There are so many breach reports that it’s hard to even bump all the notices and reports about them these days. These days, there are many breaches that i log in worksheets i compile for Protenus’s breach Barometer annual report but never even post on this blog. Just today, for example, I found: a notice from Fairbanks cancer Physicians disclosing that their patients had been impacted by the Elekta cyberattack; a mark from Dermatology group of Arkansa disclosing that their patients had been impacted by a phishing attack; a note from CentraCare health and Carris health Willmar Lakeland Clinic (formerly known as Family exercise medical Center) disclosing that their patients had been impacted by the Netgain Technology ransomware attack; and a somewhat unusual mark from Good Shepherd Centres in Canada that merited its have post. None of the U.S. ones above have shown up in HHS’s public breach cock yet as far as I can determine. And i am allay mulling over a press release this week by Coastal Family Health Center. DataBreaches.net had broken the story of their may ransomware incident on June 11. Their pressure relinquish of this week talks about some patient files beingness accessed. It does not amount out and say that 506 gigabyte of files with clinic, patient, and employee personal and protected health information was dumped on the dark web and the center has no idea how many people have already downloaded it all for possible misuse. as of today, there is no story yet on HHS as to how many patients they have notified, but in addition to patients, there were many employees whose personal identicalness info and earnings info for W-2 etc was dumped. i understand that entities may need to downplay how serious a breach was, but there really ought to be a requirement that they disclose when they experience that data has been publicly dumped so that multitude can factor that in when determining what they may demand to come to protect themselves now and in the future.