According to sources, The Memorial Hermann Health System (a Medical organization in Texas) was hit with a cyber attack. It was first reported on 2022-02-08.

If You're in Texas, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2022-02-08

Information for over 6,000 Memorial Hermann patients accessed in security breach

“-"Memorial Hermann is looking into the security breach. Hackers could access social security numbers, financial information and more." -"An unauthorized third party accessed multiple files including the following types of PHI: first names, last names, dates of birth, social security numbers, driver’s licenses numbers, financial information, health insurance information and treatment information." -"there is no sign of anyone's information being used as a result of this cyberattack." -"Advent Health Partners have been investigating the security issue after finding suspicious activity on employee email accounts with data from Memorial Hermann."“

Guarding Against Data Breaches

  • February 14, 2018

    Your Secret Admirers: Hackers Love Your DNS

Guarding Against Hacking

  • June 10, 2020

    Best Cyber Practices and Policies for Your Agency

  • April 15, 2020

    COVID-19, Elections, Taxes: How Hot Topics Impact Public Safety Cybersecurity

  • January 8, 2020

    Reviewing the Worst Cyber Attacks of 2019

  • October 16, 2019

    Fixing the Top 5 Public Safety Vulnerabilities

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis