Cybercrime and Data Breach Weekly News Roundup

In this week’s breach roundup, read about the latest incidents affecting organizations in the higher education, financial, and healthcare sectors. 

University of Connecticut Health Center Reports Incident

According to DataBreach Today, “The University of Connecticut Health Center reports that a former employee inappropriately accessed about 1,400 patient records. Exposed information on those patients included names, addresses, dates of birth and, in some cases, Social Security numbers and health information, according to a notice posted to the hospital’s website. The health center said there’s no evidence that the patient information inappropriately accessed was used for any purpose.

University of Connecticut Health Center requires all employees to undergo training about patient privacy upon hiring and offers continuous training to reinforce the education, according to the notice. As a result of the incident, the health center is evaluating all its education and monitoring efforts. Affected individuals are being offered free credit monitoring services, along with insurance coverage, for two years.”


DDoS: 6 Banks Hit on Same Day

BankInfo Security reported that “six leading U.S. banking institutions were hit by distributed-denial-of-service attacks on March 12, the largest number of institutions to be targeted in a single day, says security expert Carl Herberger of Radware. 

The attacks are evolving, and the bot behind them, known as Brobot, is growing, he adds. This recent wave of DDoS attacks has proven to be the most disruptive among the campaigns that date back to September, says Herberger, vice president of security for the anti-DDoS solutions provider.” 

“The Brobot has grown, the infection rate has increased, and the encrypted attacks have become more refined,” Herberger says. “As a result, it all is more effective. They’ve clearly gotten better at attacking more institutions at once.”

Radware offers DDoS-mitigation tools to several high-profile clients, including U.S. banking institutions targeted in the recent attacks, Herberger says. As a result, the company has insights about numerous industrial sector attacks as well as online traffic patterns.

Herberger declined to name the institutions affected, citing Radware’s non-disclosure agreements. But according to online traffic patterns collected by Internet and mobile-cloud testing and monitoring firm Keynote Systems Inc., JPMorgan Chase & Co., BB&T and PNC Financial Services Group suffered online outages on March 12. The three banks declined to comment about the attacks or confirm whether they had been targeted this week.

Chase, however, acknowledged an online disruption in a March 12 post to the Chase Twitter feed. The post states: “*ALERT* We continue to work on getting Chase Online back to full speed. In the meantime, pls. use the Chase Mobile app or stop by a branch.” On March 13, the bank came back with this tweet: “We’re sorry it was such a rough day and we really appreciate your patience.”

To view entire news article, visit

Lost, unencrypted USB thumb drive impacts more than 50k Medicaid providers

SC Magazine disclosed that “a government contractor in charge of building North Carolina’s Medicaid billing system lost a USB thumb drive containing the personal information of thousands of Medicaid providers nationwide.” 

How many victims? 1,182 North Carolina providers were affected, but the personal information of more than 50,000 providers nationwide was compromised.

What type of personal information? Provider data included full names, Social Security numbers, addresses, and dates of birth. No patient information was included.

What happened? A USB thumb drive containing the sensitive data belonging to the North Carolina Department of Health and Human Services was lost by an employee of Falls Church, Va.-based CSC (Computer Sciences Corporation) while it was being delivered between facilities.

What was the response? CSC was told by the state department to perform an outside review of its security. The company said that affected providers would be notified this week.

Details: According to a CSC spokesperson, the employee who misplaced the thumb drive worked on the new Medicaid billing system and is currently on administrative leave. An investigation is currently taking place into the matter. CSC has set up a dedicated hotline where providers can reach out with any inquiries.

Quote: “I have instructed CSC that North Carolina expects an independent third-party assessment to assure CSC’s adherence to required security standards,” Aldona Wos, DHHS secretary, said in a statement.

Source:, WRAL TV, “Medicaid contractor loses provider’s personal information,” March 8, 2013.


About Tactical FLEX, Inc.

For nearly a decade, Tactical FLEX, Inc. has taken great pride in providing best-of-breed security solutions to every type of organization around the world. Our wide spectrum of customers demonstrates our sincere commitment to an industry that remains at the forefront of the digital evolution of the world. Information security is our business, and our customers are our greatest asset. Tactical FLEX, Inc. is a trusted security vendor protecting more than 6,000 organizations within every industry in more than 100 countries. Our product Aanval® is the industry’s most comprehensive Snort and Syslog Intrusion Detection, Correlation, and Threat Management console on the market. Aanval supports both Snort and Suricata, as well as virtually any Syslog data source, and is designed specifically to scale from small single-sensor installations to global enterprise deployments. 

We invite you to visit our Industry Focus page at to find out how our products and services can aid securing your valuable assets and information. 

Learn more about Aanval SAS™ by visiting Aanval® is also available for download as a free Community edition for testing and evaluation at

Study Shows Managed Security Services Market Thriving with Unprecedented Growth

What is Motivating Both Large Enterprises and SMBs to Outsource Their Security? The Demand Explained

While the current economic environment has bruised many industries, the managed security services market is thriving and experiencing an unprecedented growth. Managed services is the practice of outsourcing a specific set of IT management responsibilities such as monitoring and managing a network operations center as a strategy to improve operations and security while reducing cost, time, and network complexity. According to Gartner, the managed security services sector in 2011 which includes a variety of services from managed firewalls and intrusion detection systems grew by more than 21% to $2.8 billion in North America. Gartner also predicts that in 2016 the worldwide market will nearly double to $17.7 billion from $9.4 billion in 2012.

What is fueling this market demand? Although many organizations prefer to rely on their own IT department to manage IT issues there are numerous benefits of turning to managed security services (MSPs). IT departments in general spend a majority of their time troubleshooting networks and fixing issues as quickly as possible. MSPs in turn have an advanced set of technological tools, expertise, and skills sets to solve problems and issues more efficiently than internal IT departments. By constantly monitoring and reviewing their client systems at all times, MSPs can provide their clients a better understanding of their network infrastructure including weaknesses and strengths plus deliver crucial strategies to improve network performance. Overall, MSPs in the past are different from the MSPs of today. Capable providers today can add more value by taking an pro-active role in defending their client’s networks thereby preventing potential problems that can result in network down-time. Dark Reading News further explains that “companies are increasingly focused on locking down their networks and data in the face of attackers who regularly succeed in breaching defenses. Small business overall are seeking better security while large enterprises are also looking to reduce costs and free up internal security teams.”

What makes Tactical FLEX, Inc. different from other MSP vendors as a technology partner? At Tactical FLEX, Inc. we’re helping organizations of all business sizes worldwide bridge the gap between IT resource deficiency and build a successful defense against today’s evolving cyber threats. Tactical FLEX, Inc. has been building information security, vulnerability, and risk management solutions since 2003 and can effectively manage, maintain, and monitor your network operations center around the clock while keeping up with the latest security threats and meeting privacy and security regulations.

We invite you to advantage of Tactical FLEX, Inc.’s depth of knowledge, dedicated technical resources, and our state-of-the-art Network Security Operations Center remote management and monitoring services. We have access to security experts and technology that are beyond in-house capabilities and can help you learn more about the security threats targeting your organization and how to stop it. When it comes to security, that breadth of knowledge could make a substantial difference to the safety of your company.

Visit the NSOC at Tactical FLEX, Inc.

To learn how Tactical FLEX, Inc. can help you effectively manage your security needs, please contact us at 800.921.2584 or email at @