East River Medical Imaging Cyberattack Affects 606,000 Patients
East River Medical Imaging in New York has started notifying 605,809 patients that some of their protected health information has been exposed or stolen in a cyberattack that was detected on September 20, 2023. The network was immediately taken offline, and a forensic investigation was launched to determine the nature and scope of the incident. The investigation determined there had been unauthorized access to its network between August 31, 2023, and September 20, 2023, and during that time, files containing patient data had been accessed and copied from its network. The compromised information varied from individual to individual and may have included names, contact information, insurance information, exam and/or procedure information, referring physician names, imaging results, and/or Social Security numbers. Employee data was also compromised, including names, contact information, financial account information, Social Security numbers, and/or driver’s license numbers. East River Medical Imaging said it has enhanced its network monitoring capabilities and will continue to assess...
6.9 Million 23andMe Users Affected by Data Breach
The genetic testing company, 23andMe, has confirmed in a recent filing with the Securities and Exchange Commission (SEC) that a hacker gained access to a very small percentage of user accounts. 23andMe has around 14 million users worldwide, and 0.1% of accounts were compromised – approximately 14,000 accounts. However, through those accounts, the hacker obtained the data of around 6.9 million users. The account breaches first came to light on October 1, 2023, when a hacker claimed in an online forum to have the profile information of millions of 23andMe users. 23andMe launched an investigation into a potential data breach and determined that its own systems had not been compromised. Certain accounts had been accessed in a credential stuffing attack. A credential stuffing attack involves using credentials from data breaches at one or more companies to try to access accounts at another, unrelated company. Access was gained to the 14,000 accounts as those users had used the password for their 23andMe account at another company that had suffered a data breach and had failed to...
What is the Key to Success for HIPAA Compliance?
The key to success for HIPAA compliance is developing an effective compliance program and then maintaining it through ongoing training, automation, monitoring, and sanctions when necessary – all supported by leadership buy-in. The key to success for HIPAA compliance can vary according to the source of information. For example, sources focusing on HIPAA training suggest the key to success for HIPAA compliance is ongoing training, sources leaning towards technology solutions recommend automating as many workflows as possible, and – rather than focus on one key to success – sources providing compliance advice tend to advocate multiple compliance strategies. None of the above keys to success for HIPAA compliance are wrong, and individually they can all contribute towards HIPAA compliance. However, ongoing HIPAA training is only an effective key to success if sufficient resources exist to support ongoing training if systems are in place to monitor post-training compliance, and if the organization’s sanctions policy is applied fairly and consistently. Otherwise, ongoing training can fail...
Email Retention Requirements Explained
The email retention requirements are that, beyond federal or industry-specific requirements, every business should maintain records they may rely on in a civil dispute for as long as required – “as long as required” usually determined by each state´s Statute of Limitations. If you are a HIPAA Covered Entity read our recent HIPAA compliant email retention solution review. Explaining email retention requirements by focusing on federal laws is fraught with potential hazards as requirements can vary according to the nature of the content of the email. For example, many sources discussing IRS email retention requirements state businesses should have an email retention policy to keep tax-related records for up to seven years. However, according to the IRS website, most businesses only need to keep documents for up to seven years if they relate to a claim for a loss from a worthless securities or bad debt deduction. Most other records only have to be retained for three years unless they relate to a property (three years after the property is disposed of) or if the business has filed...
Almost 440,000 Individuals Affected by Cyberattack on Proliance Surgeons
Proliance Surgeons, a Seattle, WA-based surgical group that has around 100 locations in Washington state, has notified 437,392 individuals that some of their protected health information may have been stolen in a ransomware attack earlier this year. The breach notice on the website of Proliance Surgeons states that a forensic investigation was conducted by third-party cybersecurity experts which confirmed that some files had been removed from its network before files were encrypted. On May 24, 2023, it was confirmed that files containing patients’ protected health information may have been accessed or acquired on February 11, 2023. At the time it was unclear exactly how many individuals had been affected. A comprehensive review was conducted of all files potentially accessed or acquired in the attack, which confirmed they contained names in combination with one or more of the following: date of birth, Social Security number, medical treatment information, health insurance information, phone number, email address, financial account number, driver license or other identification...



