According to sources, Benson Health (a Medical organization in North Carolina) was hit with a cyber attack. It was first reported on 2022-07-20.

If You're in North Carolina, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2022-07-20

Hacker tries to access a North Carolina clinic's computer system

“-"Primary care practice Benson (N.C.) Health has provided notice of a cyberattack involving an unauthorized party trying to access Benson Health's network." -"The investigation into the attack concluded that information such as patient names, dates of birth, Social Security numbers and health information might have been accessed by the unauthorized party." -" Benson Health has not found any evidence of any personal data misuse resulting from the cyberattack," “

Guarding Against Data Breaches

  • January 28, 2025

    Protect What Matters Most: Make Data Privacy Day Count

  • August 12, 2020

    Be Prepared: Incident Response Planning For Your Agency

  • October 10, 2018

    Elections are Coming: So are Advanced Persistent Threats

  • June 13, 2018

    Securing Your Public Safety Agency: Critical Rules and Approaches

Guarding Against Hacking

  • October 25, 2017

    Hackers Gone Wild: How Cybercriminals Impact 9-1-1 Systems

  • November 11, 2020

    4 Year Anniversary – Twitter TDoS Attack

  • October 14, 2020

    Incidents from the Trenches

  • July 8, 2020

    The Vicious Evolution of Cyber Attacks

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis