According to sources, North Kansas City Hospital (a Medical organization in Missouri) was hit with a cyber attack. It was first reported on 2024-01-08.

If You're in Missouri, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2024-01-08

Kansas Hospital Impacted By PJ&A Data Breach

“ North Kansas City Hospital (NKCH) and its transcription subsidiary, Meritas Health Corporation, recently notified more than 500,000 individuals of a third-party data breach stemming from Perry Johnson & Associates (PJ&A), a medical transcription servic“

“As previously reported, PJ&A suffered a data breach in May 2023 that impacted nearly 9 million individuals. An unauthorized party gained access to PJ&A’s systems, impacting data including insurance and clinical information from medical transcription files and some Social Security numbers. “

“Northwell Health, New York’s largest healthcare provider, was one of the organizations impacted by the breach, prompting the New York Attorney General’s Office to issue a consumer alert about the potential impacts of the breach. “

Guarding Against Hacking

  • June 10, 2020

    Best Cyber Practices and Policies for Your Agency

  • April 15, 2020

    COVID-19, Elections, Taxes: How Hot Topics Impact Public Safety Cybersecurity

  • January 8, 2020

    Reviewing the Worst Cyber Attacks of 2019

  • October 16, 2019

    Fixing the Top 5 Public Safety Vulnerabilities

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis