Phishing

Hacking Incident and Data Breach

April 22nd, 2016

The Pain Treatment Centers of America (PTCOA) and Interventional Surgery Institute (ISI), a healthcare network in Arkansas suffered a potential data breach. The incident came to notice when  a vendor mentioned about hacking incident. According to OCR’s Tool, 19,397 individuals were possibly affected by the data security incident.

PTCOA and ISI mentioned that EHR and healthcare practice management tool operated by Bizmatics, a third-party vendor is used by them to manage patient files and contains the medical records of all its patients.

According to the PTCOA notice,“Your patient information is important to us, and we select vendors to help us better manage and secure that information. As such, security is the number one priority for our technology vendors, including Bizmatics.”

Unauthorized outside party accessed Bizmatics data server which stored customer records. Bizmatics collaborated with law enforcement officials and a cyber forensics firm to investigate the the incident. After the audit, Bizmatics mentioned the affected systems are secured.

“We have no reason to believe that our patient files were the target of the hackers’ attack on Bizmatics,” wrote PTCOA and ISI. “Due to the nature of the attack, Bizmatics cannot say for certain that PTCOA’s patient files were among the data that was accessed or acquired by the hacker.”

PTCOA also mentioned following in the statement,

“We are taking this issue seriously and have retained Experian, an industry leader in credit monitoring and identity theft recovery, to help patients monitor this situation in the coming months. We are offering a complimentary one-year membership of Experian’s® ProtectMyID® Alert. “

PTCOA advice following steps to the users –

  • Review your account statements and credit reports and notify law enforcement and us of suspicious activity
  • Consider placing a fraud alert or a security freeze on your credit files
  • Protect your Passwords
  • Fight “phishing” – don’t take the bait

————————————————————————————————————————————————————-

Alertsec is the full disk encryption service that delivers a mobile data protection system for all information stored on laptops used throughout your organization.

Centura Health hit by phishing attack

April 29th, 2014

 

Mercy Regional Medical Center of Durango, Colo.  suffered data breach because of phishing attack. In the recent times, phishing attacks have become more complex. It is observed that it is difficult even for shrewd of users to pick out. Mercy which is owned by Centura Health notified 1000 patients about the incident. Data affected by phishing attack includes names, Social Security numbers, Medicare beneficiary numbers, addresses, dates of birth and phone numbers. It also includes protected health information (PHI) such as diagnoses, dates of service, names of a patient’s treating physician and medical-record numbers.

Statement of Centura read, “We became aware that a small number of employee e-mail accounts may have been accessible as a result of the phishing. We hired an outside forensics expert firm to perform a comprehensive review of the affected employees’ e-mail accounts and confirmed that some of the e-mails contained patient information and may have included patient demographic information and/or clinical information and in some instances Medicare Beneficiary number and Social Security number.”

According to reports, Mercy employees were the target of a phishing email attack in which the hackers tried to obtain user names and passwords.  Phishing email was carefully drafted which gave the impression of authentic communication which trapped some employees to reveal system login information.

“Those steps included immediately stopping the attack, performing an investigation and hiring an outside forensics expert to assist, reinforcing education to all employees regarding ‘phishing’ emails and continuing to implement enhancements for strengthening user login authentication,” the statement read which implies Centura taking steps to implement  and reinforce necessary protective measures to help prevent future occurrences.

Alertsec strengthens security

Alertsec has created a web based encryption service that radically simplifies deployment and management of PC encryption by using industry leading Check Point Full Disk Encryption (former Pointsec) software.

Organizations, especially corporate giants, have to have an information security policy in place that proves they have taken necessary steps and measures to safeguard the information they gathered. If these policies are not adhered to, the regulators may prosecute.

Alertsec Xpress is used by organizations that have recognized the need to protect their information. Customers range from single-user sole traders and consultants to multinational companies with a large number of offices around the globe. Over 4 million users worldwide use Alertsec Xpress’s Check Point Full Disk Encryption.

Enhanced by Zemanta

Twitter aiming to slash phishing e-mails sent from ‘Twitter.com’

February 17th, 2013

If you get an e-mail saying it’s from Twitter, the social-networking company wants to assure you that it’s really from Twitter and that there’s no need to worry that someone’s out to steal your password.

At least, it’s almost certain that the e-mail you just got from a Twitter.com address is not a phishing attack, the company said in a blog post today.

