HomeScience & EnvironmentHealthcare data breach at...

Healthcare data breach at Episource exposes 5 million patient records

NEWYou can now listen to Fox News articles!

Over the past decade, software companies have built solutions for nearly every industry, including healthcare. One term you might be familiar with is software as a service (SaaS), a model by which software is accessed online through a subscription rather than installed on individual machines. 

In healthcare, SaaS providers are now a common part of the ecosystem. But, recently, many of them have made headlines for the wrong reasons. 

Several data breaches have been traced back to vulnerabilities at these third-party service providers. The latest incident comes from one such firm, which has now confirmed that hackers stole the health information of over 5 million people in the United States during a cyberattack in January.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join.

ASCENSION HEALTHCARE DATA BREACH EXPOSES 430,000 PATIENT RECORDS

A healthcare worker looking at data on a tablet   (Kurt “CyberGuy” Knutsson)

SaaS firm leads to major healthcare blunder

Episource, a big name in healthcare data analytics and coding services, has confirmed a major cybersecurity incident (via Bleeping Computer). The breach involved sensitive health information belonging to over 5 million people in the United States. The company first noticed suspicious system activity Feb. 6, 2025, but the actual compromise began ten days earlier.

An internal investigation revealed that hackers accessed and copied private data between Jan. 27 and Feb. 6. The company insists that no financial information was taken, but the stolen records do include names, contact details, Social Security numbers, Medicaid IDs and full medical histories.

Episource claims there’s no evidence the information has been misused, but because they haven’t seen the fallout yet doesn’t mean it isn’t happening. Once data like this is out, it spreads fast, and the consequences don’t wait for official confirmation.

healthcare breach 2

A woman looking at a health app on her smartphone   (Kurt “CyberGuy” Knutsson)

OVER 8 MILLION PATIENT RECORDS LEAKED IN HEALTHCARE DATA BREACH

Why healthcare SaaS is a growing target

The healthcare industry has embraced cloud-based services to improve efficiency, scale operations and reduce overhead. Companies like Episource enable healthcare payers to manage coding and risk adjustment at a much larger scale. But this shift has also introduced new risks. When third-party vendors handle patient data, the security of that data becomes dependent on their infrastructure.

Healthcare data is among the most valuable types of personal information for hackers. Unlike payment card data, which can be changed quickly, medical and identity records are long-term assets on the dark web. These breaches can lead to insurance fraud, identity theft and even blackmail.

Episource is not alone in facing this kind of attack. In the past few years, several healthcare SaaS providers have faced breaches, including Accellion and Blackbaud. These incidents have affected millions of patients and have led to class-action lawsuits and stricter government scrutiny.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

healthcare breach 3

A healthcare worker typing on her laptop    (Kurt “CyberGuy” Knutsson)

5.5 MILLION PATIENTS EXPOSED BY MAJOR HEALTHCARE DATA BREACH

5 ways you can protect yourself from healthcare data breach

If your information was part of the healthcare breach or any similar one, it’s worth taking a few steps to protect yourself.

1. Consider identity theft protection services: Since the healthcare data breach exposed personal and financial information, it’s crucial to stay proactive against identity theft. Identity theft protection services offer continuous monitoring of your credit reports, Social Security number and even the dark web to detect if your information is being misused. 

These services send you real-time alerts about suspicious activity, such as new credit inquiries or attempts to open accounts in your name, helping you act quickly before serious damage occurs. Beyond monitoring, many identity theft protection companies provide dedicated recovery specialists who assist you in resolving fraud issues, disputing unauthorized charges and restoring your identity if it’s compromised. See my tips and best picks on how to protect yourself from identity theft.

2. Use personal data removal services: The healthcare data breach leaks loads of information about you, and all this could end up in the public domain, which essentially gives anyone an opportunity to scam you.  

One proactive step is to consider personal data removal services, which specialize in continuously monitoring and removing your information from various online databases and websites. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here. 

