DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Tx: Institute for Women’s Health warns patients personal data compromised in network hack

Posted on August 20, 2017 by Dissent

Samantha Ehlinger reports:

The Institute for Women’s Health warned patients that hackers may have stolen some of their personal information or credit or debit card data, the physicians’ group said Thursday.

The San Antonio OBGYN practice said a so-called keylogger virus was installed on its network on June 5. The virus was discovered July 6 and the company took action to remove it “from the majority of all network computers and terminal servers by July 11, 2017, resolving it completely by July 13, 2017,” it said in a statement.

Read more on mySA.

The following statement was posted to the group’s web site on August 17:

8.17.2017 – Institute for Women’s Health Notifies Patients of Web Security Incident

SAN ANTONIO – The Institute for Women’s Health (IFWH) has notified patients of a web security incident that took place earlier this summer.

On July 6, 2017, IFWH discovered a keylogger virus on its computer network. The company took swift action to remove it from the majority of all network computers and terminal servers by July 11, 2017, resolving it completely by July 13, 2017. Subsequent investigation confirmed the keylogger program was installed June 5, 2017.

IFWH recently sent letters to those patients who may be affected by this incident. If a patient paid for services with a credit or debit card from June 5, 2017 through July 11, 2017, some of their credit or debit information may have been captured. Other types of information found to be affected generally include the following: names, addresses, dates of birth, Social Security Numbers, scheduling notes, current procedural technology and other billing codes, and any other information that may have been keyed (typed) into the IFWH system during this time period. Any information that was not keyed into the system was not affected. Patient Portal information was not accessed at any point.

The letter recently sent to patients whose information may have been compromised included instructions on how to utilize the safeguards IFWH implemented in light of this incident. IFWH is offering these potentially affected patients identity theft protection services through ID Experts® to provide them with MyIDCare™. MyIDCare services include: Twelve months of credit monitoring, a $1,000,000 insurance reimbursement policy, exclusive educational materials and fully managed ID theft recovery services. IFWH encourages patients to work with their credit card company or bank to take appropriate measures to protect their accounts, and also to contact ID Experts with any questions. More information can be found in the letter provided to affected patients. IFWH also notified both the Federal Bureau of Investigation and the Department of Health and Human Services.

A variety of security measures were in place before this incident, including network filtering and security monitoring, firewalls, antivirus software and password protection. After the incident, IFWH implemented additional safeguards to improve data security on its web server infrastructure and  reduce the risk of exploitation. IFWH continues to assess its security systems and work with the appropriate law enforcement agencies to prevent future breaches.

IFWH takes its patients’ privacy and the security of information very seriously, and deeply regrets any inconvenience this may have caused. Patients should call 1-844-402-8564 for assistance or with any additional questions.

Category: Health DataMalware

Post navigation

← Delaware Adds More Stringent Data Breach Notice Requirements
IT staffers may have compromised sensitive data to foreign intelligence →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach
  • HHS Office for Civil Rights Settles HIPAA Cybersecurity Investigation with Vision Upright MRI
  • Additional 12 Defendants Charged in RICO Conspiracy for over $263 Million Cryptocurrency Thefts, Money Laundering, Home Break-Ins
  • RIBridges firewall worked. But forensic report says hundreds of alarms went unnoticed by Deloitte.
  • Chinese Hackers Hit Drone Sector in Supply Chain Attacks
  • Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom
  • $28 million in Texas’ cybersecurity funding for schools left unspent
  • Cybersecurity incident at Central Point School District 6

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025
  • License Plate Reader Company Flock Is Building a Massive People Lookup Tool, Leak Shows
  • FTC dismisses privacy concerns in Google breakup

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.