⚡ Rocket.net – Managed WordPress Hosting

MiltonMarketing.com  Powered by Rocket.net – Managed WordPress Hosting

Bernard Aybouts - Blog - MiltonMarketing.com

Approx. read time: 3.6 min.

Post: Privacy commissioner investigating security of patient health records at Alberta Health Services

Expanded Analysis: Privacy and Security Concerns in Alberta Health Services (AHS)

Overview: Security Risks in Alberta Netcare Portal

The Alberta Netcare Portal, central to Alberta’s healthcare system, serves as a hub for electronic health records (EHR). It provides healthcare providers access to critical patient data, including lab results, prescription records, and diagnostic reports. However, the system came under scrutiny in 2018 after Procyon Security Group identified 108 vulnerabilities, raising alarms about patient data protection and compliance with the Health Information Act (HIA).

Historical Context of Security Concerns

In May 2018, Procyon’s assessment revealed security gaps that spanned several categories:

  1. Critical Vulnerabilities (11): These posed an immediate threat, enabling unauthorized data access.
  2. High Risks (34): Exploitable weaknesses that could compromise patient data integrity and privacy.
  3. Medium Risks (63): Issues requiring attention to prevent long-term systemic threats.

The findings suggested systemic neglect of cybersecurity best practices, with outdated infrastructure and insufficient controls on user access. This led to the launch of an investigation by Alberta’s Privacy Commissioner, Jill Clayton, to evaluate AHS’s compliance with the HIA.


Key Areas of Concern in 2018

1. Outdated System Patching

  • Issue: The system had not received any security updates since July 2014. Outdated software is one of the primary vectors for cyberattacks, leaving the Alberta Netcare Portal vulnerable to known exploits.
  • Risk: Attackers could exploit these vulnerabilities to infiltrate the database, bypass security protocols, and access patient records.

2. Insecure Password Management

  • Findings: Passwords were inadequately hashed, enabling Procyon Security Group to crack nearly 40% of user password hashes.
  • Impact: Compromised passwords could allow attackers to gain access to sensitive medical records, exposing both patients and healthcare providers to risks such as identity theft or fraud.

3. Database Security Gaps

  • Observation: Poor access controls enabled unauthorized access to the database, including patient records. Procyon warned this could result in full data exfiltration if exploited.
  • Example: Weak database controls make it easier for malicious actors to bypass authentication measures.

4. Non-Compliance with the Health Information Act

  • Mandate: The HIA requires custodians of health information to protect data against anticipated risks. AHS was deemed “in breach” due to failure in meeting vulnerability assessment and system security targets.

Developments and Actions Post-2018

Since the initial report, AHS has implemented measures to address the identified vulnerabilities, including:

  1. Enhanced Security Protocols
    • Deployment of multi-factor authentication (MFA) for user logins.
    • Adoption of advanced encryption standards to protect data both in transit and at rest.
  2. Regular Security Audits
    • Previously conducted every two years, audits are now scheduled annually to identify and address emerging threats.
  3. Improved Patch Management
    • Commitment to implementing system updates as soon as they become available.
  4. Staff Training Programs
    • Educating employees on cybersecurity best practices, including recognizing phishing attempts and using secure passwords.
  5. Collaboration with Third-Party Experts
    • Continued partnerships with cybersecurity firms to ensure robust external reviews of IT infrastructure.

Broader Implications for Healthcare Cybersecurity

Growing Threats to EHR Systems

Healthcare is one of the most targeted sectors for cyberattacks, primarily due to the value of patient data on the black market. Ransomware attacks and data breaches have risen sharply, with healthcare organizations globally facing increased risks.

Recommendations for Future Security

To safeguard sensitive data, AHS and similar organizations should consider:

  1. Adopting Zero-Trust Architecture
    • Ensure all access to systems is verified, reducing the risk of insider threats.
  2. Incident Response Plans
    • Develop and routinely test robust protocols for responding to data breaches.
  3. Advanced Threat Detection Systems
    • Use AI-powered tools to monitor and respond to unusual activity in real time.
  4. Secure Cloud Infrastructure
    • Transition legacy systems to secure cloud environments with end-to-end encryption.

Legislative Reinforcement

The Alberta government may explore amending the HIA to introduce stricter penalties for non-compliance, encouraging better adherence to cybersecurity norms.


Public Trust and Transparency

AHS’s assurances about patient data security have not fully mitigated public concerns. Regular public reporting of security measures and compliance efforts can help rebuild trust. Furthermore, the Privacy Commissioner’s findings, once released, will play a pivotal role in shaping future data governance policies.


Sources and Further Reading:

  1. Alberta Health Services – Privacy and Security
  2. Health Information Act Overview – OIPC Alberta
  3. Cybersecurity in Healthcare – Best Practices (HealthIT.gov)
  4. The Growing Threat of Healthcare Cyberattacks (World Economic Forum)
  5. CBC News Reports on AHS Investigation

About the Author: Bernard Aybout (Virii8)

Avatar of Bernard Aybout (Virii8)
I am a dedicated technology enthusiast with over 45 years of life experience, passionate about computers, AI, emerging technologies, and their real-world impact. As the founder of my personal blog, MiltonMarketing.com, I explore how AI, health tech, engineering, finance, and other advanced fields leverage innovation—not as a replacement for human expertise, but as a tool to enhance it. My focus is on bridging the gap between cutting-edge technology and practical applications, ensuring ethical, responsible, and transformative use across industries. MiltonMarketing.com is more than just a tech blog—it's a growing platform for expert insights. We welcome qualified writers and industry professionals from IT, AI, healthcare, engineering, HVAC, automotive, finance, and beyond to contribute their knowledge. If you have expertise to share in how AI and technology shape industries while complementing human skills, join us in driving meaningful conversations about the future of innovation. 🚀