Get a free scan to find out if your personal information is already out on the web.

3. Have strong antivirus software: Hackers have people’s email addresses and full names, which makes it easy for them to send you a phishing link that installs malware and steals all your data. These messages are socially engineered to catch them, and catching them is nearly impossible if you’re not careful. However, you’re not without defenses.

The best way to safeguard yourself from malicious links is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Enable two-factor authentication: While passwords weren’t part of the data breach, you still need to enable two-factor authentication (2FA). It gives you an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.

5. Be wary of mailbox communications: Bad actors may also try to scam you through snail mail. The data leak gives them access to your address. They may impersonate people or brands you know and use themes that require urgent attention, such as missed deliveries, account suspensions and security alerts.

WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLE

Kurt’s key takeaways

What makes this breach especially alarming is that many of the affected patients may have never even heard of Episource. As a business-to-business vendor, Episource operates in the background, working with insurers and healthcare providers, not with patients directly. The people affected were customers of those companies, yet it’s their most sensitive data now at risk because of a third party they never chose or trusted. This kind of indirect relationship muddies the waters when it comes to responsibility and makes it even harder to demand transparency or hold anyone accountable.

CLICK HERE TO GET THE FOX NEWS APP

Do you think healthcare companies are investing enough in their cybersecurity infrastructure? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com.  All rights reserved. 
 

Source link

- A word from our sponsors -

spot_img

Most Popular

More from Author

- A word from our sponsors -

spot_img

Read Now

Jennifer Aniston shares major update about brand

Apart from her acting chops, Jennifer Aniston is seemingly good at business, too, which is evident from her launch...

Income Tax Return Filing: Missing 30-Day E-Verification Deadline? Your ITR… | Personal Finance News

New Delhi: As of now, for the Income Tax Return (ITR) filing season for Assessment Year (AY) 2025–26, around 2.51 crore returns have been filed. Out of these, 2.43 crore returns have been verified, and 1.13 crore verified returns have been processed. The income tax portal has...

The most contagious infectious disease on the planet revealed

Your support helps us to tell the storyFrom reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines...

Business news live: FTSE 100 rises as stock markets recover and Tesla hand Elon Musk $29bn in shares

BP confirms biggest oil and gas field discovery in 25 years Energy giant BP has announced its biggest oil and gas field discovery in 25 years after a drilling off the coast of Brazil.The company’s vice president for oil production, Gordon Birrell, said it was a “significant...

Why you should not drink water after eating cucumber: Know the potential digestive issues |

Cucumbers are a refreshing and hydrating vegetable, rich in fiber, vitamins, and minerals. However, drinking water immediately after eating cucumbers may disrupt digestion and cause discomfort. Since cucumbers already have a high water content, adding more water can dilute digestive juices, potentially leading to bloating,...

Mission under way to save ‘world’s most beautiful’ snails

Victoria GillScience correspondent, BBC NewsBernardo Reyes-TurThe hope is that they can reveal those biological secrets before these colourful creatures are bought and sold into extinction. "Eastern Cuba is the the only place in the world where these snails are found," Prof Davison told BBC News. "That's...

Meet the "grandfluencers"

After Diane Shiffer retired from working as an educator and social worker, she took on a new calling: as a social media "grandfluencer." Known on TikTok as YourChubbyVintageNana, she now has nearly two million followers across platforms, as she goes all-in on "the Nana vibe." Correspondent Faith...

Staffing trends: Tech recruitment stagnant; AI and cloud skills drive demand outside IT

Hiring in India’s IT services sector has remained largely flat for the past six to seven quarters, with no visible signs of revival in the July-September period either, according to Quess Corp executive director and CEO Guruprasad Srinivasan. According to PTI, he said demand has...

Potato’s origin story just got juicy — meet its tomato ancestor

Natural hybridisation event occurred 9m years ago.Interbreeding involved tomato and a potato-like species.Study analysed genomes from cultivated and wild...