123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Seacoast Radiology Notifies Customers After Security Breach

Profile Picture
By Author: Peter Martin
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

It is not uncommon for attackers to target websites, servers, computer systems and network to acquire control, gain unauthorized access, breach sensitive data or install malicious software. However, servers of a health service provider, Seacoast Radiology were targeted recently, by attackers to capture space and bandwidth. The purpose of the attack was to acquire additional space and bandwidth to play an online game - Call of Duty: Black ops.

Usually, organizations avail the services of ethical hacker certified professionals to identify the security flaws. In this case, the IT security experts found that the affected server contained sensitive personal information such as patient names, social security numbers, medical diagnosis codes, mailing addresses, phone numbers, billing procedures codes and other records of around 2,30,000 patients. Fortunately, the affected server did not contain any banking information. However, the available data on the servers can be misused by the hackers. While the attackers had no malicious intentions, even accidental data breach may have serious financial and personal repercussions on ...
... the affected individuals. Further, such attacks also result in disruption of services and adversely affect the credibility of an organization. The authorities at Seacoast Radiology have notified all patients whose records were stored on the affected server.

Often organizations find it difficult to ascertain, whether unauthorized access to servers has led to data breach. Lack of proper awareness among employees regarding incident handling may lead to loss of volatile evidence from the affected computers. Online computer training programs programs may help employees understand security threats and first responder procedures in the event of a breach.

Compromised information may be used by attackers for identity theft, stealing money, blackmail and other forms of fraud. IT Professionals who have undertaken security certification programs may help organizations in restructuring the security infrastructure to combat different types of threats emanating in the IT environment.

Total Views: 394Word Count: 308See All articles From Author

Add Comment

Computers Articles

1. Cheap Vps Hosting & Dedicated Server Solutions – Fast, Secure & Affordable | Rackoona
Author: Rackoona

2. Reliable Temperature Monitoring Solutions Enhancing Drug Safety And Freezer Storage Compliance By Tempgenius
Author: Chris Miller

3. Spark Matrix™: Evaluating Security Information And Event Management (siem) Solutions For Scalable And Intelligent Security Operations
Author: Umangp

4. How To Get In Touch With Bellsouth Customer Service By phone?
Author: frank rayan

5. Bca In Cyber Security Online: Curriculum, Labs, And 2025 Modules
Author: UniversityGuru

6. Web Scraping Christmas Holiday Liquor Demand Surge Data
Author: Den Rediant

7. A Step-by-step Guide To Launching Your Own White Label Gojek Clone App
Author: Swiza Joy

8. City Brawl: Fight Through The Streets
Author: citybrawl

9. Consigned Pcb Assembly
Author: circuitcardassembly

10. Precision Cnc Outcomes Driven By Advanced Jig And Fixture Design Practices
Author: Johan Vick

11. Gmail Recovery Without 2 Step Verification
Author: bhectorblog

12. Why You Should Never Rely Only On Free Antivirus Tools
Author: Arjun

13. Portable Gaming Computer
Author: Jack Williams

14. One Identity To Rule Them All? It’s Closer Than You Think
Author: Tushar Pansare

15. Quinoa Market: Growth Dynamics, Trends, And Future Outlook
Author: komal

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: