Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
NEWYou can now hear FOX News Articles!
In the past ten years, software companies have built solutions for almost every industry, including health care. A term that you may be familiar with is software AS A Service (SaaS), a model with which software is installed online via a subscription and not on individual machines.
In the healthcare system, SaaS providers are a frequent part of the ecosystem today. Lately, however, many of them have made headlines for the wrong reasons.
These third -party providers attributed several data injuries to weaknesses. The Last incident comes from such a company that has now confirmed that Hacker stole the health information of over 5 million people in the USA during a cyber attack in January.
Register for my free Cyberguy report
Get my best tech tips, urgent security warnings and exclusive offers that are delivered directly to your inbox. You will also receive immediate access to my ultimate fraud survival manual – free of charge if you join.
The violations of Ascension’s health care data reveal 430,000 patient files
A health worker who looks at data on a tablet (Kurt “Cyberguy” Knutson)
Episource, a big name in health data analysis and coding services, has confirmed A large cyber security incident (over Beep). The violation included sensitive health information, which belonged to over 5 million people in the United States. The company noticed suspicious system activities for the first time on February 6, 2025, but the actual compromise began ten days earlier.
An internal examination showed that hackers on private data and copied on private data between January 27th and February 6th. The company insists that no. Financial information was takenBut the stolen records contain names, contact details, social security numbers, medicaid -ids and full medical history.
Episource claims that there is no evidence that the information has been misused, but because they have not yet seen the Fallout, it does not mean that it does not happen. As soon as such data are no longer, it spreads quickly and the consequences do not wait for official confirmation.
A woman who looks at a health app on her smartphone (Kurt “Cyberguy” Knutson)
Over 8 million patient records were leaked into health data injuries
The health industry has accepted cloud-based services to improve efficiency, scale the operation and reduce overhead costs. Companies such as episource enable health payers to manage coding and risk adjustment on a much larger scale. This shift has also introduced new risks. If third -party providers handle patient data, the safety of this data depends on its infrastructure.
Health dates are among the most valuable types of personal information for hackers. In contrast to payment card data that can be changed quickly, medical and identity documents are long -term assets on the dark web. These violations can lead to insurance fraud, identity theft and even blackmail.
Episource is not alone when it comes to facing this type of attack. In recent years, several SaaS providers in the healthcare system have had violations, including Accellion and Blackbaud. These incidents have affected millions of patients and led to class suits and stricter state control.
What is artificial intelligence (AI)?
A health worker who taps her laptop (Kurt “Cyberguy” Knutson)
5.5 million patients who are exposed to serious violation of health data
If your information was part of the health violation of a similar health, it is worth taking a few steps to protect yourself.
1. Consider identity theft services: Since the health data injuries have exposed personal and financial information, it is crucial to remain proactively against identity theft. Identity theft services offer continuous monitoring of your credit reports, the social security number and even the dark web to determine whether your information is misused.
These services will send you real-time notifications about suspicious activities such as new loan inquiries or attempts to open accounts in your name and to help you act quickly before serious damage occurs. In addition to monitoring, many companies for protection theft protection offer special specialists for recovery that support you in solving fraud problems, not authorized fees and restore your identity if this is endangered. See my tips and best options on how you can protect yourself from identity theft.
2. Use services to remove personal data: The health data violates charges of information about you, and all of this could be open to the public, which essentially gives everyone the opportunity to cheat them.
A proactive step is to take into account personal data removal services that specialize in continuous monitoring and removal of your information from various online databases and websites. While no service promises to remove all of your data from the Internet, a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of websites over a longer period of time. Take a look at my top selection for data removal services here.
Get a Free scan To find out whether your personal data is already on the Internet.
3. Have a strong antivirus software: Hackers have the e -mail addresses and the complete names of people, which makes it easier for them to send them a phishing link, installed malware and steal all their data. These messages are socially constructed to catch them, and catching is almost impossible if they are not careful. However, they are not without defense.
The best way to protect yourself from malicious links is to have a strong antivirus software installed on all devices. This protection can also draw your attention to Phishing -E emails and ransomware frauds in order to keep your personal data and digital assets secure. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.
4. Activate the two-factor authentication: While passwords were not part of the data injury, they still have to be activated Two-factor authentication (2fa). There is an additional security level on all your important accounts, including e -mail, banking and social media. 2fa requires you to provide second information, e.g. B. a code sent to your phone in addition to your password when registering. This makes it much more difficult for Hackers to access their accounts, even if they have their password. Activating 2FA can significantly reduce the risk of non -authorized access and protect your sensitive data.
5. Be careful with Mailbox Communication: Bad actors can also try to cheat them through snail mail. The data leak offers you access to your address. You can pretend as people or brands you know and use the topics that require urgent attention, such as: B. missed deliveries, account pensions and security warnings.
Windows 10 safety errors make millions vulnerable
What makes this violation particularly worrying is that many of the affected patients may have never heard of Episource. As a business-to-business provider, Episource works in the background and works with insurers and health service providers, not with direct patients. Those affected were customers of these companies, but they are their most sensitive data that now endangered due to a third party that they never chose or trust. This type of indirect relationship confuses the water in terms of responsibility and makes it even more difficult to challenge transparency or to hold someone into account.
Click here to get the FOX News app
Do you think that health companies invest enough in your cybersecurity infrastructure? Let us know by writing us Cyberguy.com/contact
Subscribe to my free Cyberguy report newsletter by going more of my tech tips and security warnings Cyberguy.com/newsletter
Ask Kurt a question or let us know which stories you want to treat from us
Follow Kurt on his social channels
Answers to the most asked Cyberguy questions:
New from Kurt:
Copyright 2025 Cyberguy.com. All rights reserved.