BlogCybersecurity
Security questionnaire overload? Know your options.
5 Minute Read
Read Security questionnaire overload? Know your options.Cybersecurity
By CORL Technologies | May 9, 2022
CORL continuously monitors cybersecurity events and alerts customers about organizations in their supply chain that have been breached. As part of our tech-enabled managed services for vendor risk management, we also follow up with vendors and track remediation and response activities following breach events.
Our Vendor Breach Digest provides a summary roll-up of major breach events for third-party vendors operating within the healthcare supply chain.
Okta and Microsoft are investigating claims of stolen data from the same threat actor, Lapsus$. Screenshots of the allegedly misappropriated data were shared by the group, but investigations by victims show no evidence of ongoing malicious activity. However, one of the posted screenshots indicates that Lapsus$ could change customer passwords using Okta’s admin panel. Read more about the Okta and Microsoft breach |
SummaCare suffered a data leak from a misconfiguration affecting approximately 1,100 individuals. Member information was accessible via the Internet including names, health insurance ID numbers, patient account numbers, dates of service, provider names and limited treatment information. Read more about the SummaCare breach |
Healthplex, Inc experienced a phishing incident that may have impacted approximately 76,262 individuals. The data in the compromised email account included first and last name, address, group name and numbers, member ID numbers, plan affiliation, date of birth, date of service, provider name, ADA codes and their description, billed/paid amounts, prescription drug names, Social Security number, banking information, credit card numbers, username and password for the member portal, email address, phone numbers, and driver’s license numbers. Read more about the Healthplex breach |
GitHub suffered a breach from an unknown attacker who downloaded data from private code repositories including that of npm – the world’s largest software registry with 75 billion downloads a month. GitHub was compromised after the attacker stole authentication tokens from two other upstream software firms. Read more about the GitHub breach |
Arcare suffered a malware incident that enabled an unauthorized actor to access or acquire data. Information involved included names, Social Security numbers, driver’s license or state identification numbers, dates of birth, financial account information, medical treatment information, prescription information, medical diagnosis or condition information, and health insurance information. Read more about the Arcare breach |
American Dental Association suffered a cyberattack, causing them to shut down portions of their network while investigating the attack. Which disrupted various online services, telephones, email, and webchat. Read more about the American Dental Association breach |
T-Mobile experienced a breach by cybercrime group LAPSUS$ where their source code was stolen from a range of company projects. Read more about the T-Mobile breach |
Mental Health Center of Greater Manchester experienced a data security event with one of their vendors where privacy of certain information relating to MHCGM patients or those who were assessed for treatment by MHCGM may have been impacted. Information that may have been accessed included name, address, date of birth, Social Security number, diagnosis, medical information, discharge information, and treatment location and/or healthcare provider. Read more about the Mental Health Center of Greater Manchester breach |
Mountain Area Health Education Center experienced an improper disposal of paper/films that affected approximately 1115 individuals. Details are limited and the breach was reporting to the Department of Health and Human Services. Read more about the Mountain Area Health Education Center breach |
The State Bar of Georgia recently learned of unauthorized access to its network. They are still investigating the incident and have not determined what information, if any, the unauthorized actor may have accessed. Read more about the State Bar of Georgia breach |
McCarter & English experienced a network security incident that temporarily affected the availability of their computer systems. Read more about the McCarter & English breach |
Kaiser Foundation Health Plan suffered an unauthorized access/disclosure to their network server that affected approximately 695 individuals. Details are limited and the breach was reporting to the Department of Health and Human Services. Read more about the Kaiser Foundation Health Plan breach |
Touchstone Imaging experienced a data security breach that affected approximately 46,799 individuals. Affected information included names, addresses, Social Security numbers, medical information, and health insurance information. Read more about the Touchstone Imaging breach |
DialAmerica Marketing, Inc. detected an unauthorized user gained access to their computer network. While the leaked data varies based on the individual, it includes affected parties’ first names, last names, addresses, and other sensitive information. Read more about the DialAmerica Marketing breach |
Block, Inc. (formerly known as Square, Inc.) had an employee who had regular access to the records during their employment download customer records after leaving the company. The names, brokerage portfolio values and account numbers of past and present customers were compromised, affecting approximately 8,200,000 individuals. Read more about the Block, Inc. breach |
Parker Hannifin Corporation experienced a third-party breach to its system. Employee data and personal information may have been accessed. Read more about the Parker Hannifin Corporation breach |
MailChimp was hit by hackers who gained access to internal customer support and account management tools to steal audience data and conduct phishing attacks. Read more about the MailChimp breach |
HubSpot suffered a breach from a bad actor gaining access to an employee account and using it to target stakeholders in the cryptocurrency industry. Read more about the HubSpot breach |
Cytometry Specialists experienced a cyber-attack from the Conti Ransomware Gang. Files containing limited patient data were exfiltrated from its systems, which mostly contained patient names and case numbers used for identifying patients, but for limited patients also included addresses, dates of birth, medical record numbers, and health insurance information. Read more about the Cytometry Specialists breach |
Palo Alto Networks experienced an exposure of customer support tickets due to a bug in their support dashboard. Exposed information included contact name, title, email address and phone number of the customer creating the tickets. Contents of conversations between PAN support staff and customers were also exposed. Read more about the Palo Alto Networks breach |
Globant suffered a hacking by the Lapsus$ data extortion group. The hacking group release 70 GB archive of stolen data consisting of administrator credentials, source code and some customers source code. Read more about the Globant breach |
Gainwell Technologies, LLC suffered an unauthorized access/disclosure to their network server that affected approximately 2,765 individuals. Details are limited and the breach was reporting to the Department of Health and Human Services. Read more about the Gainwell Technologies breach |
In order to combat these growing supply chain risks, CORL has developed a proprietary data clearinghouse that provides access to assessment results of over 80,000 vendor assessments CORL has conducted. Each year, CORL conducts thousands more vendor risk assessments on behalf of our clients. Chances are very high that we have already assessed a substantial portion of your existing and new vendors from a security, risk, and compliance perspective.
CORL’s tech-enabled managed services and next generation exchange of vendor risk data allows healthcare entities to:
Contact our team here at CORL to learn more about our managed services and next generation exchange for healthcare vendor risk data that gets results with regulatory compliance and lowers supply chain risks.
CORL Technologies
CORL transforms TPRM chaos into clarity
CORL is a leading provider of vendor risk management solutions for the healthcare industry. CORL gets results by scaling organizational and vendor risk programs through our healthcare vendor risk clearinghouse solution, dashboard reporting that business owners can understand, and proven workflows that drive measurable risk reduction. CORL accelerates the speed of vendor risk assessments and holds vendors accountable for remediating risk exposures.
Related Posts
BlogCybersecurity
By CORL Technologies | August 9, 2024
5 Minute Read
Read Security questionnaire overload? Know your options.BlogCybersecurity
By CORL Technologies | February 12, 2024
3 Minute Read
Read Do You Understand Your Vendors’ SOC 2 Reports?BlogCompliance
By CORL Technologies | November 14, 2022
5 Minute Read
Read CISA Cyber Performance Goals: Third-Party & Supply Chain RequirementsWebinars
WEBINAR AI + Healthcare: The Evolving Cybersecurity Equation The healthcare industry is undergoing a profound transformation, driven by the integration of artificial intelligence (AI) into various facets of healthcare delivery, diagnosis, and treatment. AI technology has the potential to revolutionize healthcare, improving care quality, reducing costs, enhancing efficiency, and even improving outcomes. However, with these […]