DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Florida Heart Associates ransomware attack in May still impacting services and care

Posted on July 26, 2021 by Dissent

A May, 2021 ransomware incident impacting Florida Heart Associates was added to HHS’s breach tool this month.  But what the tool doesn’t show was the significant impact to the practice’s functioning and patient care.

A story on Fox4 in Florida reports that the owners refused to pay an unreported ransom demand and did get control back of their systems — but at a tremendous cost, it seems. They are only operating at 50% capacity, care has been impacted for many patients, and they lost some staff.  They finally got their phones back up and running and  they’re hoping to be back up and fully running by late August or early September, their CEO told Fox4.

So although it is not covered in the news report, I’ll ask here:  why did they decide not to pay the ransom?  And should they have paid?  If they had known then what they experienced now, would they still make the same decision not to pay?  And if they had insurance that would cover,  knowing what they know now about patient care being impacted, would it have been negligent not to pay?

Someday, I’d love to have that follow-up conversation with their CEO.  For now, they have their hands full so I’ll just wish them luck in restoring services and I won’t pester them with questions at this time.

Category: Commentaries and AnalysesHealth DataMalware

Post navigation

← Unhacked: 121 Tools Against Ransomware On A Single Website
When Ransomware Group REvil Vanished, Its Victims Were Stranded →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Episource notifying 5.4 million patients of cyberattack in January
  • Investigation of 2024 Helsinki data breach – Report
  • Major trial underway for data leak that left 72,000 victims in France
  • Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper
  • HealthEC Agrees to $5.48 Million Settlement to End Data Breach Lawsuit
  • US offering $10 million for info on Iranian hackers behind IOControl malware
  • Sompo Japan Insurance submits improvement plan after info leakage
  • Moreno Valley, Calif., Schools Report Data Breach
  • The Growing Cyber Risks from AI — and How Organizations Can Fight Back
  • UPDATING: Credit Control Corporation denies any current breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report