DataBreaches.net

DataBreaches.net

The Office of Inadequate Security

Menu
  • Breach Laws
  • About
  • Donate
  • Contact
  • Privacy
  • Transparency Reports
Menu

Tennessee Proton Therapy Centers Report Cyber Security Breach

Posted on December 3, 2020 by Dissent

Martin Z. Braun reports:

Municipal bond-financed facilities that treat cancer by proton radiation in Nashville and Knoxville, Tennessee reported an information technology “security incident” that has resulted in temporary but continuing disruptions to some clinical and financial operations, according to a Dec. 2 bond filing.

Read more on Bloomberg Law (sub. req.).  From the bond filing:

Each of The Proton Therapy Center, LLC (“PCPT”), which operates a proton therapy center in Knoxville, Tennessee and MTPC, LLC (“MTPC”), which operates a proton therapy center in Nashville, Tennessee, experienced an information technology security incident in the early
morning hours of October 28, 2020.

Each of PCPT and MTPC is in the process of implementing extensive information technology security protocols and is working diligently with its security partners to restore its information technology operations as quickly as possible.

This matter has resulted in temporary but continuing disruptions to certain aspects of clinical and financial operations. Each Center continues to utilize their established back-up processes including offline documentation methods.

At this time, neither PCPT nor MTPC has evidence that patient or employee data was accessed, copied or misused. Patient care continues to be delivered safely and effectively.

Related Posts:

  • Interview: Pr0t0n_An0n hacker who hacked 5…
  • Federal judge locks up alleged NullCrew member, "rootcrysis"
  • Knoxville ransomware attack shutters parts of city website
  • State gives update on patient records found in…
  • Tennessee State, Southeastern Louisiana universities…

Post navigation

← Proposed settlement announced in Kalispell Regional Healthcare breach lawsuit
‘Be a mensch’: Hackers leak negotiation texts as Israeli insurer refuses ransom →

Sponsored or Paid Posts

This site doesn’t accept sponsored posts and doesn’t respond to requests about them.

Have a News Tip?

Email:

Breaches[at]Protonmail.ch
Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Telegram: @DissentDoe

Browse by News Section

Latest Posts

  • Russian hackers exploiting Outlook bug to hijack Exchange accounts
  • Britain dismisses report claiming Sellafield nuclear site hacking, says no malware exists on our system
  • 23andMe data breach: Hackers accessed data of 6.9 million users
  • AlphV claims they have started contacting some of Tipalti’s clients (1)
  • Research: Privacy as Pretense: Empirically Mapping the Gap Between Legislative & Judicial Protections of Privacy
  • What it means — CitrixBleed ransomware group woes grow as over 60 credit unions, hospitals, financial services and more breached in US.
  • On September 2nd, the U.S. branch of Great Star Industrial Co. disbursed a ransom of 1 million dollars to a ransomware group
  • Former Public School Information Technology Manager Charged with Damaging School’s Computer Network

Please Donate

If you can, please donate XMR to our Monero wallet because the entities whose breaches we expose are definitely not supporting our work and are generally trying to chill our speech!

Donate- Scan QR Code   Donate!

Social Media

Find me on Infosec.Exchange.

I am also on Telegram @DissentDoe.

RSS

Grab the RSS Feed

Copyright

© 2009 – 2023, DataBreaches.net and DataBreaches LLC. All rights reserved.

HIGH PRAISE, INDEED!

“You translate “Nerd” into understandable “English” — Victor Gevers of GDI Foundation, talking about DataBreaches.net

©2023 DataBreaches.net