According to sources, East Tennessee Children’s Hospital (a Medical organization in Tennessee) was hit with a cyber attack. It was first reported on 2022-04-07.

If You're in Tennessee, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2022-04-07

Personal info system breached during ‘cyber incident’ at Children’s Hospital

“-"East Tennessee Children’s Hospital is working to determine the scope of a cyber incident that may have led to personal information within ETCH’s system being compromised." -"On March 13, unusual activity was found by ETCH on its network. By the end of that week, ETCH determined some of the documents stored within the system may have been copied or viewed during the cyber incident between March 11-14. " -"the system contained the following types of information at the time: names, dates of birth, Social Security numbers, driver’s license or state identification numbers, non-resident identification numbers, other demographic information, medical information, health insurance information, credit or debit card information, financial information, billing information, other personal health information, and usernames and passwords." -"As their investigation continues, ETCH plans to contact potentially affected individuals and provide information on steps to protect their personal information. “

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis