According to sources, Charleston Area Medical Center (a Medical organization in West Virginia) was hit with a cyber attack. It was first reported on 2022-04-05.

If You're in West Virginia, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2022-04-05

Phishing attack exposes 54K patient records at West Virginia hospital

“-"Charleston (W.Va.) Area Medical Center notified patients of a January phishing incident that affected 54,000 individuals." -"On Jan. 10 and 11, an unauthorized party accessed the email accounts of "a small number of" Charleston Area Medical Center employees through a phishing scam" -"Upon learning of the incident Jan. 10, the hospital terminated the unauthorized access and secured the affected email accounts." -"The following types of personal information were found in the employee email accounts: first and last names, medical record numbers and health information such as discharge dates and test results. Additionally, Social Security numbers or financial account numbers were found for less than 0.001 percent of the potentially affected population." “

Guarding Against Hacking

  • August 14, 2019

    Analyzing the Most Crippling Public Safety Cyber Attacks

  • June 12, 2019

    Why and How Public Safety is Under Cyber Attack

  • March 13, 2019

    Preparing Public Safety for a Cyber Incident Response

  • February 13, 2019

    Hackers Love Your Misconfigured Firewalls

Guarding Against Phishing

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis