DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Tx: Institute for Women’s Health warns patients personal data compromised in network hack

Posted on August 20, 2017 by Dissent

Samantha Ehlinger reports:

The Institute for Women’s Health warned patients that hackers may have stolen some of their personal information or credit or debit card data, the physicians’ group said Thursday.

The San Antonio OBGYN practice said a so-called keylogger virus was installed on its network on June 5. The virus was discovered July 6 and the company took action to remove it “from the majority of all network computers and terminal servers by July 11, 2017, resolving it completely by July 13, 2017,” it said in a statement.

Read more on mySA.

The following statement was posted to the group’s web site on August 17:

8.17.2017 – Institute for Women’s Health Notifies Patients of Web Security Incident

SAN ANTONIO – The Institute for Women’s Health (IFWH) has notified patients of a web security incident that took place earlier this summer.

On July 6, 2017, IFWH discovered a keylogger virus on its computer network. The company took swift action to remove it from the majority of all network computers and terminal servers by July 11, 2017, resolving it completely by July 13, 2017. Subsequent investigation confirmed the keylogger program was installed June 5, 2017.

IFWH recently sent letters to those patients who may be affected by this incident. If a patient paid for services with a credit or debit card from June 5, 2017 through July 11, 2017, some of their credit or debit information may have been captured. Other types of information found to be affected generally include the following: names, addresses, dates of birth, Social Security Numbers, scheduling notes, current procedural technology and other billing codes, and any other information that may have been keyed (typed) into the IFWH system during this time period. Any information that was not keyed into the system was not affected. Patient Portal information was not accessed at any point.

The letter recently sent to patients whose information may have been compromised included instructions on how to utilize the safeguards IFWH implemented in light of this incident. IFWH is offering these potentially affected patients identity theft protection services through ID Experts® to provide them with MyIDCare™. MyIDCare services include: Twelve months of credit monitoring, a $1,000,000 insurance reimbursement policy, exclusive educational materials and fully managed ID theft recovery services. IFWH encourages patients to work with their credit card company or bank to take appropriate measures to protect their accounts, and also to contact ID Experts with any questions. More information can be found in the letter provided to affected patients. IFWH also notified both the Federal Bureau of Investigation and the Department of Health and Human Services.

A variety of security measures were in place before this incident, including network filtering and security monitoring, firewalls, antivirus software and password protection. After the incident, IFWH implemented additional safeguards to improve data security on its web server infrastructure and  reduce the risk of exploitation. IFWH continues to assess its security systems and work with the appropriate law enforcement agencies to prevent future breaches.

IFWH takes its patients’ privacy and the security of information very seriously, and deeply regrets any inconvenience this may have caused. Patients should call 1-844-402-8564 for assistance or with any additional questions.


Related:

  • Another plastic surgery practice fell prey to a cyberattack that acquired patient photos and info
  • NY: Gloversville hit by ransomware attack, paid ransom
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
Category: Health DataMalware

Post navigation

← Delaware Adds More Stringent Data Breach Notice Requirements
IT staffers may have compromised sensitive data to foreign intelligence →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.