Hunter Biden business associate testifies he has no knowledge of wrongdoing by Joe Biden
#MSNBC #HunterBiden #JoeBiden #businessassociate #wrongdoing #testimony #Politics #News
#msnbc #hunterbiden #joebiden #businessassociate #wrongdoing #testimony #politics #news
Jelly Bean Communications Design and its Manager Settle False Claims Act Liability for Cybersecurity Failures on Florida Medicaid Enrollment Website
DOJ Press Release:
https://www.justice.gov/opa/pr/jelly-bean-communications-design-and-its-manager-settle-false-claims-act-liability
Settlement Agreement:
https://www.justice.gov/opa/press-release/file/1574111/download
Why don't we see anything about what Jelly Bean has to do going forward with respect to security? It would have been nice to see that in the settlement terms.
#infosec #cybersecurity #Databreach #BusinessAssociate #HIPAA #Medicaid #FalseClaimsAct
#dataprotection #patch
#infosec #cybersecurity #databreach #businessassociate #hipaa #medicaid #falseclaimsact #dataprotection #patch
@lawrenceabrams @BleepingComputer
#GMTA. I had just sent inquiries to Aliva Health and Medminder this afternoon asking them if they would confirm or deny that they were victims of the Fortra/GoAnywhere attack. So far, there's nothing on their sites or on HHS's public breach tool, but I suspect it's only a matter of time until we see them added there.
#HIPAA #HITECH #databreach #HealthSec #BusinessAssociate #vendor #Clop #ransomware #dataprotection
#gmta #hipaa #hitech #databreach #healthsec #businessassociate #vendor #clop #ransomware #dataprotection
A third-party breach that impacted Northwest Mothers Milk Bank in Oregon has also affected Rogers Hixon Ontario Human Milk Bank in Canada. The breach was in December at Timeless Medical Systems.
Timeless informed milk bank clients that "some files were acquired from the TMS network by an unknown third party, after which TMS took steps to mitigate the potential impact of the incident, recovered the files, and informed affected parties."
The data involved included a lot of data protected under HIPAA in the U.S. and PHIPA in Canada:
"milk donor applicant and infant names, date of birth, address, phone number, milk donor application contents (including self-reported information, medical health validation, blood screening results and/or required health and lifestyle updates), health care provider name, and lab generated patient ID, to the extent you or a family member provided the foregoing information in
dealing with NWMMB as a donor"
Timeless does not explain how they recovered the files. They do not mention ransomware, and they do not indicate whether any ransom was either demanded or paid.
Notification from Northwest Mothers Milk Bank: https://agportal-s3bucket.s3.amazonaws.com/databreach/BreachA19803.pdf
Media coverage of Rogers Hixon Ontario Human Milk Bank: https://www.cbc.ca/news/canada/toronto/human-milk-bank-data-breach-1.6771193
#databreach #dataprotection #businessassociate #infosec #cybersecurity #incidentresponse #healthsec
#databreach #dataprotection #businessassociate #infosec #cybersecurity #incidentresponse #healthsec
The Chautauqua Center notifies patients of breach; changes EMR provider:
https://www.databreaches.net/the-chautauqua-center-notifies-patients-of-breach-changes-emr-provider/
#databreach #HIPAA #PHI #HealthSec #BusinessAssociate #dataprotection #infosec #EMR
#databreach #hipaa #phi #healthsec #businessassociate #dataprotection #infosec #emr
Sentara Health notifying 741 patients after mistake by Coronis Health employee: https://www.databreaches.net/sentara-health-notifying-741-patients-after-mistake-by-coronis-health-employee/
Good example of the value of having a compliance hotline or data security reporting number displayed on your website.
#databreach #dataprotection #infosec #responsibledisclosure #HealthSec #businessassociate
#databreach #dataprotection #infosec #responsibledisclosure #healthsec #businessassociate
Medical records for 4,158 Garrison Women's Health patients were corrupted and unrecoverable after an incident involving its IT vendor, Global Network Systems.
GWH's substitute notice doesn't say this was a ransomware attack, but data was made unavailable and found to be corrupted/unrecoverable. I've sent an inquiry to the vendor to try to get more details.
#databreach #dataprotection #infosec #HealthSec #HIPAA #backup #recovery #BusinessAssociate
#databreach #dataprotection #infosec #healthsec #hipaa #backup #recovery #businessassociate
The Center for Autism and Related Disorders notifies patients after vendor's error caused HIPAA breach: https://www.databreaches.net/the-center-for-autism-and-related-disorders-notifies-patients-after-vendors-error-caused-hipaa-breach/
I have a question about part of their incident response, though. See what you think.
