Otis Bowen Center for Human Services employees’ fell for phishing scam exposing 35,000 clients’ personal information

Otis Bowen Center for Human Services employees’ fell for phishing scam exposing 35,000 clients’ personal information

Otis Bowen Center for Human Services employees’ fell for phishing scam exposing 35,000 clients’ personal information

https://www.hipaajournal.com/35800-patients-of-the-otis-r-bowen-center-for-human-services-notified-about-email-security-breach/

Exploit: Phishing scam
Otis Bowen Center for Human Services Mental health and addiction recovery service

high-risk-meter-ni

Risk to Small Business: 2.223 = Severe Two employees engaged with a phishing scam that provided hackers with access to company data. Although the breach occurred in January 2020, the company only recently completed a digital forensic audit that revealed the extent of the incident. Unfortunately, this slow response time has put victims at risk of data misuse, and it could have regulatory implications because of the healthcare-oriented nature of the breach.

high-risk-meter-ni

Individual Risk: 2.130 = Severe The company declined to identify the specific data sets, but patient data often contains peoples’ most sensitive information. Victims were notified by email, and they should take every precaution to ensure that they mitigate the possible repercussions of the breach. This includes enrolling in the complimentary credit and identity monitoring services offered by the company.

Customers Impacted: 35,800
How it Could Affect Your Customers’ Business: In 2020, data privacy regulations impact companies in every sector and in many locations. As a result, data security isn’t just an altruistic endeavor. It’s a mission-critical priority, and a failure to execute on this standard can have significant financial implications for companies that experience a data breach.

Risk Levels:
1 - 1.5 = Extreme Risk
1.51 - 2.49 = Severe Risk
2.5 - 3 = Moderate Risk

*The risk score is calculated using a formula that considers a wide range of factors related to the assessed breach.


Learn How To Optimize Your Office Productivity Tools With Our Latest eBookCLICK HERE!
+ +