Summa Health may have had data breaches of 500 patient records, other sensitive information

More than 500 patient medical records and other sensitive information were exposed in potential data breaches at Summa Health in August and March.

Summa Health announced Friday that it was sending letters to patients who were potentially affected by what the Akron-based health system called an “email phishing incident” that targeted Summa employees.

Email phishing is a term that describes when a person clicks on an email that looks legitimate and asks the person to input sensitive information. The email phishing could be the way a data breach occurs.

Summa said after its investigation, experts were unable to determine whether information such as medical records, treatment information, dates of birth and for a small subset of patients, Social Security and driver’s license numbers, contained in employee emails were viewed by the unauthorized people.

Summa said it was mailing letters to affected patients starting Friday, establishing a dedicated call center and offering free credit monitoring and protection services. It could take several weeks for the letters to arrive, spokesman Jim Gosky said.

Gosky said the number of affected patients is more than 500.

Summa learned May 1 that “an unauthorized person gained access to a limited number of employee email accounts that contained patient information,” according to a news release from the health system. Two accounts were accessed in August and two other accounts were accessed between March 11 and March 29.

Summa said it made sure the accounts were secured and began an investigation, including hiring a computer forensic firm. “The investigation was unable to determine whether the unauthorized individual actually viewed any email or attachment in the accounts,” Summa said.

Officials said “out of an abundance of caution, Summa Health thoroughly reviewed every email and attachment in the accounts to identify patients whose information may have been accessible to the unauthorized person. Patient information was identified in the accounts, including patient names, dates of birth, medical record or patient account numbers, and clinical and/or treatment information. For a small subset of patients, health insurance information, Social Security numbers, and/or driver’s license numbers were also found in the accounts.”

Summa said it was recommending patients review the statements they receive from their health care providers and health insurers. If there are unrecognizable services, contact the provider or insurer immediately. For eligible patients whose Social Security number or driver’s license number was found in the email accounts, Summa Health is offering complimentary credit monitoring and identity protection services. The details will be in the letter.

“Summa Health remains committed to protecting the confidentiality and security of its patients’ information. To help prevent something like this from happening in the future, Summa Health is reinforcing employee training on privacy and security and is instituting additional security measures throughout the health system,” the health system said.

Article Credit: Beacon Journal/Ohio.com

The Cybersecurity 202: This Florida city just paid hackers a huge ransom. Is that better or worse for taxpayers?

A small Florida city paid an extraordinary $600,000 in ransom this week to hackers who had locked up the city’s computer systems — highlighting an increasingly common dilemma for city leaders across the country. 

Cities have been hit with an increase in ransomware attacks in recent years since tight budgets have left them with outdated and hackable computer systems. But paying the ransoms to reverse the attack means putting money — taxpayer money — into the hands of nefarious hacking groups who probably will use it to target other victims.  

If they refuse to pay up, though, they could be saddled with an even bigger bill to get their cities back online. And they may have to deal with lasting consequences — like in Baltimore, where city leaders decided against paying the ransom and still hasn’t restored all its city services six weeks after a devastating attack. 

“When you pay the ransom, you’re making the bad guys better,” says Allan Liska, a threat intelligence analyst at cybersecurity firm Recorded Future. “But, from a strictly business perspective, sometimes you have to pay the ransom because the cost of not paying it is going to be much, much more.”

But cities, of course, are not just businesses – they have citizens who don’t want their tax dollars wasted and leaders who want to get re-elected. Given there are taxpayer costs to either choice, this is both a practical and moral question for city leaders. 

“It’s their constituents’ money and it’s taxpayer money, so that’s very different,” Liska tells me. 

Not to mention, there could also be career and electoral consequences for city officials who don’t stand up to bad guys. “No politician wants to go on record as having paid a ransom to a cybercriminal,” Liska said.

Already on Thursday, the payout had registered in Washington, where Sen. Marco Rubio (R-Fla.) said he’s working on ways the federal government can help.

A study from Recorded Future found that cities are actually slightly less likely to pay off ransomware hackers than other victims. Just 17 percent of the cities struck with ransomware in the study paid compared with about 45 percent of ransomware victims overall.

That figure could change, though, as city officials draw lessons from major ransomware attacks in cities that didn’t pay. In Baltimore, officials expect to pay about $18 million after refusing to pay a ransom demand of just about $70,000, and a 2018 attack in Atlanta cost the city about $2.6 million to recover from. 

In the case of Riviera Beach, Fla., the city suffered through three weeks during which city workers couldn’t access their email accounts and emergency dispatchers couldn’t log calls into computers, my colleague Rachel Siegel reported. Ultimately, the city council voted unanimously to pay the hackers 65 bitcoin, which amounts to about $592,000.

