DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

AZ: La Posada notifies current and former employees of malware incident

Posted on February 16, 2022 by Dissent

From their press release:

La Posada is providing notice of a recent incident that may affect the security of some information pertaining to current and former employees. The confidentiality, privacy, and security of information in La Posada’s care is one of its highest priorities and La Posada takes this incident very seriously.

What Happened?  On December 10, 2021, certain La Posada IT systems became infected with a software virus that prohibited access to some files and email. Upon discovery, La Posada notified law enforcement and began an investigation, which includes working with third-party forensic investigators, to determine the full nature and scope of the incident, and to secure the La Posada network.  That investigation determined that there may have been unauthorized access to certain information. La Posada then took steps to identify the individuals who may have been impacted.  On January 24, 2022, that investigation concluded.  La Posada is notifying those individuals whose information may have been impacted. La Posada first provided notice of this incident on February 8, 2022.

What Information Was Involved?  The potentially accessed information varies by individual, but may include first and last name, date of birth, driver’s license, Social Security number, direct deposit information, passport number, Drug and/or TB test results, information associated with explanation of benefits, self-funded medical plan participants, Member ID numbers, and COVID Vaccine cards.

What We Are Doing. We take this incident and the security of personal information in our care very seriously. Upon learning of this incident, we moved quickly to investigate and respond to this incident, assess the security of our systems, and notify potentially affected employees. As part of our ongoing commitment to the security of information, we are reviewing and enhancing existing policies and procedures to reduce the likelihood of a similar future event. We will also be notifying state and federal regulators, as required.

For More Information. If you have additional questions, please call the dedicated assistance line at 855-604-1839, which is available Monday through Friday, between the hours of 8:00 a.m. and 8:00 p.m. Mountain Time, or write to La Posada at 350 E. Morningside Rd, Green Valley, AZ 85614. La Posada recommends that potentially impacted individuals follow the recommendations in the letter they received and contact the call center with any questions.

What Can You Do?  La Posada sincerely regrets any inconvenience this incident may have caused.  La Posada encourages you to remain vigilant against incidents of identity theft and fraud, to review your account statements, and to monitor your credit reports for suspicious activity.

Read more at https://www.prnewswire.com/news-releases/la-posada-provides-notice-of-privacy-incident-301483174.html

Source:  La Posada at Park Centre, Inc


Somewhat surprisingly, the notice does not say anything about offering their current and former employees any mitigation services.

This incident does not appear on HHS’s public breach tool as of the time of this publication.

Category: Health DataMalwareU.S.

Post navigation

← Update on Scripps’ ransomware incident
Sask. Health Authority accidentally outs employees that were part of mandatory COVID testing program →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices
  • Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations
  • Breachforums Boss “Pompompurin” to Pay $700k in Healthcare Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law
  • CFPB Quietly Kills Rule to Shield Americans From Data Brokers
  • South Korea fines Temu for data protection violations
  • The BR Privacy & Security Download: May 2025

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.