Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Mercy Health Fired Employee Responsible for Insider Breach
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach

Mercy Health Fired Employee Responsible for Insider Breach

5 years ago David Bisson
Mercy Health Fired Employee Responsible for Insider Breach

Mercy Health revealed that it had fired an employee who was responsible for an insider breach involving its systems.

On December 4, Mercy Health posted a notice informing its patients of a medical records incident that had occurred earlier in the year.

The bulletin explained that Mercy Health, the fifth largest Catholic health care system in the United States, had learned on October 7 that a former employee had accessed medical record information that was not essential for the performance of their work-related duties.

That medical record information included patients’ names, dates of birth, addresses, medical record numbers, treatment details and radiology images, among other pieces of data.

The employee had also accessed the health insurance ID numbers for a small number of patients, Mercy Health explained, though they had not viewed patients’ credit card credentials or financial details.

The health care system confirmed that it had taken steps to address the security incident. As quoted in its notice:

Upon discovering the incident, Mercy immediately investigated the incident and made additional enhancements to procedures to prevent a similar incident from happening in the future. Additional education was provided to staff regarding compliance with the organization’s policies and procedures. The employee who accessed the information no longer works at Mercy.

Mercy Health noted that it would be offering free membership to IDX’s identity theft protection services for the span of a year.

Additionally, it highlighted other efforts that individual patients could take to protect themselves against identity theft. It specifically recommended that patients potentially affected by the security incident monitor their account reports and billing statements for unexpected charges, remain vigilant for emails and phone calls that might request personal information as well as consider placing a fraud alert or a security freeze on their credit files.

This incident underscores the importance of medical organizations taking the proper steps to safeguard their patients’ records against attackers. For some best practices on how to do this, click here.

The post ” Mercy Health Fired Employee Responsible for Insider Breach” appeared first on TripWire

Source:TripWire – David Bisson

Tags: Critical Severity, Encryption, TripWire

Continue Reading

Previous Download: How XDR Platforms Are Changing The Game For Ransomware Protection
Next Spearphishing Attack Spoofs Microsoft.com to Target 200M Office 365 Users

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware

9 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More

14 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with Them

15 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware

16 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

18 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems

21 hours ago [email protected] (The Hacker News)

Recent Posts

  • North Korean Hackers Abuse VS Code Auto-Run Tasks to Deploy StoatWaffle Malware
  • ⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More
  • We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with Them
  • Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware
  • Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT