Ad
×

You have a chance to win a reward! 🎁

🎁 Gift Cards

Amazon, Visa, Google Play, Netflix & more

💸 Cash Rewards

Win $100, $250 or even $500 directly to PayPal or bank

📱 Electronics

iPhones, PS5, Smartwatches, Laptops & more

🎟️ Coupons

Huge discounts for shopping, food delivery, and travel

🔓 Premium Content

Access exclusive apps, tools, courses or hidden files

📝 Surveys

Get rewarded for sharing your opinion or testing new products

or

Healthcare data breach at Episource exposes 5 million patient records


NewYou can now listen to Fox News articles!

During the past decade, the software company built solutions for almost every industry, including health care. One term that could be familiar with software as a service (SAAS), model according to which software is accessed through subscriptions, not installed on individual machines.

In health care, Saas providers are now a common part of ecosystems. But recently, many of them have made headlines for the wrong reasons.

Several data violations were requested on vulnerabilities on these third party services. The The latest incident It comes from such a company, which has now confirmed that hackers in June violated health information of over 5 million people in the United States during the Ciberate in January.

Sign up for my free Cyberguy report
Get my best technical advice, emergency safety warnings and exclusive offers delivered directly to your mail. In addition, you will receive current access to my top survival survival – free when you join.

Ascending Health Data Exhibition 430,000 Patient records

Health hide 1

Healthcareer views data on the tablet (Kurt “Cibergui” Knutsson)

SaaS company leads to main health error

Episource, a large name in health care and coding services, has confirmed Main Cyber ​​Incident (Via Bleeping Computer). The violation included sensitive health information that belonged to over 5 million people in the United States. The company first noted suspicious activities of the system 6. February 2025. years, but the actual compromise began ten days earlier.

The internal investigation revealed that hackers were approached and copied private data between 27. and 6. February. The company insists on not Financial information was takenBut stolen records include names, contact information, social security numbers, Medicaid IDs and full medical histories.

Episource claims that there is no evidence that the information was abused, but because they have not seen the decline yet means it does not happen. Once such data is not outside, it spreads quickly, and the consequences are not waiting for official confirmation.

Health marriage 2

The woman looks at the health app on her smartphone (Kurt “Cibergui” Knutsson)

Over 8 million patients leaked in violation of data on health data

Why is Health Saas growing target

The health industry has accepted cloud-based services to improve efficiency, scaling surgery and reduction above the head. Companies such as Episource enable payers to health care management and risk adjustment at a much larger extent. But this accommodation also introduced new risks. When third party suppliers manage the patient data, the security of this data becomes dependent on their infrastructure.

Health care data are among the most valuable types of personal data for hackers. Unlike payment data, which can change quickly, medical and personal records are long-lasting assets in dark web. These injuries can lead to insurance fraud, identity theft and even blackmail.

Episource is not alone in dealing with this type of attack. In the last few years, several SAAS health providers faced violations, including Accellion and Blackbaud. These incidents hit millions of patients and led to lawsuits in the class and stricter government supervision.

What is artificial intelligence (AI)?

Health violation 3

Healthcare worker home on laptop (Kurt “Cibergui” Knutsson)

5.5 million patients exposed to great violations of health care data

5 ways in which you can protect yourself from violating health data data

If your information is part of a violation of health care or any similar, it is worth taking several steps to protect yourself.

1. Consider protection against identity theft: Since misdemeanor data on health is exposed personal and financial information, it is crucial to remain proactive against identity theft. Identity Theft Services offer continuous monitoring of credit reports, social security number, and even dark detection networks if your information is abused.

These services send you real-time warnings about suspicious activity, such as new credit queries or attempts to open your name, helping you act quickly before serious damage occurs. In addition to monitoring, many identity theft companies provide dedicated recovery professionals who help you solve the issue of fraud, challenging unauthorized costs and restore your identity if it is compromised. See my tips and best choices to protect yourself from identity theft.

2 Use personal data removal services: It has passed that misdemeanor data on health care is missing a multitude of information about you and all this could end up in a public domain, which essentially gives any opportunity to deceive you.

A proactive step is to consider the services of personal data removal, which specialize in continuous monitoring and removing your data from different network databases and sites. Although no service promises to remove all your data from the Internet, having removal service is great if you want to keep track of and automated the process of removing data with hundreds of locations continuously for a long period of time. See my above selections for data removal services here.

Get Free Scan To find out if your personal information is online already.

3. Have a strong antivirus software: Hackers have email addresses on people and full names, making it easier for them to send you a phishing connection that sets malicious software and steals all your data. These messages are socially designed to catch them and catch them almost impossible if you are not careful. However, you are not without defense.

The best way to protect yourself from malicious links is to install strong antivirus software on all your devices. This protection can also warn you of phishing emails and redemption fraud, keeping your personal data and digital funds. Get my choices for the best winners for protection from antivirus 2025 for your Windows, Mac, Android and IOS devices.

4. Enable double authentication: While passwords were not part of the data offenders, you still need to enable Two-factor authentication (2Fa). It gives you an additional layer of security in all important accounts, including email, banking and social media. 2Fa requires you to provide another information, such as the code sent to the phone, next to the password when signing up. It is significantly harder for hackers to access your accounts, even if they have your password. Allowing 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.

5. Be careful in mailbox communications: Bad actors can also try to cheat you through snail mail. Missing data lets them access your address. They can represent people or brands you know and use themes that require urgent attention, such as missed deliveries, accounts for accounts and security warnings.

Windows 10 security omissions leave millions of vulnerable

Kurt’s Key Water

Why this violation is especially alarming that many affected patients have never even heard of an episode. As a business business provider, Episource operates in the background, working with insurers and health givers, not directly with patients. The people affected were the customers of these companies, and yet their most sensitive data is now at risk due to the third party that would never choose or believe. This type of indirect relationship of mud is water when it comes to responsible and makes it even harder to require transparency or hold anyone responsibility.

Click here to get Fox News app

Do you think that health companies invest enough enough in their cyber security infrastructure? Let us know to write us on Cibergui.com / Contact

For more of my technical advice and security warnings, subscribe to my free information newsletter in Cyberguy Cybergui.com / Wondent

Ask Kurt question or let us know what stories you want to cover

Follow Kurt on his social channels

Answers to the most favorable Cyberguy questions:

New from Kurta:

Copyright 2025 Cybergui.com. All rights reserved.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *