DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Tx: Institute for Women’s Health warns patients personal data compromised in network hack

Posted on August 20, 2017 by Dissent

Samantha Ehlinger reports:

The Institute for Women’s Health warned patients that hackers may have stolen some of their personal information or credit or debit card data, the physicians’ group said Thursday.

The San Antonio OBGYN practice said a so-called keylogger virus was installed on its network on June 5. The virus was discovered July 6 and the company took action to remove it “from the majority of all network computers and terminal servers by July 11, 2017, resolving it completely by July 13, 2017,” it said in a statement.

Read more on mySA.

The following statement was posted to the group’s web site on August 17:

8.17.2017 – Institute for Women’s Health Notifies Patients of Web Security Incident

SAN ANTONIO – The Institute for Women’s Health (IFWH) has notified patients of a web security incident that took place earlier this summer.

On July 6, 2017, IFWH discovered a keylogger virus on its computer network. The company took swift action to remove it from the majority of all network computers and terminal servers by July 11, 2017, resolving it completely by July 13, 2017. Subsequent investigation confirmed the keylogger program was installed June 5, 2017.

IFWH recently sent letters to those patients who may be affected by this incident. If a patient paid for services with a credit or debit card from June 5, 2017 through July 11, 2017, some of their credit or debit information may have been captured. Other types of information found to be affected generally include the following: names, addresses, dates of birth, Social Security Numbers, scheduling notes, current procedural technology and other billing codes, and any other information that may have been keyed (typed) into the IFWH system during this time period. Any information that was not keyed into the system was not affected. Patient Portal information was not accessed at any point.

The letter recently sent to patients whose information may have been compromised included instructions on how to utilize the safeguards IFWH implemented in light of this incident. IFWH is offering these potentially affected patients identity theft protection services through ID Experts® to provide them with MyIDCare™. MyIDCare services include: Twelve months of credit monitoring, a $1,000,000 insurance reimbursement policy, exclusive educational materials and fully managed ID theft recovery services. IFWH encourages patients to work with their credit card company or bank to take appropriate measures to protect their accounts, and also to contact ID Experts with any questions. More information can be found in the letter provided to affected patients. IFWH also notified both the Federal Bureau of Investigation and the Department of Health and Human Services.

A variety of security measures were in place before this incident, including network filtering and security monitoring, firewalls, antivirus software and password protection. After the incident, IFWH implemented additional safeguards to improve data security on its web server infrastructure and  reduce the risk of exploitation. IFWH continues to assess its security systems and work with the appropriate law enforcement agencies to prevent future breaches.

IFWH takes its patients’ privacy and the security of information very seriously, and deeply regrets any inconvenience this may have caused. Patients should call 1-844-402-8564 for assistance or with any additional questions.

Category: Health DataMalware

Post navigation

← Delaware Adds More Stringent Data Breach Notice Requirements
IT staffers may have compromised sensitive data to foreign intelligence →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nigerian National Sentenced To More Than Five Years For Hacking, Fraud, And Identity Theft Scheme
  • Data breach of patient info ends in firing of Miami hospital employee
  • Texas DOT investigates breach of crash report records, sends notification letters
  • PowerSchool hacker pleads guilty, released on personal recognizance bond
  • Rewards for Justice offers $10M reward for info on RedLine developer or RedLine’s use by foreign governments
  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • California county accused of using drones to spy on residents
  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.