eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

225
active users

#incidentmanagement

0 posts0 participants0 posts today

In August 2020, @SchizoDuckie and I published what was to become the first of a series of articles or posts called "No Need to Hack When It's Leaking."

In today's installment, I bring you "No Need to Hack When It's Leaking: Brandt Kettwick Defense Edition." It chronicles efforts by @JayeLTee, @masek, and I to alert a Minnesota law firm to lock down their exposed files, some of which were quite sensitive.

Read the post and see how even the state's Bureau of Criminal Apprehension had trouble getting this law firm to respond appropriately.

databreaches.net/2025/07/04/no

Great thanks to the Minnesota Bureau of Criminal Apprehension for their help on this one, and to @TonyYarusso and @bkoehn for their efforts.

The Information and Privacy Commissioner of Ontario has completed a review into Daixin Team's massive cyberattack on five regional hospitals in 2023 and found hospital officials acted “adequately.”

Perhaps the most notable aspect of the report (from my perspective) was that the IPC said the hospitals were obligated to notify patients whose data had been encrypted (and not just those whose data had been exfiltrated). They saw no point in requiring that now, but wanted it noted that it should have happened.

So that seems to be making PHIPA's interpretation clearer for future victims of encryption incidents.

The full report makes an interesting read.

PHIPA Decision 284:
decisions.ipc.on.ca/ipc-cipvp/

IPCDecisions - IPCIn accordance with Ontario’s privacy and access laws, the Commissioner and her delegates issue decisions, orders and privacy investigation reports. This post is also available in: French

B.C. health authority faces class-action lawsuit over 2009 data breach

databreaches.net/2025/05/24/b-

Let's see... they didn't prevent breaches, they didn't detect breaches on their own, and they didn't notify 20,000 employees timely or provide any mitigation services timely or at all.

But can plaintiffs prevail?

#databreach #infosec #cybersecurity #incidentmanagement #litigation

@privacylawyer

I am very happy because my DevEx team at work is becoming a lot more official and getting a lot of attention. Which means we may be able to officially make it a real team and the three of us can be 100% on it. So we're creating a new wiki space and top-level jira project and all that.

But sad, too, because I am moving resilience and incident documentation out of SRE and into our space. Because I am more concerned about seeing the work get done than I am about what team should own it.

So I'm satisfied that incident program management fell into DevEx. There are also no other SREs but me (out of like 12) that like dealing with incident management anyway.

My boss said that after what I did with the retro, he is completely comfortable having me oversee the improvement of our incident management.

Seems like I am becoming adept at fixing fucked on-call rotations!

Lexington School District Four in SC reported that 15,894 residents were affected by the PowerSchool breach. The state reached out to districts on Jan. 8 to tell them what was known at that time.

The district filed this with the state today: consumer.sc.gov/sites/consumer

It appears to be a copy of what they have sent out to residents as a preliminary notification.

If memory serves, PowerSchool had told districts they would be giving them something for communications by the evening of the 8th. Did they ever do that? Or are the four bullets in the district's notification what #PowerSchool gave districts to use?

@douglevin @brett @funnymonkey

From the Better-Late-Than-Never Department:

"Washington County is preparing to implement a new policy on how to respond to future cybersecurity attacks after a ransomware strike crippled the county government for more than two weeks earlier this year.

County solicitor Gary Sweat is asking the commissioners to consider approving a “business continuity and disaster contingency” plan that would have a protocol for county workers and its IT department to follow in the event of another cyber emergency."

As a reminder, they paid $350k ransom to ransomware gang to get decryptor key.

observer-reporter.com/news/loc

Observer-ReporterWashington County considering ‘ransomware’ policy after January cyberattackWashington County is preparing to implement a new policy on how to respond to future cybersecurity attacks after a ransomware strike crippled the county government for more than two weeks earlier this year. County solicitor Gary Sweat is asking the commissioners to consider approving a “business continuity and disaster contingency” plan that would have a […]

"Italy, exposed database puts dental clinic patients’ data at risk: "
suspectfile.com/italy-exposed-

@amvinfe followed up on some findings by @chum1ng0 and they tried to get two entities to lock down exposed data that includes personal information.

Despite repeated notifications, the data are still not locked down, it seems.

Change Healthcare submitted a breach notification to #HHS on July 19. They report the number of patients affected as "500" (a marker for "We have no friggin' idea how many and we'll get back to you at some date before the end of civilization maybe.").

They didn't comply with the "no later than 60 calendar days" requirement and I'm not sure what good a "500" report does anyone.

Almost 3 months afterDataBreaches[.]net reported on the #BlackSuit attack on #Post&Courier, the paper posted a notice on its site. The notice doesn't mention that all the data was leaked on the dark web months ago or that the paper had negotiated to try to get the data deleted.

My coverage in April: databreaches.net/2024/04/17/th

Post & Courier's notice in July: postandcourier.com/site/evenin

FITSNews blasted P&C for its lack of timely #notification and #transparency: fitsnews.com/2024/07/23/the-po

#databreach #cybersecurity #journalism #incidentmanagement

@brett

databreaches.netThe Post and Courier hacked; Black Suit claims to have 500 GB of data. – DataBreaches.Net

I was just reading a follow-up on the Philippine Health Insurance (PhilHealth) breach by #Medusa in 2023, and I read something that struck me as unusual:

The govt didn't pay the TA's demands but what they did do was set up a portal where citizens could check to determine if Medusa had leaked their personal identification number.

I can't recall any govt or private sector entity ever creating a portal like that before. Can you? I mean, telling people to check HaveIBeenPwnd is one thing, but to create a portal on a .gov domain to check what TAs leaked?

Portal: philhealthleak.privacy.gov.ph/

@campuscodi @zackwhittaker @brett @troyhunt

philhealthleak.privacy.gov.phHome NPC | PhilHealthLeak

And then there were three -- 3 attacks in June 2023 where patients are first being notified now and where we do not know who was responsible for the attacks, at least two of which were ransomware attacks.

SouthCoast Medical Group and Privia Medical Group notify patients of June 2023 cyberattack

databreaches.net/2024/07/06/so

#HealthSec #HIPAA #HITECH #cybersecurity #ransomware #IncidentManagement

@brett @allan @amvinfe @campuscodi

databreaches.netSouthCoast Medical Group and Privia Medical Group notify patients of June 2023 cyberattack – DataBreaches.Net

Part 2 of 2:

SysInformation Healthcare Services, LLC, d/b/a EqualizeRCM also was the victim of a ransomware attack in June 2023, and we still don't know how many were affected.

Nor do I know which TA group is responsible for this one. Anyone know?

databreaches.net/2024/07/02/ho

databreaches.netHow many clients and patients were affected by a ransomware attack on EqualizeRCM? We have no idea. – DataBreaches.Net

Part 1 of 2:

Florida Community Health Centers to notify almost 300,000 of ransomware attack that occurred in June 2023.

databreaches.net/2024/07/03/fl

I don't know of any TA group that claimed responsibility for this one. Anyone know?

databreaches.netFlorida Community Health Centers to notify almost 300,000 of ransomware attack – DataBreaches.Net