Clinic employee takes phishing bait, may have exposed 19,000 patients’ info: 4 details

.

A staff member of a Houston location health center reacted to a phishing e-mail that enabled unapproved access to countless patients details in the email account, the health system running the clinic stated.
4 things to understand:
1. The Legacy Community Health Services employee reacted to the phishing email, thinking it was a genuine demand, and offered a licensed person access to the e-mail account April 10- 16, Legacy said. The system learned of the breach on April 16 and immediately protected the account.
2. The health system is examining the e-mail accounts contents to recognize clients whose information was exposed in the breach. The e-mail account included client names, dates of service and related health care info.
3. Legacy, a completes federally certified health center with clinics across Houston and the surrounding location, reported to HHS that there were 19,000 individuals affected by the breach.
4. The health system will alert afflicted clients, according to a declaration about the incident on Legacys website. The system stated it does not have evidence that patient info was misused.
More articles on cybersecurity: UnityPoint Health to pay $2.8 M+ settlement over phishing attacks: 6 details10 health system phishing, ransomware and malware incidents this monthUF Health organisation associate e-mail hack exposes information of health strategy members

The Legacy Community Health Services staff member reacted to the phishing e-mail, believing it was a legitimate request, and gave an authorized individual access to the e-mail account April 10- 16, Legacy said. The health system is examining the email accounts contents to recognize clients whose information was exposed in the breach. The health system will inform affected clients, according to a declaration about the incident on Legacys website.

© Copyright ASC COMMUNICATIONS 2020. Interested in LINKING to or REPRINTING this material? View our policies by clicking here.