DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Westminster Ingleside King Farm Presbyterian Retirement Communities Notifies 5,228 Residents of Data Security Incident

Posted on January 25, 2018 by Dissent

ROCKVILLE, MD – January 19, 2018 – Westminster Ingleside King Farm Presbyterian Retirement Communities, Inc. (“Ingleside”) has become aware of a data security incident that may have involved the protected health information of our residents. Although at this time there is no evidence of any attempted or actual misuse of anyone’s information as a result of this incident, we have taken steps to notify all potentially impacted individuals, and to provide resources to assist them.

While data security breaches are becoming more commonplace around the world, Ingleside has been successful over the years in implementing multiple security mechanisms to safeguard our systems. Despite our focused efforts, on November 21, 2017, we discovered that we had been the target of a criminal malware attack. We immediately took action, launching a software program to assist in finding and removing the malware from our system. We also engaged independent computer forensics experts to determine how the incident occurred and if information had been accessed by an unauthorized third party. Although the investigation did not identify any evidence of access to your information, we unfortunately could not completely rule out the possibility that your personal information, including your name, address, date of birth, Social Security number, and protected health information may have been compromised because of this criminal activity. Your financial transactions including payment information were not involved in this incident.

We take the security of all potentially impacted individuals’ information very seriously, and want to assure you that we have taken steps to prevent a similar event from occurring in the future. This includes upgrading our firewall, antivirus and malware security, requiring all new user credentials/passwords, adopting dual-factor authentication, and providing additional staff training on identifying unauthorized access.

We mailed a letter to individuals potentially impacted by this event which includes steps they can take to monitor and protect their personal information. We have also established a toll-free call center to answer questions about the incident and related concerns. The call center is available Monday through Friday from 8:00 a.m. to 8:00 p.m., Eastern Time and can be reached at 833-214-8743. In addition, out of an abundance of caution, we are offering credit monitoring and identity theft restoration services through Kroll to potentially impacted individuals at no cost.

The privacy and protection of resident information is a top priority, and we deeply regret any inconvenience or concern this incident may cause. _____________________________________________________________________________

The following information is provided to help individuals wanting more information on steps they can take to protect themselves:

How do I obtain a copy of my credit report?

You can obtain a copy of your credit report, free of charge, directly from each of the three nationwide credit reporting agencies. To order your credit report, free of charge once every 12 months, please visit www.annualcreditreport.com or call toll free at 1-877-322-8228. Contact information for the three nationwide credit reporting agencies is included in the e-mail and letter, and is also listed at the bottom of this page.

How do I put a fraud alert on my account?

You may consider placing a fraud alert on your credit report. This fraud alert statement informs creditors to possible fraudulent activity within your report and requests that your creditor contact you prior to establishing any accounts in your name. To place a fraud alert on your credit report, contact Equifax, Experian or TransUnion and follow the Fraud Victims instructions. To place a fraud alert on your credit accounts, contact your financial institution or credit provider. Contact information for the three nationwide credit reporting agencies is included in the letter and is also listed at the bottom of this page.

Contact information for the three nationwide credit reporting agencies is as follows:

Equifax Security Freeze PO Box 105788 Atlanta, GA 30348 1-800-685-1111 www.equifax.com

Experian Security Freeze PO Box 9554
Allen, TX 75013 1-888-397-3742 www.experian.com

TransUnion (FVAD) PO Box 2000 Chester, PA 19022 1-800-888-4213 www.transunion.com

Source: Westminster Ingleside King Farm Presbyterian Retirement Communities

Note: The incident was reported to HHS as affecting 5,228 patients.


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Confidence in ransomware recovery is high but actual success rates remain low
  • Protected health information of 462,000 members of Blue Cross Blue Shield of Montana involved in Conduent data breach
  • TX: Kaufman County Faces Cybersecurity Attack: Courthouse Computer Operations Disrupted
  • Attorney General James Announces Settlement with Wojeski & Company Accounting Firm
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
Category: Health DataMalwareU.S.

Post navigation

← Email gaffe by Coventry University staff exposed 1,930 students’ details
Kansas website exposed state employees’ personal information: report →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.