According to sources, Healthback Holdings (a Medical organization in Oklahoma) was hit with a cyber attack. It was first reported on 2022-08-04.

If You're in Oklahoma, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2022-08-04

Oklahoma Home Health Company Reports Email Security Breach, 21K Impacted

“- "Healthback Holdings, a home health company based in Oklahoma, disclosed a healthcare data breach that impacted 21,114 individuals. Healthback discovered unauthorized activity within its employee email environment on June 1." - "Investigators were unable to determine whether any email swere viewed by the unauthorized party, but they determined that the accounts contained names, health insurance information, clinical information, and Social Security numbers." - "The home health company mailed letters to impacted individuals on July 29, and encouraged them to review their healthcare statements for accuracy."“

Guarding Against Hacking

  • October 25, 2017

    Hackers Gone Wild: How Cybercriminals Impact 9-1-1 Systems

  • November 11, 2020

    4 Year Anniversary – Twitter TDoS Attack

  • October 14, 2020

    Incidents from the Trenches

  • July 8, 2020

    The Vicious Evolution of Cyber Attacks

Guarding Against Phishing

  • February 24, 2025

    Phishing Webinar: Inside the Hacker’s Toolbox

  • October 10, 2023

    Cybersecurity Awareness Month 2023: Key Takeaways

  • April 12, 2023

    Don’t Get Hooked: Avoiding the Phish

  • November 10, 2021

    Don’t Take the Bait: Phighting the Phish

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis