Two of the largest diagnostic labs: Quest & Labcorp were hacked. Was your medical data exposed?

Posted on
bulldogtech it support

Quest Diagnostics, as well as Lab Corp, two of the largest testing providers in the country, announced nearly 12+ million customers may have had personal, financial and medical information leaked due to an issue with one of its vendors.

Quest said it was notified that between Aug. 1, 2018, and March 30, 2019, that someone had unauthorized access to the systems of AMCA, a billing collections vendor.

“(The) information on AMCA’s affected system included financial information (e.g., credit card numbers and bank account information), medical information and other personal information (e.g., Social Security Numbers),” Quest said in the filing.

While customers’ broad medical information might have been compromised, Quest said AMCA did not have access to actual lab test results, and so therefore that data was not impacted. Read More at NBC

One day after Quest Diagnostics reported that nearly 12 million of its patients were potentially affected by a malicious breach of third-party bill collection vendor American Medical Collection Agency (AMCA), fellow clinical testing firm LabCorp acknowledged that roughly 7.7 million of its customers may be affected by the same incident.

Burlington, North Carolina-based LabCorp publicly disclosed the disturbing news yesterday in a Securities and Exchange Commission 8-K filing, warning that patient data it supplied to AMCA was exposed in the incident, which took place from Aug. 1, 2018 through March 30, 2019. Such information may include names, birth dates, addresses, phone numbers, dates of service, providers and unpaid balances.

Making matters worse, roughly 200,000 customers who paid LabCorp bills using AMCA’s web portal had their payment card information compromised, the LabCorp continued. According to the SEC filing, AMCA did not share the identities of these particular victims, but assured the diagnostics company that it had already begun to notify these individuals, and would offer them two years of identity protection and credit monitoring services.

Don’t Become a victim, let Bulldog protect your company’s data

How to Prevent Emails from Landing in Gmail’s Spam Folder

Posted on

Emails that land in the GMAIL spam folder are unpredictable. Sometimes they do get in there, sometimes they don’t. But, one of the simple tricks to prevent emails from landing in your spam folder is to ensure that you have the email address added in your GMAIL CONTACTS.

With Gmail, you can prevent this from happening by adding EMAIL FILTERS. This will help you to explicitly make a sender, or even with just the use of keywords to put filtered emails to your INBOX.

To do this, start by logging in to your GMAIL account > click the GEAR icon at the top right > then SETTINGS.

On the SETTINGS page, go to the FILTERS AND BLOCKED ADDRESSES tab then click CREATE NEW FILTER.

Now, let’s force GMAIL to not mark emails coming from [YOUR EMAIL ADDRESS] as SPAM. Let’s create a filter by setting [YOUR EMAIL ADDRESS] in the FROM field then proceed by clicking the CREATE FILTER WITH THIS SEARCH link.

Setup your filter upon your discretion but make sure to tick both the NEVER SEND IT TO SPAM and ALSO APPLY FILTER TO MATCHING MESSAGES check boxes. Click the CREATE FILTER button once you’re done.

Google implemented some security updates on their end over the past several weeks. We cannot modify anything on our side to ensure delivery, nor can we control delivery once messages leave our systems and are marked delivered by the receiving domain.

Optimum’s Servers Blocking Some Email Messages

Posted on

Beginning early this week optimum’s servers have been intermittently blocking some emails sent from our email system. If you are experiencing delivery issues when sending to your own optonline address, you must call tech support and request whitelisting of your domain.

Update 4/17/19 – Re-verified our systems are not on any of the internet blacklists, and contacted optimum support to try to get mail unblocked, still waiting for confirmation that they fixed the issue.

OnGuard SAVED company from rogue employee

Posted on
Bulldogtech onguard remote backup

November 2018. A Brooklyn business opens for their usual days work. Employees go about their morning activities preparing for the work day. Upon starting their computers, they begin to log into their emails and fire up their software applications. One employee after the other gets similar error messages “file can’t be found” when they try to access their data. They notify management who also receives the same errors.

Bulldog Tech receives the tech call. After we remotely log into the systems, we find their entire servers data drives have been formatted! All their data has been erased! After further investigation, we found that special software was loaded onto the server that not only removes the data but security wipes the system making it nearly impossible to recover using recovery software.

Further investigation of their router logs (all server logs were erased) shows at 2:31am the previous night, an IP logged into the server using remote desktop ports. Reviewing the server we indeed found remote desktop enabled – a security risk in itself. Reviewing the finding with the owner, he realized that he released a long time employee recently – not on the best of terms. Is it possible this employee logged into their system and erased the data? Why was not all passwords and remote access turned off after termination? Good questions owner could not answer nor though of.

What again could have been a major disaster was quickly rectified by OnGuard Remote Backup! OnGuard Remote Backup was able to restore all customer data quickly and put them back in business!

We discussed with owner to use our additional services of OnGuard Defender, and security auditing as well as put in place an employee manual that addresses items upon termination. Basically a security checklist! Its your business, only you can protect it!

Call us Today: 718-921-6159

sales@bulldogtechinc.com