Twitter said it has adopted a new security protocol known as DMARC that was designed by a consortium in order to cut way down on phishing attempts.

DMARC solves a couple of long-standing operational, deployment, and reporting issues related to e-mail authentication protocols. It builds on established authentication protocols (DKIM and SPF) to give e-mail providers a way to block e-mail from forged domains popping up in in-boxes. And that in turn lessens the risk users face of mistakenly giving away personal information.

Twitter did not immediately respond to a request for comment about how big a problem these kinds of phishing attacks have been in the past.

In its blog post, Twitter said that all four major e-mail providers — Gmail, AOL, Yahoo Mail, and Hotmail/Outlook — have signed on to the DMARC protocol in an industrywide attempt to make e-mail just a bit safer by preventing messages that seek to pilfer users’ personal information from ever making it into their in-boxes.

Then again, in its blog post, Twitter said only that it’s “extremely unlikely that most of our users” will get phishing attacks purporting to be sent by Twitter. That leaves the company a little wiggle room in case the practice continues, or if the phishing community figures out a way to bypass the DMARC protocol and resume its nefarious work. After all, if there’s one thing that’s guaranteed to get hackers and bad actors looking for a way to keep doing their thing, it’s a public announcement that they’ve been neutered.

Get your personal as well as office laptops encrypted by Alertsec

Unencrypted laptops present a major risk of data loss. 80% of information theft is due to lost or stolen laptops and other equipment. About 50% of network intrusions are performed with credentials gathered from lost or stolen devices. The penalties for a data breach are severe not only in terms of the monetary fines imposed on the organization, but also the potential loss of trust from customers and suppliers. Encryption software greatly enhances the security of your organization’s data as the information is not compromised if a laptop is lost or stolen.

Alertsec Xpress is the full disk encryption service that delivers a mobile data protection system for all information stored on laptops used throughout your organization.

Enhanced by Zemanta

BEWARE OF A NEW dangerous Facebook phishing scam!

January 1st, 2013

A very convincing scam that spoofs Facebook verification pages is being used to steal users’ personal details and credit-card information before taking user to the real Facebook, leaving many victims none the wiser that they’ve just given their sensitive details to criminals.

The scam, outlined by Australian software architect Troy Hunt on his blog, starts out as a link to a viral video or other Internet meme, perhaps in a friend’s tweet. It’s a shortened link that obscures its real destination, but users will be relieved to land on what looks like the standard Facebook login page.

After the visitor logs into his Facebook account, the phony site asks victims to update their Facebook account security and provide additional information — a security question, a mobile-phone number and full credit-card details, right down to the expiration data and card security code. There’s even an “overall protection” graph that mimics password-entry forms.

Unless they pay close attention to the address bar, the nearly perfect spoof page is likely to make users feel perfectly safe. Although the page looks exactly like Facebook, it’s actually faceboourk.com.

Once users have given “Faceboourk” their Facebook login credentials, phone numbers and credit cards, the site’s work is done. It takes them to the real Facebook login page, stealing their personally identifiable information and dumping them at Facebook’s front door in one seamless motion.

Scams like this aren’t new or uncommon, but this one’s level of sophistication and lack of spelling mistakes makes it especially noteworthy.

Hunt tried to look up the Internet registration information for the phony site, but was only able to glean that information entered into the faux Facebook pages was redirected to a “parked” (unused but registered) porn URL, and from there sent elsewhere.

Hunt said he thinks the scam may have abated for now. Still, Internet users should always treat links with skepticism and pay close attention to the URL, especially when entering sensitive information.

Scammers’ likely use the information gleaned from such phishing scams to sell on the black market or commit identity theft and financial fraud.

Their unscrupulous activities can lead to days, weeks and even months of financial headaches as victims attempt to sort out the financial havoc that’s been wreaked on their lives.

Get your personal as well as office laptops encrypted by Alertsec

Unencrypted laptops present a major risk of data loss. 80% of information theft is due to lost or stolen laptops and other equipment. About 50% of network intrusions are performed with credentials gathered from lost or stolen devices. The penalties for a data breach are severe not only in terms of the monetary fines imposed on the organization, but also the potential loss of trust from customers and suppliers. Encryption software greatly enhances the security of your organization’s data as the information is not compromised if a laptop is lost or stolen.

Alertsec Xpress is the full disk encryption service that delivers a mobile data protection system for all information stored on laptops used throughout your organization.

Enhanced by Zemanta