DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

FL: Cano Health Advises Patients Of Breach That Began Two Years Ago

Posted on June 13, 2020 by Dissent

Seen on their website:

MIAMI, June 12, 2020  Cano Health, LLC, a leading population health management company and operator of primary care medical centers in Florida, is advising its patients of a privacy event that may have compromised certain personal information.

The company recently learned on April 13, 2020 that three employee email accounts were accessed by an unknown perpetrator, and that messages from these accounts may have been forwarded to an outside email account without its knowledge. Upon discovery, Cano Health immediately secured the email accounts  and thoroughly investigated the incident. Based on its investigation, Cano Health cannot confirm that any emails were accessed by the unknown perpetrator, but because some emails contained documents or messages with personal information, it is notifying all potentially affected individuals out of an abundance of caution.

Cano Health’s investigation was unable to determine an exact date, but it  believes the unauthorized access may have occurred between May 18, 2018 and April 13, 2020. The information in the compromised email accounts during that time included patient names and other information, including PII/PHI.

“We take the protection of our patients’ information very  seriously and sincerely apologize for any concern or inconvenience this incident has caused or may cause to anyone who has been affected,” said Dr. Marlow Hernandez-Cano, Chief Executive Officer. “We are committed to continuously updating our information security to guard against new and emerging threats.”

Cano Health will continue working with its IT professionals to identify additional measures it can take to further strengthen security. In addition, the company  has notified law enforcement and will cooperate with any investigation.

Individuals potentially affected by the incident are being provided written notification from Cano Health. It recommends that  they regularly review and monitor their personal information, accounts, and benefits statements and provides steps to correct information, if so needed. . Individuals may also file a report with law enforcement, their state attorney general, and/or the Federal Trade Commission. As an added precaution to help patients whose financial information may have been affected, Cano Health is offering complimentary credit monitoring services at no cost.

Those who believe they may have been affected by this incident may call Cano Health at 305.767.2429 for more information. Representatives are available Monday through Friday from 6:00 a.m. until 4:00 p.m. PT. (9:00 a.m. until 7:00 p.m. ET).

About Cano Health
Cano Health, LLC operates primary care centers and pharmacies in Florida that specialize in Primary Care for Seniors. As part of its care coordination, Cano Health provides sophisticated, high- touch Population Health Management Programs including patient-centric programs such as home visits, telehealth, transition of care, and high risk & complex care management. Cano Health’s personalized patient care and proactive approach to wellness and preventive care is what sets them apart.  For more information visit www.canohealth.com.  

DataBreaches.net sent Cano’s media contact an email inquiry as to how Cano discovered the breach on April 13, whether the forwarding email address was U.S. or non-U.S., and how many patients were being notified, and will update this post  when a response is received.

Category: HackHealth DataU.S.

Post navigation

← Ransomware victims keep paying, and ransomware groups keep growing
Minted hit with California data breach lawsuit after ShinyHunters hack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • McLaren provides written notice to 743,131 patients after ransomware attack in July 2024
  • A state forensics lab was leaking its files. Getting it locked down involved a number of people.
  • CoinMarketCap Hacked, Scrambles to Remove Malicious Wallet Verification Popup
  • Montana Attorney General launches investigation into Lee Enterprises data breach
  • AT&T gets preliminary approval for $177 million data breach settlement
  • Aflac notifies SEC of breach suspected to be work of Scattered Spider
  • Former JBLM soldier pleads guilty to attempting to share military secrets with China
  • No, the 16 billion credentials leak is not a new data breach — a wake-up call about fake news (Updated)
  • Tonga’s health system hit by cyberattack (1)
  • Russia Expert Falls Prey to Elite Hackers Disguised as US Officials

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data
  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.