According to sources, Montrose Regional Health (a Medical organization in Colorado) was hit with a cyber attack. It was first reported on 2022-03-10.

If You're in Colorado, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2022-03-10

Colorado health system's email breach exposed 52,632 patients' protected information

“-"An email data breach at Montrose (Colo.) Regional Health went undetected for two months and affected 52,632 individuals." -"The hospital determined that the email accounts contained patient names, internal patient account numbers, service dates, procedure codes, provider names, health insurance provider information and treatment costs." -"The internal investigation was unable to determine what specific information was accessed by the hacker." -"No evidence has been found that the patient information has been misused, but the hospital encourages affected individuals to review their statements for any suspicious or fraudulent activity. " “

Guarding Against Data Breaches

Guarding Against Hacking

  • August 14, 2019

    Analyzing the Most Crippling Public Safety Cyber Attacks

  • June 12, 2019

    Why and How Public Safety is Under Cyber Attack

  • March 13, 2019

    Preparing Public Safety for a Cyber Incident Response

  • February 13, 2019

    Hackers Love Your Misconfigured Firewalls

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis