logo
Data breach at Cumberland County Hospital in Kentucky could impact patients, employees

Data breach at Cumberland County Hospital in Kentucky could impact patients, employees

Yahoo03-06-2025
Cumberland County Hospital, based in Burkesville, Kentucky, issued a national alert June 2 about a data security incident that may have exposed personal information of patients and current and past employees.
"There was unauthorized access to our files on our computer system that contain personally identifiable information, including health information," the hospital said in a news release.
Information that may have been hacked includes: name, date of birth, address, phone number, email address, race or ethnicity, Social Security number, medications, diagnoses, treatment notes, dates of service and other information.
For employees, past or present, the breach could be deeper and also include tax forms, bank information and other personal information.
"The electronic medical records system the hospital and its partners use to record and bill for patient care was not involved, the hospital alert says.
Anyone treated at or employed by the hospital is encouraged to follow recommendations by the Federal Trade Commission regarding identity theft protection and details on how to place a fraud alert or security freeze on a credit file. Go to the "Advice and Guidance" section of the www.ftc.gov website.
Tennessee residents can contact the Tennessee Identity Crimes Unit at 1150 Foster Ave., Cooper Hall, Nashville, through the email Safety.IdentityCrime@tn.gov or visit the Tennessee Department of Safety and Homeland Security webpage for "Identity Theft Resources."
Anyone who has questions or believes their personal data might be affected can call 866-461-3127.
Beth Warren covers health care and can be reached at 502-265-8248.
This article originally appeared on Nashville Tennessean: Kentucky hospital data breach could expose patients to identity theft
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

She ignored 'scam' texts telling her she owed money. It backfired
She ignored 'scam' texts telling her she owed money. It backfired

USA Today

timea day ago

  • USA Today

She ignored 'scam' texts telling her she owed money. It backfired

Americans' inboxes face a daily deluge of unwanted spam. Phishing texts claiming that tolls haven't been paid or packages can't be delivered, calls from solicitors promising to erase debt, malware emails offering winnings from a sweepstakes that no one ever entered. The youngest and oldest among us, even, have developed a way to manage the sheer volume of messages, often by hitting 'delete' the moment something looks like it slipped past their spam filter. This instinct, however, comes with the risk of missing real, urgent messages, something one California resident learned the hard way. Ashley, 47, said she had been receiving texts from a number claiming to be The Toll Roads, the administrator of tolling in California, stating that the balance on her electronic toll payment method, FasTrak (similar to other systems like E-Z Pass, SunPass and TxTag), was getting low. With everyone from the federal government to the tolling agency itself advising that consumers delete phony text messages about owed tolls from their phones, she did just that. More: Toll road scam: More transportation authorities warn of fake texts in multiple states 'I assumed it was a scam and so I just kept deleting them because I was like, 'Oh, I'm not going to fall for that, I'm too smart to fall for that,'' she told USA TODAY. 'Prior to this, they had been communicating with me via email. I didn't even know that they had my phone number and so I assumed 100% it was a scam.' Ashley's reticence to click the link urging her to 'pay now' was hardly unfounded; warnings about a storm of phishing texts from scammers posing as toll authorities have been issued by agencies from the Federal Trade Commission to the FBI since January. Having received a plethora of obviously fake texts from senders claiming to be from UPS, FedEx, her bank and beyond, Ashley said she had no reason to believe these were any different. That was, until she finally got an email, reviewed by USA TODAY, with a big, bold deactivation notice. When 'scam' texts turn out to be real '[The email] said 'we've deactivated your account. You're going to be in flagrant violation if you use any of our toll roads ever again,'' Ashley said. 'And I just panicked because I use them all the time, you know.' It was then that she finally logged in, checked her account, and found it disconnected from the auto-refill feature that had previously been attached to her bank card. 'I went into my account and, indeed, it had been deactivated, it had been canceled and all of those text messages were, in fact, from them,' she said. Fortunately, she had not yet incurred a large unpaid balance of tolls and fees, but she said the idea that she could have been breaking the law or putting herself in a bad position without her knowledge troubled her. 'Anytime I get a text message that says 'you need to send money' or 'click on this link' and I don't know where it's from, I automatically delete it,' she said. 'I do wonder how businesses are going to be able to communicate with their customers via text. I'm not even sure that they can because there is so much fraud that I don't think I'm alone in not believing a text from a legitimate business.' Toll companies advise caution Michelle Kennedy, media relations manager for The Transportation Corridor Agencies (TCA), which operates The Toll Roads, told USA TODAY in an email that while some account holders may receive texts about legitimate account issues, 'the majority' of text interactions reported to the agency are phishing scam-related. '[TCA] will send text messages to our accountholders ONLY if they opt in to receive messages – and only sent when we are unable to process payment on their account, replenishment amounts change or credit card expiration is nearing,' she said. Customers may also receive interactions from legitimate customer service representatives via email, phone call or physical mail. '[TCA] has several ways for customers to interact with The Toll Roads and check account status, establish accounts, manage accounts, pay tolls and resolve violations,' she said, including The Toll Roads app, statement emails and customer service phone lines and walk-in centers. How to spot a text message scam While Ashley was able to reactivate her account without paying a huge fee, an account that goes delinquent can result in hundreds and even thousands of dollars in penalties in other states. With scam attacks on iPhones and Androids surging by more than 700% in June alone, the need for caution doesn't seem to be going away anytime soon, leaving consumers with the question: how do I protect myself from malicious texts without missing real and important ones? Leyla Bilge, Global Head of Scam Research for the antivirus and cybersecurity software company Norton, has some tips. 'With scam messages growing more convincing, it's no longer enough to rely on instinct alone,' she said. 'Think of your inbox like a busy street. Some doors lead to real businesses, and others are traps. You wouldn't walk into a sketchy alley just because someone shouted your name, so treat suspicious messages the same way.' Bilge's checklist for verifying the legitimacy of a text includes a few easy-to-follow tips: 'When people understand how scams operate and feel equipped to verify messages safely, they're more likely to pause, think, and make the right call — without missing something important,' she said. 'The calmer and more confident we are, the harder it is for scammers to succeed.'