Price tags like that are bound to make city officials think twice about whether they can refuse a ransom demand, Joe Hall, chief technologist at the Center for Democracy and Technology, told me.

“You’d think the incentive would be to pay as little as possible,” he said.

Ransom payments and ransomware recovery costs are sometimes covered by insurance, but insurance rarely covers all the costs and a big payout will raise cities’ insurance rates. 

Another lesson cities are hopefully taking from the Baltimore, Atlanta and Riviera Beach examples, however, is that they should be better protecting their computer systems against hackers before the ransomware strikes, Tad McGalliard, director of research and policy at the International City/County Management Association, told me.

That includes installing basic protections such as guarding against phishing emails and requiring extra verification before people can access computer systems, he said. It also includes making sure that all the city’s vital records are backed up someplace offline where hackers can’t seize them and lock them up.

“We’re likely to see a continuing increase in ransomware attacks on local governments, but I hope we also see local governments taking note of this and doing everything in their power to bulk up their cyber defenses,” McGalliard said.

Article Credit: Washington Post

Data Storage and Protection Solutions.

StorageCraft® OneXafe® is a converged data platform that unifies enterprise-class data protection with scale-out storage in an easy-to-use, configurable solution. For businesses looking to protect and manage their data in heterogeneous environments, OneXafe eliminates complexity and provides flexible deployment to accommodate various workload requirements. At the same time, it significantly reduces costs associated with primary and secondary storage as well as data protection software. By providing a converged solution, OneXafe removes the need for siloed point solutions and minimizes costs incurred from standalone hardware and software offerings. At the core of OneXafe is a patented distributed object-based file system that delivers universal data access by providing NFS and SMB access to users and applications. Data protection services are directly integrated into the distributed object store, delivering powerful backup and recovery, with a work flow optimized for simplified management. OneXafe tightly integrates with StorageCraft Cloud Services, with a single click it provides business continuity of data, network, and application recovery in StorageCraft’s Cloud. There are a number of configurable options available within OneXafe, from primary storage, to secondary storage, to enterprise-class data protection combined with secondary storage. It is seamlessly administered with OneSystem, our simple, intuitive, yet powerful management service. OneXafe enables ease of implementation for both powerful data protection and optimum scale-out storage.

Configuration:
OneXafe includes a multi-purpose storage appliance that can be configured based on your business needs.

– Converged Secondary: Enterprise-class data protection enabled and configured with secondary storage, reducing management complexity and operational costs.

– High Performance Storage: Scalable storage for high performance unstructured data and backup targets. Can be configured to serve primary storage for virtual workloads, unstructured data, or secondary storage with high performance needs.

– Capacity Storage: Scalable storage for large scale unstructured data and backup targets. Can be configured to serve as secondary storage for your backup needs.

In the case of disaster, OneXafe ensures business continuity with a complete, orchestrated virtual failover to the cloud in one click, when used with our Cloud Services. OneXafe’s tight integration with the cloud makes recovery of the entire infrastructure simple, quick, and seamless, while offering the highest service level agreements (SLAs) with one throat to choke.

Enterprise Systems Corporation is an industry partner of
StorageCraft® OneXafe® Solutions. Contact us today for more information.

Solving Law Enforcement Data Challenges

Rising Volume of Data From Body Cameras
Body-worn cameras (BWC) used by law enforcement generate rich media that can be retained up to 5 years. As agencies increasingly deploy BWCs, they encounter a significant obstacle: the high cost, complexity and compliance of storing video surveillance footage. As a result, there is an immanent need to have a viable and cost-effective application that allows data storage, backup and recovery, and data management.

Rising Costs of Data Management
A recent study by the Major Cities Chiefs Association show 95% of police departments in the U.S. are either using body cameras now or will in the future. These BWCs generate extensive media that is stored up to 90 days. Departments with approximately 200 officers, on average per year, capture 33 terabytes of video data and about 800,000 videos, which translates to nearly $2 million for annual storage costs. Some counties alone have opted against using BWCs because of the high price. There is no investment protection and it ultimately leads to spiraling costs. Many agencies end up with independent storage silos, all managed and accessed separately. Fortunately, there are new storage architectures and approaches to dramatically simplify the burden of storage management to drive down costs.

StorageCraft’s Scale-Out Storage
StorageCraft for Law Enforcement is a game-changing solution that is highly scalable, easy to manage and replicate, and cost-effective. Law enforcement agencies can start with 10 terabytes of storage and scale to petabytes in the same cluster. They can add any number of drives, anytime and in any granularity to meet their storage requirements. When they expand their available storage capacity there is zero configuration and no application downtime. Under 15 minutes, a law enforcement agency can have disaster recovery infrastructure installed and replicating. The software is architected to make storage management and remote replication easy, efficient, and without the need for high-level storage expertise.

