There are so many breach reports that it’s hard to even chance all the notices and reports about them these days. These days, there are many breaches that I log in worksheets i compile for Protenus’s breach Barometer yearly account but never even carry on this blog. Just today, for example, I found: a observation from Fairbanks Cancer Physicians disclosing that their patients had been impacted by the Elekta cyberattack; a notice from Dermatology group of Arkansa disclosing that their patients had been impacted by a phishing attack; a mark from CentraCare Health and Carris Health Willmar Lakeland Clinic (formerly known as Family practice medical Center) disclosing that their patients had been impacted by the Netgain technology ransomware attack; and a somewhat unusual mark from Good Shepherd Centres in Canada that merited its own post. None of the U.S. ones above have shown up in HHS’s public breach tool yet as far as i canful determine. And i am still mulling over a press relinquish this week by Coastal sept health Center. DataBreaches.net had broken the report of their May ransomware incident on June 11. Their press release of this week talks about some patient files being accessed. It does not come out and say that 506 GB of files with clinic, patient, and employee personal and protected health information was dumped on the dark web and the center has no idea how many multitude have already downloaded it all for possible misuse. As of today, there is no describe yet on HHS as to how many patients they experience notified, but in addition to patients, there were many employees whose personal identity information and earnings info for W-2 etc was dumped. i understand that entities may want to downplay how serious a breach was, but there really ought to be a requirement that they expose when they know that data has been publicly dumped so that people can factor that in when determining what they may need to doh to protect themselves now and in the future.