DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

FL: Cano Health Advises Patients Of Breach That Began Two Years Ago

Posted on June 13, 2020 by Dissent

Seen on their website:

MIAMI, June 12, 2020  Cano Health, LLC, a leading population health management company and operator of primary care medical centers in Florida, is advising its patients of a privacy event that may have compromised certain personal information.

The company recently learned on April 13, 2020 that three employee email accounts were accessed by an unknown perpetrator, and that messages from these accounts may have been forwarded to an outside email account without its knowledge. Upon discovery, Cano Health immediately secured the email accounts  and thoroughly investigated the incident. Based on its investigation, Cano Health cannot confirm that any emails were accessed by the unknown perpetrator, but because some emails contained documents or messages with personal information, it is notifying all potentially affected individuals out of an abundance of caution.

Cano Health’s investigation was unable to determine an exact date, but it  believes the unauthorized access may have occurred between May 18, 2018 and April 13, 2020. The information in the compromised email accounts during that time included patient names and other information, including PII/PHI.

“We take the protection of our patients’ information very  seriously and sincerely apologize for any concern or inconvenience this incident has caused or may cause to anyone who has been affected,” said Dr. Marlow Hernandez-Cano, Chief Executive Officer. “We are committed to continuously updating our information security to guard against new and emerging threats.”

Cano Health will continue working with its IT professionals to identify additional measures it can take to further strengthen security. In addition, the company  has notified law enforcement and will cooperate with any investigation.

Individuals potentially affected by the incident are being provided written notification from Cano Health. It recommends that  they regularly review and monitor their personal information, accounts, and benefits statements and provides steps to correct information, if so needed. . Individuals may also file a report with law enforcement, their state attorney general, and/or the Federal Trade Commission. As an added precaution to help patients whose financial information may have been affected, Cano Health is offering complimentary credit monitoring services at no cost.

Those who believe they may have been affected by this incident may call Cano Health at 305.767.2429 for more information. Representatives are available Monday through Friday from 6:00 a.m. until 4:00 p.m. PT. (9:00 a.m. until 7:00 p.m. ET).

About Cano Health
Cano Health, LLC operates primary care centers and pharmacies in Florida that specialize in Primary Care for Seniors. As part of its care coordination, Cano Health provides sophisticated, high- touch Population Health Management Programs including patient-centric programs such as home visits, telehealth, transition of care, and high risk & complex care management. Cano Health’s personalized patient care and proactive approach to wellness and preventive care is what sets them apart.  For more information visit www.canohealth.com.  

DataBreaches.net sent Cano’s media contact an email inquiry as to how Cano discovered the breach on April 13, whether the forwarding email address was U.S. or non-U.S., and how many patients were being notified, and will update this post  when a response is received.

No related posts.

Category: HackHealth DataU.S.

Post navigation

← Ransomware victims keep paying, and ransomware groups keep growing
Minted hit with California data breach lawsuit after ShinyHunters hack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake.
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.