Almost 39,000 Patients Affected by Email Breach at Oklahoma Spine Hospital
Unauthorized email account access has been detected by Oklahoma Spine Hospital, Familylinks, and the Massachusetts Department of Developmental Services and an emailing error by a Missouri Department of Mental Health employee resulted in the impermissible disclosure of patient data. Oklahoma Spine Hospital Oklahoma Spine Hospital in Oklahoma City has warned 38,945 patients about the exposure of some of their protected health information. Suspicious activity was identified in an employee’s email account on or around July 1, 2024. Immediate action was taken to secure its email tenant, and an investigation was launched to determine the nature and scope of the breach. The forensic investigation confirmed on September 24, 2024, that patients’ protected health information was stored in the compromised accounts including first and last names, dates of birth, financial account numbers and routing numbers, health insurance information, medical information, payment card information, and driver’s license information. At the time of issuing notifications, Oklahoma Spine Hospital was unaware of...
TriHealth Physician Partners Confirms Patient Data Exposed in Cyberattack
Cyberattacks have recently been announced by TriHealth Physician Partners in Ohio and Harmac Medical Products in New York, and an insider breach has been discovered by North Texas Medical Specialists. TriHealth Physician Partners TriHealth, dba TriHealth Physician Partners (TriHealth), a primary care provider serving the greater Cincinnati area of Ohio, has warned patients about a security incident at one of its business associates that involved unauthorized access to patients’ protected health information. TriHealth said it learned about the incident at its vendor on October 23, 2024, and confirmed that there was no unauthorized access to its own network. The forensic investigation confirmed the attacker only had access to historical documents related to care provided by the OB/GYN group, For Women, prior to January 2020 when For Women joined TriHealth. An analysis of the affected files confirmed they contained names, addresses, dates of birth, Social Security numbers, claims information, medical conditions, medications, lab results, and other treatment information. TriHealth is...
Great Plains Regional Medical Center: 133,000 Patients Affected by Ransomware Attack
Great Plains Regional Medical Center in Elk City, OK, has fallen victim to a ransomware attack. The attack was detected on September 8, 2024, when files were encrypted. A third-party cybersecurity firm was engaged to assist with the investigation and determined that access was gained to its network on September 5, 2024, and continued until the incident was detected on September 8. Prior to encrypting files, the threat actor exfiltrated data from its systems that included names, demographic information, health insurance information, driver’s license numbers, clinical treatment information such as diagnosis and medication information, and Social Security numbers. Great Plains Regional Medical Center said it was able to quickly restore access to its systems, return to normal operations, and recover most of the encrypted data; however, a limited amount of patient data could not be recovered. Great Plains Regional Medical Center did not disclose the name of the ransomware group. The ransomware attack has recently been reported to the HHS’ Office for Civil Rights as involving the...
HIPAA Guidelines for Healthcare Professionals
The HIPAA guidelines for healthcare professionals are that healthcare professionals should understand all relevant HIPAA standards and apply them in accordance with their employer’s workplace policies. Understanding the relevant standards helps prevent unintentional violations of HIPAA and the potential for sanctions. Because healthcare professionals have different roles, work in different environments, and face different compliance challenges, there is no one-size-fits-all set of HIPAA guidelines for healthcare professionals. It is also the case that covered healthcare organizations can apply HIPAA standards in different ways depending on the nature of their operations and how they apply the “flexibility of approach” standard. Nonetheless, there are some basic HIPAA guidelines that apply to all healthcare professionals based on the Privacy Rule standard relating to workforce sanctions (§164.530(e)). This standards states: “A covered entity must have and apply appropriate sanctions against members of its workforce who fail to comply with the privacy policies and procedures of the...
HSCC Publishes Cyber Incident Response Playbook for Medical Product Manufacturers
To help small- and medium-sized manufacturers of medical products develop effective incident response plans, the Health Sector Coordinating Council Cybersecurity (HSCC) Manufacturing Operational Technology Cybersecurity Task Group has developed a cyber incident response playbook specifically for medical product manufacturers. In the event of a security incident such as a ransomware attack, it will only be possible to respond efficiently and effectively if a comprehensive incident response plan has been developed and implemented. The incident response plan should cover different types of cyber incidents and specify the procedures and processes that should be followed for response, recovery, and post-incident analysis. As part of the incident response plan, a cyber incident response team (CIRT) should be established and trained on the incident response plan, and tabletop exercises should be conducted to ensure everyone knows what needs to be done and to identify and correct any flaws in the plan. An effective cyber incident response plan is not only concerned with the reactionary...



