this post was submitted on 14 Nov 2023
231 points (97.9% liked)

Technology

59666 readers
2624 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Nude “before and after” photos stolen from plastic surgeon, posted online, and sent to victims' family and friends::The FBI is investigating a data breach where cybercriminals were able to steal patients’ records from a Las Vegas plastic surgeon's office and then publish them online.

you are viewing a single comment's thread
view the rest of the comments
[–] Treczoks@lemmy.world 14 points 1 year ago* (last edited 1 year ago) (1 children)

Not that the audit logs would help anyone except listing "these files were copied by [user account used by hacker] on [date the office was hacked]".

The real issue is that most medical offices still rely on Windows, Active Directory, and Exchange, and most of them are far, far away from up-to-date, patched versions (which actually don't prevent hacks, but make them a bit more difficult).

[–] HeyJoe@lemmy.world 3 points 1 year ago

I was more referencing the application that they, hopefully, use to store their documents. I really hope they are not just stored in a directory, but I guess who knows... some of the applications I have used reference everything in audit logs from when it was uploaded, to who and when it is viewed, any changes, and more. Without the application the data is encrypted at rest so the files are useless without using the application to open them. We have others that are stored within an encrypted database or use blob storage thats encrypted. Anything, but never plain old windows for storage!