Over 190 million hit in UnitedHealth data breach — confirmed largest in history
Over 190 million hit in UnitedHealth data breach — confirmed largest in history

Tom's Guide

time2 days ago

  • Tom's Guide

Over 190 million hit in UnitedHealth data breach — confirmed largest in history

Although last year's cyberattack at UnitedHealth was bad enough at 100 million when it was initially reported, the U.S. Health Department's website now has updated numbers that show the full scope of the data breach was actually worse – 192.7 million people were impacted by the hack. As reported by Cybernews, a spokesperson for UnitedHealth pointed out that the individual numbers by state will vary; the company did estimate in January that the attack has exposed the personal information of an estimated 190 million people. The information stolen and exposed in the data breach is said to include a variety of sensitive personal information including medical information like diagnoses, test results, treatment information, medical record numbers, and health insurance information such as member or group ID numbers, as well as personal information like Social Security numbers and driver's license numbers. Other data that was exposed includes billing information, payment information, claims history and billing codes. Change Healthcare is UnitedHealth Group's tech unit, and is a health payment processing company that works with many leading insurance companies such as Aetna, Anthem, Blue Cross Blue Shield and Cigna. In February 2024, the BlackCat ransomware gang infiltrated the company's system causing havoc in the claims processing and patient care systems across the country. In a May Congressional hearing, it was noted that the hacker group used stolen employee login credentials to breach the company's Citrix remote access service – which did not have multi-factor authentication turned on. Although UnitedHealth paid a $22 million ransom for the hackers to delete the stolen data, the data deletion did not occur and after receiving payment, BlackCat pulled an exit scam and shut down their servers. Since a data breach this large affects such a huge portion of the population, it's worth taking steps to protect yourself. If you've been affected by this, or any other data breach, you should definitely invest in one of the best identity theft protection services. However, in order to get access to the identity theft insurance and the extra support these services provide, you need to sign up before falling victim to a data breach. One of the best antivirus software will also help protect you and your devices from malware and online threats when you're online, and it's also important to stay vigilant against phishing and social engineering attacks, and to monitor your accounts for suspicious activity. The best way to stay safe against phishing is to avoid clicking on any links, QR codes or attachments in emails or messages from unknown order to protect yourself against most common social engineering attacks, it's always best to be wary anytime you're approached through social media or by contacts offering opportunities that seem to good to be true A quality antivirus software will provide different features to keep you safe online including one of the best VPNs with browser-level privacy protection. Follow Tom's Guide on Google News to get our up-to-date news, how-tos, and reviews in your feeds. Make sure to click the Follow button. Get instant access to breaking news, the hottest reviews, great deals and helpful tips.

HIMS: Hims & Hers Shares Sink After FTC Probe Details Emerge
HIMS: Hims & Hers Shares Sink After FTC Probe Details Emerge

Yahoo

time2 days ago

  • Yahoo

HIMS: Hims & Hers Shares Sink After FTC Probe Details Emerge

Aug 15 - Hims & Hers Health (NYSE:HIMS) slipped about 3% in early trading on Friday after Bloomberg published fresh details about a Federal Trade Commission probe into the company's business practices. The report says the FTC opened an inquiry following consumer complaints that Hims & Hers makes it hard for customers to cancel subscriptions and questions the company's advertising practices. Warning! GuruFocus has detected 4 Warning Sign with HIMS. Hims & Hers first told investors about a regulatory review in July 2024, but Bloomberg's report adds new color on what regulators are investigating. According to people familiar with the matter, the agency looks at cancellation flows, disclosure language, and whether marketing crosses legal lines. The company hasn't released a new statement tied to the Bloomberg story. For investors, the short-term hit reflects the subscription model's vulnerability: when regulators probe cancellation or billing, churn can rise and trust can fall. Analysts will watch complaint volumes, any formal FTC subpoenas, and whether the firm needs to change its renewal mechanics or face penalties. Until that clarity arrives, expect volatility around HIMS shares as traders price regulatory risk into the stock. Based on the one year price targets offered by 13 analysts, the average target price for Hims & Hers Health Inc is $51.22 with a high estimate of $85.00 and a low estimate of $28.00. The average target implies a upside of +8.67% from the current price of $47.13. Based on GuruFocus estimates, the estimated GF Value for Hims & Hers Health Inc in one year is $36.25, suggesting a downside of -23.09% from the current price of $47.13. Gf value is Gurufocus' estimate of the fair value that the stock should be traded at. It is calculated based on the historical multiples the stock has traded at previously, as well as past business growth and the future estimates of the business' performance. For deeper insights, visit the forecast page. This article first appeared on GuruFocus.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store