Get Help Now
CONTACT US

From the Cybersecurity News Desk

OneTouchPoint Data Breach – Why Should We Care?

The recent OneTouchPoint data breach, which could impact hundreds of thousands of individuals, is the latest prime example of why 3rd party vendor risk assessments are absolutely critical to every organization’s cybersecurity plan. OTP is responsible for the printing and mail distribution services for over 35 major healthcare organizations and insurance companies including Anthem Blue Cross, Humana and Kaiser Permanente. They also do business with companies in many other industries as well, including alcohol & beverage, financial services, retail, and manufacturing.

On April 28th OTP discovered encrypted files on company servers. During their investigation it was determined that a threat actor had access to an unknown number of files on their systems for up to 48 hours. Notifications have been sent in just the past ten days to individuals potentially compromised by the breach.

Remember the Target HVAC data breach of 2013? That cost Target 202 million dollars, resulted in the theft of 40 million credit card numbers and is still ranked as one of the biggest data breaches in history. In the subsequent almost decade which has followed, the number of organizations across the spectrum of industries depending on outside vendors continues to climb dramatically. Unfortunately, the cyber-attacks on those third parties are escalating in kind.

Read more about the OneTouchPoint data breach here: https://healthitsecurity.com/news/geisinger-kaiser-permanente-35-others-impacted-by-third-party-vendor-data-breach

See How We Can Help!

Fill out this form and we’ll be in touch shortly

    Number of Employees - select one:
    Industry - select one:

    Through our comprehensive approach to cybersecurity, we’ll ensure your organization is protected against evolving threats which may impact your third-party vendors.

    CYBER OPERATIONS

    Be Proactive with Penetration Testing

    We can reveal if there are weaknesses in your systems.

    Prepare with Vulnerability Assessment

    Address your own vulnerabilities and those of your business partners.

    Cybersecurity Incidents Happen

    Plan, prevent, and mitigate with our incident response team.

    View expert analysis on the latest threats 

    Finding qualified security professionals can be difficult and costly.

    Ours are the best. Put them to work for you.

    Contact Us  
    Privacy Settings
    We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
    Youtube
    Consent to display content from - Youtube
    Vimeo
    Consent to display content from - Vimeo
    Google Maps
    Consent to display content from - Google
    Spotify
    Consent to display content from - Spotify
    Sound Cloud
    Consent to display content from - Sound
    Contact Us