123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

Seacoast Radiology Notifies Customers After Security Breach

Profile Picture
By Author: Peter Martin
Total Articles: 211
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

It is not uncommon for attackers to target websites, servers, computer systems and network to acquire control, gain unauthorized access, breach sensitive data or install malicious software. However, servers of a health service provider, Seacoast Radiology were targeted recently, by attackers to capture space and bandwidth. The purpose of the attack was to acquire additional space and bandwidth to play an online game - Call of Duty: Black ops.

Usually, organizations avail the services of ethical hacker certified professionals to identify the security flaws. In this case, the IT security experts found that the affected server contained sensitive personal information such as patient names, social security numbers, medical diagnosis codes, mailing addresses, phone numbers, billing procedures codes and other records of around 2,30,000 patients. Fortunately, the affected server did not contain any banking information. However, the available data on the servers can be misused by the hackers. While the attackers had no malicious intentions, even accidental data breach may have serious financial and personal repercussions on ...
... the affected individuals. Further, such attacks also result in disruption of services and adversely affect the credibility of an organization. The authorities at Seacoast Radiology have notified all patients whose records were stored on the affected server.

Often organizations find it difficult to ascertain, whether unauthorized access to servers has led to data breach. Lack of proper awareness among employees regarding incident handling may lead to loss of volatile evidence from the affected computers. Online computer training programs programs may help employees understand security threats and first responder procedures in the event of a breach.

Compromised information may be used by attackers for identity theft, stealing money, blackmail and other forms of fraud. IT Professionals who have undertaken security certification programs may help organizations in restructuring the security infrastructure to combat different types of threats emanating in the IT environment.

Total Views: 291Word Count: 308See All articles From Author

Add Comment

Computers Articles

1. Exploring How Ai In The Cloud Can Transform Your Business
Author: TechDogs

2. The Power Of Cloud And Ai: A New Era Of Collaboration
Author: TechDogs

3. Get Business Insights Using Expedia & Booking. Com Review Data Scraping
Author: DataZivot

4. Top 10 Reasons A Strong Communication Strategy Drives Prm Program Success
Author: Archi

5. Achieve Scalable Web Scraping With Aws Lambda
Author: Devil Brown

6. Overcoming Common Challenges In Iso 27001 Implementation
Author: Jenna Miller

7. Basic Computer Course: Your Gateway To Skill Development | The Institute Of Professional Accountants
Author: Tipa Institute

8. Top 7 Advantages Of React Js
Author: Bella Stone

9. Top 7 App Marketing Tools For Mobile Success
Author: Bella Stone

10. Revolutionizing Education Management With Samphire It Solution Pvt Ltd’s Erp Software
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD

11. Top 10 Healthcare Technology Trends
Author: goodcoders

12. "building Tomorrow’s Factories: The Role Of Automation & Robotics In Modern Manufacturing"
Author: andrew smith

13. The Ultimate Guide To The Best Ecommerce Plugin For Wordpress
Author: Rocket Press

14. Xsosys Erp: A Scalable Solution For Businesses In Any Industry
Author: Xsosys Technology(S) Pte. Ltd.

15. Rental Management Software: A Complete Solution For Car, Property, And Coworking Space
Author: RentAAA

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: