InvestorsHub Logo
Followers 5
Posts 2405
Boards Moderated 0
Alias Born 09/06/2006

Re: None

Tuesday, 08/11/2020 3:03:24 PM

Tuesday, August 11, 2020 3:03:24 PM

Post# of 248558
Data Breach at Illinois Healthcare System

https://www.infosecurity-magazine.com/news/data-breach-at-illinois-healthcare/

Illinois healthcare system FHN has notified patients of a data breach that took place in February.

An investigation was launched by the Freeport-based healthcare provider after it transpired that the email accounts of a number of employees had been compromised.

According to a notice issued by FHN, the alarm was raised when suspicious activity was spotted within the compromised email accounts. FHN responded by securing the accounts and hiring a "leading computer forensic firm" to determine what had occurred.

The investigation into the incident concluded on April 30 and determined that an unauthorized person accessed the accounts between February 12 and February 13.

FHN stated: "The investigation was unable to determine whether the unauthorized person actually viewed any emails or attachments in the accounts. Out of an abundance of caution, we reviewed the emails and attachments contained in the email accounts to identify patient information that may have been accessible to the unauthorized person."

After reviewing the emails and attachments that were compromised in the incident, FHN found that sensitive data belonging to some patients had been accessible to the unauthorized third party.

Information exposed in the data breach included some patients’ names, dates of birth, medical record or patient account numbers, health insurance information, and limited treatment and/or clinical information, such as provider names, diagnoses, and medication information.

In some instances, patients’ health insurance information and/or Social Security numbers were also identified in the compromised email accounts.

"This incident did not affect all FHN patients, but only those patients whose information was contained in the affected email accounts," stated FHN.

FHN is offering complimentary credit monitoring and identity protection services to those patients whose Social Security numbers and/or drivers’ license numbers were exposed in the incident.

FHN announced on July 31 that patients had been notified of the data breach. The company said it was taking steps to prevent future cyber-incidents.

"To help prevent something like this from happening in the future, we have reinforced education with our staff regarding how to identify and avoid suspicious emails and are making additional security enhancements to our email environment, including enabling multi-factor authentication," stated FHN.
==================================================================
Now if FHN had used Wave VSC 2.0, would there have been this unauthorized (unknown and unapproved devices) access to the employees' email accounts.... NO!! Better security at less than half the cost!!!
==================================================================

https://www.wavesys.com/

https://www.wavesys.com/products/embassy%C2%AE-remote-administration-server-tpm-management

Secure device & user authentication

Sometimes it feels like security is more effective at deterring your users than hackers. But you still have to protect your enterprise resources, and we’re here to help. We take pride in securing your network, data, and resources to an unprecedented level, without causing a revolt from either IT or your users. In fact, your users probably won’t even know we’re there.

Here’s how it works:

Trusted Platform Module (TPM) + Wave’s ERAS for TPM Management = hardware-secured, fully-managed authentication

Most of your devices already come with TPMs (check out our “What is a TPM?” brochure if you’re not sure why this is exciting). This security chip comes attached to the motherboard of most enterprise-class PCs. There’s nothing “add-on” about it. The TPM provides a verifiable, unique identity for each machine.

Wave’s ERAS for TPM Management gives IT remote, centralized management of all TPMs on enterprise computers and tablets.

With this control, IT can set policies and dictate which machines and users have authority to access which resources. IT can ensure that only known and approved devices are accessing your network. And what’s more, IT can prove it with detailed activity logs.




















Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.