According to sources, Montrose Regional Health (a Medical organization in Colorado) was hit with a cyber attack. It was first reported on 2022-03-10.

If You're in Colorado, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2022-03-10

Colorado health system's email breach exposed 52,632 patients' protected information

“-"An email data breach at Montrose (Colo.) Regional Health went undetected for two months and affected 52,632 individuals." -"The hospital determined that the email accounts contained patient names, internal patient account numbers, service dates, procedure codes, provider names, health insurance provider information and treatment costs." -"The internal investigation was unable to determine what specific information was accessed by the hacker." -"No evidence has been found that the patient information has been misused, but the hospital encourages affected individuals to review their statements for any suspicious or fraudulent activity. " “

Guarding Against Data Breaches

  • February 14, 2018

    Your Secret Admirers: Hackers Love Your DNS

Guarding Against Hacking

  • June 10, 2020

    Best Cyber Practices and Policies for Your Agency

  • April 15, 2020

    COVID-19, Elections, Taxes: How Hot Topics Impact Public Safety Cybersecurity

  • January 8, 2020

    Reviewing the Worst Cyber Attacks of 2019

  • October 16, 2019

    Fixing the Top 5 Public Safety Vulnerabilities

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis