North Florida OB-GYN patient information may have been breached


time. If you know anything
call crime stoppers at 1, 8, 6,
6, 8, 4, 5, tips. Brittany call crime stoppers at 1, 8, 6,
6, 8, 4, 5, tips. Brittany
Mueller Channel 4. The local 6, 8, 4, 5, tips. Brittany
Mueller Channel 4. The local
station. Mueller Channel 4. The local
station.
>>And if you’re a patient and station.
>>And if you’re a patient and
North be>>And if you’re a patient and
North be
gunny there’s a chance some of North be
gunny there’s a chance some of
your personal information has gunny there’s a chance some of
your personal information has
been breached the medical your personal information has
been breached the medical
office has been sending out been breached the medical
office has been sending out
letters to its patients letters office has been sending out
letters to its patients letters
like this one right here to letters to its patients letters
like this one right here to
make them aware of this like this one right here to
make them aware of this
incident news for make them aware of this
incident news for
Jax reporter Allyson Henning is incident news for
Jax reporter Allyson Henning is
live there at their location Jax reporter Allyson Henning is
live there at their location
Riverside tonight, Allison the live there at their location
Riverside tonight, Allison the
organization find out about Riverside tonight, Allison the
organization find out about
this breach.>>Scott North be to eye and>>Scott North be to eye and
says it found out about all of>>Scott North be to eye and
says it found out about all of
this back in July this year, says it found out about all of
this back in July this year,
I’m standing in front of its this back in July this year,
I’m standing in front of its
Riverside location right now I’m standing in front of its
Riverside location right now
they say that’s also when they Riverside location right now
they say that’s also when they
learned the cyber attack could they say that’s also when they
learned the cyber attack could
have started a month earlier learned the cyber attack could
have started a month earlier
some time around April even have started a month earlier
some time around April even
sooner earlier than that right some time around April even
sooner earlier than that right
now we want to go ahead and sooner earlier than that right
now we want to go ahead and
show you a letter now we want to go ahead and
show you a letter
a copy of the letter sent out show you a letter
a copy of the letter sent out
to all patients in notifying a copy of the letter sent out
to all patients in notifying
them of the situation some to all patients in notifying
them of the situation some
people just getting this letter them of the situation some
people just getting this letter
in the mail this weekend. people just getting this letter
in the mail this weekend.
It says a computer virus in the mail this weekend.
It says a computer virus
encrypted certain files on its computer systems as soon as computer systems as soon as
North be July and learned of computer systems as soon as
North be July and learned of
this incident it shut down its North be July and learned of
this incident it shut down its
computer system started its this incident it shut down its
computer system started its
response and computer system started its
response and
recovery procedures and response and
recovery procedures and
notified the FBI since then the recovery procedures and
notified the FBI since then the
offices have been able to notified the FBI since then the
offices have been able to
decrypt or recover almost all offices have been able to
decrypt or recover almost all
of the affected files and has decrypt or recover almost all
of the affected files and has
taken actions to strengthen its of the affected files and has
taken actions to strengthen its
security to help keep something taken actions to strengthen its
security to help keep something
like this security to help keep something
like this
from happening again in the like this
from happening again in the
future I did just speak with an from happening again in the
future I did just speak with an
Internet networking security future I did just speak with an
Internet networking security
consultant about the Internet networking security
consultant about the
possibility of information consultant about the
possibility of information
getting out. possibility of information
getting out.
>>Extremely difficult to tell getting out.
>>Extremely difficult to tell
it would be it would be>>Extremely difficult to tell
it would be it would be
dependent upon what network. it would be it would be
dependent upon what network.
Intrusion detection systems dependent upon what network.
Intrusion detection systems
they have in place is to what Intrusion detection systems
they have in place is to what
it monitoring and what it was they have in place is to what
it monitoring and what it was
capable of telling. it monitoring and what it was
capable of telling.
It’s improbable that any capable of telling.
It’s improbable that any
data left the facility it is It’s improbable that any
data left the facility it is
out of an abundance of caution data left the facility it is
out of an abundance of caution
and care for the customers that out of an abundance of caution
and care for the customers that
they are notifying people that and care for the customers that
they are notifying people that
this is a possibility.>>A North Bgi and says patient>>A North Bgi and says patient
information that could have>>A North Bgi and says patient
information that could have
been affected by this breach information that could have
been affected by this breach
includes names been affected by this breach
includes names
birth dates, Social Security includes names
birth dates, Social Security
numbers employment information birth dates, Social Security
numbers employment information
as well as diagnosis and numbers employment information
as well as diagnosis and
treatment information they say as well as diagnosis and
treatment information they say
the computer systems affected treatment information they say
the computer systems affected
in the breach did not hold the computer systems affected
in the breach did not hold
any patient in the breach did not hold
any patient
financial information and any patient
financial information and
patients are being offered free financial information and
patients are being offered free
identity theft protection again

Leave a Reply