According to sources, Monument Health (a Medical organization in South Dakota) was hit with a cyber attack. It was first reported on 2023-09-18.

If You're in South Dakota, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2023-09-18

Monument Health patients may be affected by vendor's data breach

“Monument Health was informed that one of its vendors, DMS Health Technologies, had a data event that could affect some Monument Health patients. “

“The company, which provides mobile imaging services, determined that an unauthorized party had obtained certain personal information about some patients of DMS customers. The data may include names, dates of birth, dates of service, physician name and exam type for approximately 2,500 patients. “

“After learning of this issue, DMS brought in a leading forensic investigation firm to assist in the investigation. DMS has deployed additional monitoring tools and will continue to enhance the security of its systems. “

Guarding Against Hacking

  • June 10, 2020

    Best Cyber Practices and Policies for Your Agency

  • April 15, 2020

    COVID-19, Elections, Taxes: How Hot Topics Impact Public Safety Cybersecurity

  • January 8, 2020

    Reviewing the Worst Cyber Attacks of 2019

  • October 16, 2019

    Fixing the Top 5 Public Safety Vulnerabilities

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis