Skip to Content
Close Icon

Monthly Breach Deets - Revere Health Phishing Attack

Weekly Breach Deets - Revere Health Phishing Attack

For this week’s breach, according to HIPAA News, Revere Health experienced a phishing attack when a user accessed the company's network system. This breach happened through an impersonation of an agency's email and was followed by a simple click from an employee in their email. 

A total of 12,000 patients of Revere Health in Utah had been accessed by a hacker and it contained protected health information (PHI) of all the patients. With over 100 locations in Utah, this cost Revere Health an estimated $2,819,700, according to eRiskHub.

This all happened in a span of 45 minutes for 12,000 patients. Revere Health was able to act quickly but it still created damage.

How this could have been prevented

One wrong click in an employee email can happen too easily. Even a small, low-risk breach can open the door to larger, more expensive breaches. Be sure to take something like this very seriously. 

Are you strengthening security protocols and providing phishing training to employees? Make sure your business creates more security processes to adhere to and follow. At the same time, increase your awareness to phishing exercises with education training. Do your employees know what to look for when an email comes through? If it looks suspicious, don't click on it! Do you recognize the person it's coming from and does it display the accurate email address? Call or text this person to verify. This should significantly help decrease your chances of a phishing attack.

VGM Forbin would be happy to consult you on security software and other cyber security needs for your business. Let us know if you'd like to schedule a free consultation today!

- Indicates required fields

Services Interested In

For this week’s breach, according to HIPAA News, Revere Health experienced a phishing attack when a user accessed the company's network system. This breach happened through an impersonation of an agency's email and was followed...

Comments