DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

FL: Cano Health Advises Patients Of Breach That Began Two Years Ago

Posted on June 13, 2020 by Dissent

Seen on their website:

MIAMI, June 12, 2020  Cano Health, LLC, a leading population health management company and operator of primary care medical centers in Florida, is advising its patients of a privacy event that may have compromised certain personal information.

The company recently learned on April 13, 2020 that three employee email accounts were accessed by an unknown perpetrator, and that messages from these accounts may have been forwarded to an outside email account without its knowledge. Upon discovery, Cano Health immediately secured the email accounts  and thoroughly investigated the incident. Based on its investigation, Cano Health cannot confirm that any emails were accessed by the unknown perpetrator, but because some emails contained documents or messages with personal information, it is notifying all potentially affected individuals out of an abundance of caution.

Cano Health’s investigation was unable to determine an exact date, but it  believes the unauthorized access may have occurred between May 18, 2018 and April 13, 2020. The information in the compromised email accounts during that time included patient names and other information, including PII/PHI.

“We take the protection of our patients’ information very  seriously and sincerely apologize for any concern or inconvenience this incident has caused or may cause to anyone who has been affected,” said Dr. Marlow Hernandez-Cano, Chief Executive Officer. “We are committed to continuously updating our information security to guard against new and emerging threats.”

Cano Health will continue working with its IT professionals to identify additional measures it can take to further strengthen security. In addition, the company  has notified law enforcement and will cooperate with any investigation.

Individuals potentially affected by the incident are being provided written notification from Cano Health. It recommends that  they regularly review and monitor their personal information, accounts, and benefits statements and provides steps to correct information, if so needed. . Individuals may also file a report with law enforcement, their state attorney general, and/or the Federal Trade Commission. As an added precaution to help patients whose financial information may have been affected, Cano Health is offering complimentary credit monitoring services at no cost.

Those who believe they may have been affected by this incident may call Cano Health at 305.767.2429 for more information. Representatives are available Monday through Friday from 6:00 a.m. until 4:00 p.m. PT. (9:00 a.m. until 7:00 p.m. ET).

About Cano Health
Cano Health, LLC operates primary care centers and pharmacies in Florida that specialize in Primary Care for Seniors. As part of its care coordination, Cano Health provides sophisticated, high- touch Population Health Management Programs including patient-centric programs such as home visits, telehealth, transition of care, and high risk & complex care management. Cano Health’s personalized patient care and proactive approach to wellness and preventive care is what sets them apart.  For more information visit www.canohealth.com.  

DataBreaches.net sent Cano’s media contact an email inquiry as to how Cano discovered the breach on April 13, whether the forwarding email address was U.S. or non-U.S., and how many patients were being notified, and will update this post  when a response is received.

Category: HackHealth DataU.S.

Post navigation

← Ransomware victims keep paying, and ransomware groups keep growing
Minted hit with California data breach lawsuit after ShinyHunters hack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • ARC sells airline ticket records to ICE and others
  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.