#databreach #dataprotection #infosec #healthsec #vendor #businessassociate #HIPAA #Incidentresponse
#databreach #dataprotection #infosec #healthsec #vendor #businessassociate #hipaa #incidentresponse
OK, for you folks smart enough to take the weekend off, here are some of the new breach disclosures in the healthcare sector of the U.S. that I reported over the weekend:
Aspire Surgical: https://www.databreaches.net/ut-aspire-surgical-notifying-patients-of-data-breach/
Highmark Health: https://www.databreaches.net/heads-up-highmark-health-will-be-notifying-300000-patients-of-a-phishing-incident-watch-for-your-mail-this-month/
And in a 4-fer:
Cardiovascular Associates, Regal Medical Group, Southeast Colorado Hospital District, Jackson & Joyce Family Dentistry: https://www.databreaches.net/four-more-attacks-on-the-healthcare-sector-weekend-edition/
Tallahassee Memorial Hospital: https://www.databreaches.net/fl-tallahassee-memorial-hospital-victim-of-suspected-ransomware-attack/
and Nonstop Health: https://www.databreaches.net/nonstop-health-data-and-source-code-appear-to-have-been-leaked-on-hacking-forum/
#DataBreach #DataProtection #DataLeak #ransomware #hack #leak #Infosec #HealthSec #cybersecurity #ransom #HIPAA #PHI #PII #HealthInsure #Provider #BusinessAssociate #IncidentResponse
#databreach #dataprotection #dataleak #ransomware #hack #leak #infosec #healthsec #cybersecurity #ransom #hipaa #phi #pii #healthinsure #provider #businessassociate #incidentresponse
Diligent Corp. had to send more notifications after learning, the hard way, that a May 2022 hacking incident was even bigger than they had discovered: data that they hadn't thought had been accessed had been accessed and exfiltrated, and was now appearing on the internet.
#databreach #dataprotection #HIPAA #incidentresponse #infosec #cybersecurity #forensics #phi #BusinessAssociate #SaaS
#transparency
@campuscodi @allan @brett @gossi @zackwhittaker @lawrenceabrams
#databreach #dataprotection #hipaa #incidentresponse #infosec #cybersecurity #forensics #phi #businessassociate #saas #transparency
So it's not clear what happened that led to NextGen's listing being removed from BlackCat's leak site, but now it's back with the same info and proof screencaps as before.
#BlackCat #ALPHV #ransomware #NextGen #databreach #dataprotection #infosec #cybersecurity #BusinessAssociate
#blackcat #ALPHV #ransomware #nextgen #databreach #dataprotection #infosec #cybersecurity #businessassociate
BlackCat added NextGen to its leak site, but .... where did it go?
https://www.databreaches.net/blackcat-adds-nextgen-to-its-leak-site-but-where-did-it-go/
#DataBreach #Infosec #ransomware #cybersecurity #BusinessAssociate #HIPAA #DataProtection #BlackCat #ALPHV #NextGen
#databreach #infosec #ransomware #cybersecurity #businessassociate #hipaa #dataprotection #blackcat #ALPHV #nextgen
Some sites that have reported on the Captify/Your Patient Advisor #databreach state that the entity is a #BusinessAssociate under #HIPAA.
They are in error.
Captify/Your Patient Advisor is a business associate in other activities and contexts, but this was a purchase of a colonoscopy prep kit in an online store. Although payment card information was breached, there was no protected health information involved in this incident.
So they do not need to report this incident, which impacted 244,296 consumers, to HHS, but I'm betting they have a big #PCIDSS headache because they were alerted to fraudulent card use in March 2021, the malware was injected in May 2019, and they didn't conclude their investigation until October 2022.
#databreach #businessassociate #hipaa #pcidss #dataprotection #creditcard #paymentportal #malware
NEW by me:
Worst breach notifications of 2022:
https://www.databreaches.net/worst-breach-notifications-of-2022/
#DataBreach #HIPAA #SecurityRule #Transarency #ransomware #discovery #notification #CoveredEntity #BusinessAssociate #HITECH #Notice
#databreach #hipaa #securityrule #transarency #ransomware #discovery #notification #coveredentity #businessassociate #hitech #notice
As if CommonSpirit didn't have enough stress dealing with recovery from a #ransomware attack, in September they discovered that a business associate had made data extraction errors. When they contacted the BA to get corrections, the BA stopped responding to them and there were signs that the business had folded -- still holding hundreds of thousands of patients' records.
CommonSpirit got a court injunction for the BA to return all PHI or provide certificates of destruction.
I am not sure whether this problem had anything at all to do with the recovery from the attack -- could be totally unrelated, but what a stress. I've reached out to CommonSpirit to ask if this was unrelated or related.
https://www.databreaches.net/commonspirit-gets-restraining-order-in-missing-patient-info-suit/
#ransomware #hipaa #businessassociate #baa #dataprotection #injunction
The Centers for Medicare and Medicaid Services (CMS) has issued a press release after a subcontractor was hit with a ransomware attack.
The attack at Healthcare Management Solutions LLC has the potential to impact PII, PHI, and banking information of 254,000 people.
CMS is actually issuing those affected new Medicare cards and new Medicare numbers.
You can read their full press release here: https://www.cms.gov/newsroom/press-releases/cms-responding-data-breach-subcontractor
CMS states that preliminary info indicates that the subcontractor violated their obligations to CMS, but they don't explain why they say that or what HMS supposedly did or didn't do that violated their obligations. I've reached out to CMS with some questions and hopefully we'll know more tomorrow.
#ransomware #DataBreach #Medicare #CMS #infosec #cybersecurity #IncidentResponse #HIPAA #BusinessAssociate #PII #PHI #vendor
#ransomware #databreach #medicare #cms #infosec #cybersecurity #incidentresponse #hipaa #businessassociate #pii #phi #vendor