Multiple Security Vulnerabilities Identified at Arizona VA Healthcare System
A recent inspection of the Northern Arizona VA Healthcare System by the Department of Veterans Affairs Office of Inspector General (OIG) found deficiencies in all three security control areas that were investigated – configuration management, security management, and access controls. The Northern Arizona VA Healthcare System includes the Bob Stump Department of Veteran Affairs Medical Center in Prescott and 11 clinics in the state and serves approximately 33,000 veterans. The inspection was performed as the Northern Arizona VA Healthcare System had not previously been visited as part of a Federal Information Security Modernization Act of 2014 (FISMA) audit. The inspection revealed the Northern Arizona VA Healthcare System had deficiencies in four configuration management controls – vulnerability management, flaw remediation, unsupported components, and baseline configurations. While the VA has a vulnerability management program, the inspectors identified vulnerabilities that the Office of Information and Technology (OIT) had failed to identify, even though the same scanning tools...
Vulnerabilities Identified in Popular Telemedicine Software Development Kit
Security flaws have been identified in the QuickBlox software development kit (SDK) and application programming interface (API) that supports the real-time chat and video applications used by many telemedicine providers. The vulnerabilities were identified by security researchers from Claroty’s Team82 and Check Point Research who collaborated to look into the security of the popular QuickBlox SDK and API, which support applications used in telemedicine, finance, and smart IoT device applications. The SDK and API are provided to mobile and web application developers to deliver user management, real-time public and private chats, and incorporate security features to support HIPAA and GDPR compliance. The researchers identified two vulnerabilities that put sensitive data at risk, including protected health information (PHI). Given the extent to which the QuickBlox chat and video framework is used, the sensitive information of millions of individuals was at risk of exposure. CVE-2023-311847 is a high-severity flaw with a CVSS 3.1 base score of 7.8 and is due to the creation of...
Johns Hopkins Facing Multiple Lawsuits Over MOVEit Data Breach
Two lawsuits have recently been filed in the U.S. District Court for the District of Maryland against Johns Hopkins University and Johns Hopkins Health System that allege a failure to properly secure and safeguard the protected health information of patients, resulting in the theft of their data by the Clop ransomware group. In May 2023, the Clop ransomware group targeted a zero-day vulnerability in Progress Software’s MOVEit Transfer file transfer solution. The attacks occurred in late May and affected more than 150 organizations, resulting in the theft of the personal and protected health information of millions of individuals. Johns Hopkins has yet to confirm how many staff members, students, and patients were affected as the investigation into the incident has not yet concluded but has said names, addresses, dates of birth, and Social Security numbers were stolen in the attack. The two lawsuits make similar claims and allege a failure to implement appropriate security safeguards to protect personally identifiable information (PII) and protected health information (PHI). One of...
Healthcare Providers and Vendors Confirm Recent PHI Disclosure Incidents
A round-up of data breaches that have recently been reported by HIPAA-covered entities. South Suburban Surgical Suites Reports Email Account Breach South Suburban Surgical Suites, a Munster, IN-based surgical center, has reported a breach of a legacy Microsoft Office 365-hosted business email account. The breach was detected on April 3, 2023, with the investigation confirming the account was accessed following a response to a phishing email. The response was on February 20, 2023, and the unauthorized access was blocked on April 3, 2023. The review of the email account was completed on June 5, 2023, and confirmed that the protected health information of 5,340 patients was stored in the account. That information varied from individual to individual and may have included full names in combination with addresses, dates of birth, Social Security numbers, driver’s license/state ID numbers, passport numbers, credit card information and/or financial account information, medical record numbers, dates of service, provider names, diagnoses/procedure information, prescriptions/medications,...
How Can You File a Report with OSHA?
You can file a report with OSHA by phone, fax, email, regular mail, via an online contact form, or by visiting an OSHA office in person. However, some channels of communication are not appropriate for some types of reports. These are the most common reasons for filing a report with OSHA: To report an emergency, severe injury, or fatality. To alert OSHA to unsafe working conditions. To report workplace safety and health violations. To file a complaint and request an inspection. Filing a whistleblower complaint following retaliation. To submit the annual summary OSHA Form 300A. How to File a Report with OSHA in an Emergency When reporting an emergency, severe injury, or fatality, OSHA recommends calling the 24-hour hotline at 1-800-321-6742. Alternatively, businesses can also call the nearest OSHA office if they are covered by a state plan. However, if a state office is closed, it is not permitted to leave a message to file a report with OSHA concerning an emergency, severe injury, or fatality. Severe injuries and fatalities in some states can also be reported via an online “Serious...



