According to sources, Valley View Hospital (a Medical organization in Colorado) was hit with a cyber attack. It was first reported on 2022-05-02.

If You're in Colorado, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2022-05-02

Colorado hospital targeted by phishing scam, 21,000 affected

“-"Valley View Hospital was the target of a phishing attack when the email accounts of four employees were accessed by unauthorized individuals, affecting the personal data of about 21,000 people." -"On Jan. 19, the hospital learned that four of its employee email accounts had been accessed by an unauthorized user," -"The access was obtained through malicious links embedded in emails disguised as legitimate correspondence from an employee within the company. " -"On March 29, 2022, it was determined that the compromised email accounts had contained patient and employee information of 21,000 individuals. " -"It is unknown what types of information have been compromised. 00Valley View Hospital said it does not believe any of the information had been removed from its system. "“

Guarding Against Hacking

  • August 14, 2019

    Analyzing the Most Crippling Public Safety Cyber Attacks

  • June 12, 2019

    Why and How Public Safety is Under Cyber Attack

  • March 13, 2019

    Preparing Public Safety for a Cyber Incident Response

  • February 13, 2019

    Hackers Love Your Misconfigured Firewalls

Guarding Against Phishing

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis