Private Information of 15k Patients Hacked And Shared On Social Media
In New Hampshire, the private information of about 15,000 patients were hacked from a hospital library and eventually posted on an unknown social media platform. The breach happened on October 2015 but it wasn't until November 4, 2016 that the problem was found out.
The person responsible for the breach is a former psychiatric patient at New Hampshire state psychiatric hospital. He was seen using a computer at the New Hampshire Hospital library where he accessed non-confidential information about patients. A library staff reported the suspicious incident to a supervisor. However, no report was filed to the management or to the state to alert them regarding a potential breach.
In August, security officers at the hospital informed the Department of Health and Human Services (DHHS) that the patient might be sharing private information on social media. The DHHS in turn alerted the Department of Information Technology (DIT) but the investigation did not confirm anything.
Finally, in November, the DHHS confirmed that the patient in fact have been sharing private information of patients on social media. The information accessed were some of the most sensitive data on patients.
However, these patients were not from the New Hampshire Hospital. Instead, these patients who have been using services from DHHS such as welfare benefits, child care services, and other health benefit programs.
Still, the data shared are sensitive and could prove harmful to the victims. These include names, addresses, Social Security information, and Medicaid identification numbers.
Thankfully, officials report that the leaked information were deleted within 24 hours of discovery. Also, none of the patients have reported being compromised due to their information being shared on social media.
The DHHS confirmed that there have been no reports of credit card fraud or identity theft so far. However, New Hampshire Governor Hassan officially stated that the incident is being treated with utmost urgency. She also stressed that the recent breach is proof that the nation needs to strengthen its cyber security to protect it from human hackers and human errors.
With the proliferation of cyber hacking and private information leaks these recent years, state agencies definitely have to fortify and modify policies of private information is to limit troubling incidents like this.
Biopiracy Is The Newest Threat To Science
With the incredible advancement of science and technology, countries scramble to conduct experiments and researches across the globe. However, a new threat looms as exploitation of smaller countries is getting rampant.
Sex Robots: The Hidden Pitfalls Of Relying On Robots For Sexual Satisfaction
Recenlty, sex robots are getting popular as companions for humans in the bedroom, but what are the risks involved? Experts weigh in on the hidden dangers of relying on robots for sexual bliss.
Science And Health News That Are Overshadowed in 2016
This year has been filled with dozens of significant science and health news. However, some amazing breakthroughs have not been given enough media attention.
Muslims Opens Free Clinic; Central Florida
Muslim leaders in Central Florida opened a new free clinic that will cater to the health needs of the low-income and uninsured citizens.
How A Critical Flaw In Samsung's SmartCam Security Cameras Could Allow Hackers To Spy On
A team of researchers (or ethical hackers) known as Exploitee.rs have discovered a critical flaw of Samsung's SmartCam which can literally give hackers full access to the security cameras.
MORE IN ITECHPOST
What are the Different Types Of SD Cards?
Most of us use digital cameras, smartphones, and camcorders. But often we lack storage spaces. Thus,we often have to delete our precious memories. But not now. This is because SD cards are available in the market. I'm sure all of you must have seen an SD card. But do you know, SD cards are of different types?
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
Game Developers’ Different Roles in the Studio
Learn about the different professionals involved in developing video games. Becoming a game developer is one of the coolest jobs around and your 14-year-old self, perched on the edge of your bed as you play PlayStation, will thank you for making such an awesome career move.
A COMPREHENSIVE REVIEW ON TIMOTHY SYKES: Is He a Scam Artist?
Timothy Sykes has garnered a lot of attention from several people. A lot of these reactions have been positive, while others have been negative - this is based on the bold claims and flamboyant lifestyle he has always showcased. In this review, we will take a deep dive into his life and the training programs he has to offer. Via this review, you will come to a conclusion whether he is the real deal or another fishy scam artist. First and foremost, we will be uncovering the man himself, Timothy Sykes, also known as Tim Sykes.