Results
With StorageCraft, law enforcement agencies can finally realize the full benefits of BWCs and surveillance video. They can better serve citizens and bring greater transparency to their communities—all while keeping their storage budgets under tight jurisdiction.

OneXafe & OneSystem
StorageCraft delivers scalable storage solutions – OneXafe, a powerful, yet simple, scale-out storage appliance, coupled with OneSystem, a cloud-based storage management service. The solution has been designed from the ground-up to fully exploit today’s advances in storage technologies to deliver a single infrastructure that integrates advanced storage features and bring storage management simplicity across multiple fronts. OneXafe is a Network Attached Storage appliance with all enterprise-grade features built-in such as continuous data protection, compression, inline deduplication, and disaster recovery and is largely automated with no need for expertise to setup and operate. The unique scale-out, converged storage appliance consolidates primary data as well as the backup and archival data in a single, simple to use storage infrastructure.

Scale-out Storage on the Go
– Expand storage seamlessly: Law enforcement IT teams can expand storage dynamically and scale granularly, one drive at a time, or by adding multiple OneXafe appliances, all without any configuration changes to the application.

– Safeguard surveillance data: OneXafe takes continuous and immutable snapshots automatically every 10 seconds for the first hour, then on an hourly, daily, weekly, and monthly basis. Should a ransomware attack occur, encrypting the data and corrupting the primary file system, these snapshots are completely unaffected, immune from any modification or deletion.

– Reduce storage costs: OneXafe eliminates costs caused by over-provisioning. With high data reduction ratios, it reduces the costs of expanding hardware and operational expenses, lowering the cost per TB even further. OneXafe allows IT teams to purchase enterprise class drives at retail pricing, driving down costs even more without the vendor markups

Germany – Bayer Pharmaceuticals

https://www.zdnet.com/article/drug-firm-bayer-targeted-by-cyberattack-threat-contained/

Exploit: Malware attack
Bayer Pharmaceuticals: German multinational pharmaceutical and life sciences company

Risk to Small Business: 2 = Severe: In a statement this past Thursday, Bayer revealed that infectious software was discovered on its systems back in early 2018. Before removing the malware in March, the company proceeded to “spy” on the hackers to identify the responsible party. Without any further details on their incident response methodology or further information on what Bayer means by “spy” ID Agent recommends always contacting an Incident Response Team if a compromise has been identified. Allowing an unknown third party to continue accessing data is generally inadvisable. The drug maker announced that there is no evidence of data theft, and they have traced the source of the hack to a group known as Winnti.

Individual Risk: 2.428 = Severe: No individuals are at risk

How it Could Affect Your Customers’ Business: The era of industrial espionage is here, and small businesses should be taking notice. Hackers are setting their sights towards technology and intellectual property, given its tremendous value and sometimes limited security. Phishing campaigns are the most frequent of all attack vectors, followed by infection via custom malware.

Designed to protect against human error, Bullphish ID simulates phishing attacks and manages security awareness training campaigns to educate employees, making them the best defense against cybercrime. Learn more from Enterprise Systems. More information here: https://www.idagent.com/bullphish-id

Canada – BC Pension Corporation

https://www.cbc.ca/news/canada/british-columbia/bc-pension-plan-warning-8000-privacy-breach-1.5087283 Exploit: Missing microfiche BC Pension Corporation: One of the largest pension plan administration agents in Canada

Risk to Small Business: 2 = Severe: Members of the BC College Pension Plan are receiving notifications that their information may be at risk after a box went missing during an office move from last year. Contents of the container included microfiche with personal information of members who worked from 1982 to 1997, and the breach was discovered in October 2018. Although the corporation has declared this as a low risk security incident, FIPA argues that it is a high-risk attack. Along with negative publicity, the BC Pension Plan Corporation will face backlash from members and may spearhead the case for implementing mandatory data breach reporting requirements in British Columbia.

Individual Risk: 2.428 = Severe: Some of the information includes names, social insurance numbers and dates of birth. Although there is currently no indication of an attack, plan members should investigate identity and credit reports to see if they were affected. In the words of one of the affected members, West Kelowna resident Pamela Stevens, “the information is out there, and there are people that wait around for these things to happen to get people and to use their cards and information to misuse it.”

Customers Impacted: Around 8,000 
How it Could Affect Your Customers’ Business: Delays in breach notifications compound over time and can prove costly for companies. Without proper detection, it becomes nearly impossible to identify the source of a breach, with the end-result being disgruntled customers, penalties, and more. Along with partnering up with security providers to incorporate Dark Web monitoring solutions, businesses must alert their customers immediately to maintain a healthy dialogue.

Enterprise Systems and Dark Web ID can monitor the Dark Web and find out if your employee or customers data has been compromised. We work with end customers to strengthen their security suite by offering industry-leading detection.

