DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

University of Miami Health breach notice

Posted on January 5, 2023 by Dissent

Remember when Britton White and DataBreaches discussed employees having their work credentials compromised by infostealers and how employers might want to require employees to notify them whenever an employee’s device was compromised if the device had stored login credentials?

University of Miami Health posted a breach notice this week that caught my eye.  From the notice (emphasis added)

This notice is to inform the public that the University of Miami investigated a security incident that affected a limited number of UHealth – University of Miami Health System patients. While we have no reason to believe your information has been or will be utilized inappropriately, we want you to understand the steps we have taken to address this issue and additional steps you can take to protect your personal information.

An employee experienced identity theft that included an intrusion into their work-associated UM email account. Following a thorough investigation, we discovered that emails containing the name and medical record numbers of some patients were forwarded to a third-party email account.

Did the employee notify their employer promptly upon discovering that they were the victim of identity theft? Had they discovered any compromise before then and if so, had they informed their employer immediately? And does this mean that U. Miami Health did not have two-factor or multifactor authentication required for the employee to access their UM email account, or did they have it but the other factor was a text message and the employee’s phone had been compromised too?

DataBreaches wrote to U. Miami Health to ask them about any policy requiring employees to disclose any breaches involving personal devices and if this incident would alter any of their policies or practices. No reply has been received by publication, but the risk from infostealers and other nasties is increasing, not decreasing. While we do not know how this ID theft occurred, the risk is real.  As part of required risk assessments, how many entities have reassessed or considered the growing risk that personal devices containing stored login credentials to work are increasingly likely to be compromised these days?

Category: Breach IncidentsCommentaries and AnalysesHealth DataID TheftU.S.

Post navigation

← PA: Maternal & Family Health Services reveals ransomware incident
Report: 25% of Districts Victimized by Cyber Attacks in 2022 →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Department of Justice says Berkeley Research Group data breach may have exposed information on diocesan sex abuse survivors
  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Clothing Retailer, Todd Snyder, Inc., Settles CPPA Allegations Regarding California Consumer Privacy Act Violations
  • US Customs and Border Protection Plans to Photograph Everyone Exiting the US by Car
  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.