed security gaps that spanned several categories:

  1. Critical Vulnerabilities (11): These posed an immediate threat, enabling unauthorized data access.
  2. High Risks (34): Exploitable weaknesses that could compromise patient data integrity and privacy.
  3. Medium Risks (63): Issues requiring attention to prevent long-term systemic threats.

The findings suggested systemic neglect of cybersecurity best practices, with outdated infrastructure and insufficient controls on user access. This led to the launch of an investigation by Alberta’s Privacy Commissioner, Jill Clayton, to evaluate AHS’s compliance with the HIA.


Key Areas of Concern in 2018

1. Outdated System Patching

  • Issue: The system had not received any security updates since July 2014. Outdated software is one of the primary vectors for cyberattacks, leaving the Alberta Netcare Portal vulnerable to known exploits.
  • Risk: Attackers could exploit these vulnerabilities to infiltrate the database, bypass security protocols, and access patient records.

2. Insecure Password Management

  • Findings: Passwords were inadequately hashed, enabling Procyon Security Group to crack nearly 40% of user password hashes.
  • Impact: Compromised passwords could allow attackers to gain access to sensitive medical records, exposing both patients and healthcare providers to risks such as identity theft or fraud.

3. Database Security Gaps

  • Observation: Poor access controls enabled unauthorized access to the database, including patient records. Procyon warned this could result in full data exfiltration if exploited.
  • Example: Weak database controls make it easier for malicious actors to bypass authentication measures.

4. Non-Compliance with the Health Information Act

  • Mandate: The HIA requires custodians of health information to protect data against anticipated risks. AHS was deemed “in breach” due to failure in meeting vulnerability assessment and system security targets.

Developments and Actions Post-2018

Since the initial report, AHS has implemented measures to address the identified vulnerabilities, including:

  1. Enhanced Security Protocols
    • Deployment of multi-factor authentication (MFA) for user logins.
    • Adoption of advanced encryption standards to protect data both in transit and at rest.
  2. Regular Security Audits
    • Previously conducted every two years, audits are now scheduled annually to identify and address emerging threats.
  3. Improved Patch Management
    • Commitment to implementing system updates as soon as they become available.
  4. Staff Training Programs
    • Educating employees on cybersecurity best practices, including recognizing phishing attempts and using secure passwords.
  5. Collaboration with Third-Party Experts
    • Continued partnerships with cybersecurity firms to ensure robust external reviews of IT infrastructure.

Broader Implications for Healthcare Cybersecurity

Growing Threats to EHR Systems

Healthcare is one of the most targeted sectors for cyberattacks, primarily due to the value of patient data on the black market. Ransomware attacks and data breaches have risen sharply, with healthcare organizations globally facing increased risks.

Recommendations for Future Security

To safeguard sensitive data, AHS and similar organizations should consider:

  1. Adopting Zero-Trust Architecture
    • Ensure all access to systems is verified, reducing the risk of insider threats.
  2. Incident Response Plans
    • Develop and routinely test robust protocols for responding to data breaches.
  3. Advanced Threat Detection Systems
    • Use AI-powered tools to monitor and respond to unusual activity in real time.
  4. Secure Cloud Infrastructure
    • Transition legacy systems to secure cloud environments with end-to-end encryption.

Legislative Reinforcement

The Alberta government may explore amending the HIA to introduce stricter penalties for non-compliance, encouraging better adherence to cybersecurity norms.


Public Trust and Transparency

AHS’s assurances about patient data security have not fully mitigated public concerns. Regular public reporting of security measures and compliance efforts can help rebuild trust. Furthermore, the Privacy Commissioner’s findings, once released, will play a pivotal role in shaping future data governance policies.


Sources and Further Reading:

  1. Alberta Health Services – Privacy and Security
  2. Health Information Act Overview – OIPC Alberta
  3. Cybersecurity in Healthcare – Best Practices (HealthIT.gov)
  4. The Growing Threat of Healthcare Cyberattacks (World Economic Forum)
  5. CBC News Reports on AHS Investigation

The Longevity Blueprint: AI-Powered Health Optimization

Current step:1AI-Human Medical Analyzer: Smarter, Personalized Health
2AI-Human Medical Analyzer: Smarter, Personalized Health

> SYS.HEALTH: AI-Human Medical Analyzer_

// Revolutionize Your Diagnostics

Experience the perfect blend of cutting-edge AI precision and expert human care. Our revolutionary analyzer turns your raw health data into personalized, actionable insights tailored just for you.

> INITIALIZING_BIOMETRIC_SCAN...

[+] DATA_INPUT

Securely upload complex health parameters, including lab bloodwork and comprehensive medical history.

[+] PROCESSING

Advanced algorithmic parsing combined with human-level oversight ensures hyper-accurate data interpretation.

[+] OUTPUT_MATRIX

Receive smarter, faster, and truly personalized care strategies to take immediate charge of your health journey.

A name/nickname is required to continue.

> TRANSLATION_MATRIX_ACTIVE...
[ LANG_EN ]
Knowledge Heals, Prevention Protects
[ LANG_HI ]
ज्ञान ठीक करता है, रोकथाम सुरक्षा करती है
[ LANG_ZH ]
知识治愈,预防保护
[ LANG_JA ]
知識は癒し、予防は守る
[ LANG_HE ]
הידע מרפא, המניעה מגנה
[ LANG_AR ]
المعرفة تُشفي، والوقاية تحمي
[ LANG_FR ]
La connaissance guérit, la prévention protège

> SYS.AUTH: Data Processing Consent_

[ AWAITING_AUTHORIZATION ] By providing consent, you allow us to process your uploaded data through our proprietary AI-Human analysis system.

  • [+] SECURE_REVIEW: This ensures your information is carefully reviewed using advanced AI technology and certified professional oversight to deliver personalized health insights.
  • [+] PRIVACY_LOCK: Your privacy is our strict priority. Your data will only be used for this specific diagnostic purpose.

> SYS.UPLOAD: Share Medical Records [OPTIONAL]_

[ USER_CONTROL_ACTIVE ] Uploading your medical records during registration is entirely optional. You can choose to bypass this step and provide data later if it suits your timeline.

You dictate the data flow: share as much or as little as you’re comfortable with, and let us guide you toward better health.

[+] FORMAT_SUPPORT

We accept all file formats, including photos, PDFs, text documents, and raw official medical data.

[+] DATA_YIELD

Increased inputs correlate with higher precision. The more info you share, the better we tailor your personalized insights.

> NEXT_STEPS: Post-Registration Protocol_

Once your registration is complete, a human specialist from our team will personally reach out to you within 3-10 business days. We will discuss your health journey and map out exactly how we can support you.

About the Author: Bernard Aybout (Virii8)

Avatar Of Bernard Aybout (Virii8)
I am a dedicated technology enthusiast with over 45 years of life experience, passionate about computers, AI, emerging technologies, and their real-world impact. As the founder of my personal blog, MiltonMarketing.com, I explore how AI, health tech, engineering, finance, and other advanced fields leverage innovation—not as a replacement for human expertise, but as a tool to enhance it. My focus is on bridging the gap between cutting-edge technology and practical applications, ensuring ethical, responsible, and transformative use across industries. MiltonMarketing.com is more than just a tech blog—it's a growing platform for expert insights. We welcome qualified writers and industry professionals from IT, AI, healthcare, engineering, HVAC, automotive, finance, and beyond to contribute their knowledge. If you have expertise to share in how AI and technology shape industries while complementing human skills, join us in driving meaningful conversations about the future of innovation. 🚀