United States – Secaucus High School

Exploit: Malware
Secaucus High School: New Jersey school district

Risk to Small Business: 2.333 = Severe: Two high school freshmen were arrested for disabling their school’s Wi-Fi system to avoid taking tests. The students used a private company to execute the hack, resulting in them being charged with computer criminal activity and conspiracy to commit computer criminal activity. Although the systems are back up and running, it remains to be seen how the students will be disciplined by the school district.

Individual Risk: 2.482 = Severe: None.

Customers Impacted: 2
How it Could Affect Your Customers’ Business: Hacks are being commoditized, with packaged products capable of bringing down systems and stealing information becoming readily available on the Dark Web. Smaller organizations must learn to recognize such trends and protect their members, customers, and staff by investing in security providers that host solutions enabling them to understand the inner workings of online, underground marketplaces.

Enterprise Systems and Dark Web ID™ can find out how payment data is being used on the Dark Web, even in the case of a malware attack. We work with end customers to strengthen their security suite by offering industry-leading detection.

United States – Brookside ENT & Hearing Center

xploit: Ransomware attack
Brookside: Medical practice in Battle Creek, Michigan

Risk to Small Business: 2 = Severe: The doctor’s office of Dr. William Scalf and Dr. John Bizon will be forced to close on April 30th after falling victim to a ransomware attack and refusing to pay $6,500 to regain access. Although hackers were unable to compromise their data, all information regarding appointments, patients, and payments was completely erased.

Individual Risk: 2.428 = Severe Sensitive information of individuals was not accessed, only deleted. However, none of the unrecoverable data was salvaged and the office closure will force patients to seek treatment elsewhere, even those with imminent health concerns.

How it Could Affect Your Customers’ Business: This security incident is a perfect example of how devastating a ransomware attack can be for small businesses and their customers. Hackers are capable of wiping out infrastructure and important records, causing business owners to rebuild from the ground-up. As such, company managers must begin assessing cybersecurity threats and working with Partners such as Enterprise Systems to protect themselves from compromises going forward.

Enterprise Systems can find out how payment data is being used on the Dark Web, even in the case of a malware attack. We work with you to strengthen your security suite by offering industry-leading detection.

Breach: United States – Burrell Behavioral Health (BBH)

Exploit: Unsecured business associate portal
BBH: Mental health service provider based in Missouri https://healthitsecurity.com/news/67000-patients-impacted-by-business-associate-breach-from-august-2018

Risk to Small Business: 2.333 = Severe: BBH has sent letters to patients notifying them of a breach that occurred in August of last year. Potential attackers would be able to infiltrate a business associate’s portal to access electronic protected health information (ePHI) and compromise sensitive records. The mental health service provider noted that there was no evidence of unauthorized access, but will be providing free identity monitoring, protection, and reporting from agencies including Equifax, Experian, and TransUnion. Along with the direct costs associated with offering such services to patients, the organization will have to pour funds into reputation management.

Individual Risk: 2.571 = Severe: The exposed records included names, addresses, contact information, DOBs, medical history information, driver’s license numbers and SSNs. Given the amount of time that has lapsed, patients are at high risk and should immediately begin monitoring their identity and credit reports.

Customers Impacted: 67,493 patients
How it Could Affect Your Customers’ Business: As breaches continue to become more commonplace, companies are being held accountable for providing free identity protection for their customers and employees. Such damage can be disabling for small businesses, especially when combined with the costs that come with managing public relations.

Monitoring the Dark Web for stolen credentials is critical for our end customers who want to provide comprehensive security to their efforts. BullPhish ID™ simulates phishing attacks and security awareness training campaigns to educate employees, making them the best defense against cybercrime.

Ransomware attack pays off as Delaware Guidance Services gives in to criminals

The Delaware Guidance Services (DGS) for Children and Youth is the latest organization to pay off the cybercriminals who locked up their network with a ransomware attack.

The Dover, Del., based organization said in a letter to its patients and guardians that the attack took place on December 25, 2018. Files containing personal information, such as name, address, birth date, Social Security Number, and medical information were affected. DGS is a not-for-profit provider of comprehensive psychiatric services for children and their families in Delaware.

“To secure release of the records, DGS was required to pay a “ransom,” in exchange for a de-encryption ‘key’ that unlocked the records,” it said.

DGS did not indicate in the letter whether or not it tried to rectify the situation and recover the information without paying the ransom nor how much was paid. The organization has hired an outside security firm to investigate the matter and to determine if the data was accessed by the attackers. At this time, DGS said, it does not believe any of the records were compromised.

DGS is not alone in deciding to pay the ransom in order to regain access to their systems. Jackson County, Ga., officials paid $400,000 to its attackers last week and Columbia Surgical Specialist of Spokane, Wash., shelled out a $15,000 ransom earlier this month to recover from an attack.