DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Brandywine Counseling and Community Services notifies patients of ransomware incident

Posted on April 20, 2020 by Dissent

Brandywine Counseling and Community Services, Inc. disclosed a breach. Note that this is not the Brandywine Urology breach recently disclosed but a different entity and a different breach.  DataBreaches.net has reached out to Brandywine Counseling to ask for clarification on certain details, but has not received any response by publication time.  This incident is not yet up on HHS’s public breach tool, so we also do not yet know how many patients have been notified. This post will be updated when more details are obtained, but for now, here is their notice:

Brandywine Counseling and Community Services, Inc. is committed to protecting the confidentiality and security of our clients’ information. Regrettably, this notice concerns a security incident that may have involved some of that information.

On February 10, 2020, we discovered that some of our servers were infected with ransomware. We immediately took steps to secure our network, contacted law enforcement, began an investigation, and an experienced computer forensic firm was hired to assist. During the investigation, we determined that during the incident, a limited amount of personal information was acquired from our systems, which included some clients’ names, addresses, dates of birth, and/or limited clinical information, such as provider name(s), diagnosis, prescription(s), and/or treatment information. In some instances, clients’ health insurance information, Social Security numbers and/or driver’s license numbers were also included.

This incident did not affect all clients, but only those clients whose information was included in the limited information acquired during the ransomware incident.

As a precaution, we are mailing letters to clients whose information was acquired during the ransomware incident. We also have established a dedicated, toll-free call center to answer clients’ questions. If you have questions, please call 1-888-921-0536, Monday through Friday, from 9:00 a.m. and 6:30 p.m. eastern time. For those clients whose Social Security numbers and/or driver’s license numbers were involved, we are offering complimentary credit monitoring and identity protection services. We also recommend that affected clients review any statements they receive from their health insurers or healthcare providers. If clients see charges for services not received, they should contact the insurer or provider immediately.

We regret any concern or inconvenience this incident may cause. We remain committed to protecting the confidentiality and security of our clients’ information. To help prevent something like this from happening in the future, we continue to review our systems and implement additional measures to enhance and strengthen our security processes.

 

Related posts:

  • Pathways Professional Counseling notifies patients; SSN, financial, insurance, diagnosis and treatment info all on stolen laptop
  • Updating: CaptureRx incident impacted more than 2.4 million. List of Entities.
Category: Health DataMalwareU.S.

Post navigation

← PrimoHoagies Notifies Customers of Data Security Incident
CISI payment breach leaves members vulnerable to fraud →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Texas Centers for Infectious Disease Associates Notifies Individuals of Data Breach in 2024
  • Battlefords Union Hospitals notifies patients of employee snooping in their records
  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.