123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Seacoast Radiology Notifies Customers After Security Breach

Profile Picture
By Author: Peter Martin
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

It is not uncommon for attackers to target websites, servers, computer systems and network to acquire control, gain unauthorized access, breach sensitive data or install malicious software. However, servers of a health service provider, Seacoast Radiology were targeted recently, by attackers to capture space and bandwidth. The purpose of the attack was to acquire additional space and bandwidth to play an online game - Call of Duty: Black ops.

Usually, organizations avail the services of ethical hacker certified professionals to identify the security flaws. In this case, the IT security experts found that the affected server contained sensitive personal information such as patient names, social security numbers, medical diagnosis codes, mailing addresses, phone numbers, billing procedures codes and other records of around 2,30,000 patients. Fortunately, the affected server did not contain any banking information. However, the available data on the servers can be misused by the hackers. While the attackers had no malicious intentions, even accidental data breach may have serious financial and personal repercussions on ...
... the affected individuals. Further, such attacks also result in disruption of services and adversely affect the credibility of an organization. The authorities at Seacoast Radiology have notified all patients whose records were stored on the affected server.

Often organizations find it difficult to ascertain, whether unauthorized access to servers has led to data breach. Lack of proper awareness among employees regarding incident handling may lead to loss of volatile evidence from the affected computers. Online computer training programs programs may help employees understand security threats and first responder procedures in the event of a breach.

Compromised information may be used by attackers for identity theft, stealing money, blackmail and other forms of fraud. IT Professionals who have undertaken security certification programs may help organizations in restructuring the security infrastructure to combat different types of threats emanating in the IT environment.

Total Views: 284Word Count: 308See All articles From Author

Add Comment

Computers Articles

1. Metaverse: trending Technology of Tomorrow’s Digital World
Author: goodcoders

2. How To Be Smarter About Developing Smart Contracts In Solidity?
Author: goodcoders

3. Asterisk Development Vs. Freeswitch Development: Which Is Right For You?
Author: Josh

4. Preparing For The Future: The Importance Of Pos Software Innovation
Author: Cannabaze

5. Why Collaboration Doesn’t Work: How Product Leaders Can Create More Effective Teams?
Author: goodcoders

6. Software Company In Lucknow - Sigmait Software Designers Pvt. Ltd
Author: SigmaIT Software Designers Pvt. Ltd.

7. Digital Transformation: It’s Importance In Today’s Business World
Author: Xsosys Technology(S) Pte. Ltd.

8. Ultimate Guide To Hp Printer Setup: Wi-fi, Wired Network, And Usb Connection
Author: theodore carter

9. 3 Major Challenges Associated With Blockchain Solutions
Author: 3 Major Challenges Associated With Blockchain Solu

10. Is A Gaming Desktop Still An Effective Choice For Hardcore Gamers?
Author: Jack Williams

11. Web Development Course: The Gateway To A Thriving Tech Career
Author: Infocampus

12. Why Choose A Kentucky Gate Company For Your Commercial Needs?
Author: naviworld1h

13. The Rise Of App Companies In Kansas City: Why You Should Partner With Local Developers
Author: naviworld1h

14. Why Your Business Needs Professional Kansas City Web Design And Ecommerce Development
Author: naviworld1h

15. Maximizing Business Visibility With Seo In Kansas City
Author: naviworld1h

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: