DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

University of Miami Health breach notice

Posted on January 5, 2023 by Dissent

Remember when Britton White and DataBreaches discussed employees having their work credentials compromised by infostealers and how employers might want to require employees to notify them whenever an employee’s device was compromised if the device had stored login credentials?

University of Miami Health posted a breach notice this week that caught my eye.  From the notice (emphasis added)

This notice is to inform the public that the University of Miami investigated a security incident that affected a limited number of UHealth – University of Miami Health System patients. While we have no reason to believe your information has been or will be utilized inappropriately, we want you to understand the steps we have taken to address this issue and additional steps you can take to protect your personal information.

An employee experienced identity theft that included an intrusion into their work-associated UM email account. Following a thorough investigation, we discovered that emails containing the name and medical record numbers of some patients were forwarded to a third-party email account.

Did the employee notify their employer promptly upon discovering that they were the victim of identity theft? Had they discovered any compromise before then and if so, had they informed their employer immediately? And does this mean that U. Miami Health did not have two-factor or multifactor authentication required for the employee to access their UM email account, or did they have it but the other factor was a text message and the employee’s phone had been compromised too?

DataBreaches wrote to U. Miami Health to ask them about any policy requiring employees to disclose any breaches involving personal devices and if this incident would alter any of their policies or practices. No reply has been received by publication, but the risk from infostealers and other nasties is increasing, not decreasing. While we do not know how this ID theft occurred, the risk is real.  As part of required risk assessments, how many entities have reassessed or considered the growing risk that personal devices containing stored login credentials to work are increasingly likely to be compromised these days?


Related:

  • Resource: NY DFS Issues New Cybersecurity Guidance to Address Risks Associated with the Use of Third-Party Service Providers
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Bombay High Court Orders Department of Telecommunications to Block Medusa Accounts After Generali Insurance Data Breach
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
Category: Breach IncidentsCommentaries and AnalysesHealth DataID TheftU.S.

Post navigation

← PA: Maternal & Family Health Services reveals ransomware incident
Report: 25% of Districts Victimized by Cyber Attacks in 2022 →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.