According to sources, General Health System (a Medical organization in Louisiana) was hit with a cyber attack. It was first reported on 2022-08-25.

If You're in Louisiana, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2022-08-25

Hive starts dumping patient and employee data from Baton Rouge General Health System

“- "On Tuesday, Hive added the health center to their dedicated leak site, claiming that they encrypted Baton Rouge General on June 29. They dumped a lot of personal and protected health information to support their claims of having exfiltrated data." - "The data are not from just the medical center, however, but appear to include files from the larger health system, which may be why on some date unknown to DataBreaches, but after July 15, Baton Rouge General Health System posted an incident notice on its website." - "On June 28, 2022, GHS became aware of suspicious activity related to certain GHS computer systems. GHS immediately launched an investigation, with the assistance of third-party forensic specialists, to determine the nature and scope of the activity."“

Guarding Against Ransomware

  • August 16, 2023

    Ransomware is on the Rise Again: Defense Against New Players

  • November 9, 2022

    Ransomware’s Hidden Costs: What You Need To Know

  • August 11, 2021

    How to Prevent and Respond to Ransomware Attacks

  • January 25, 2017

    How to Defend Public Safety from Ransomware

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis