Gold Coast Health Plan warns of data breach

Oct. 12, 2018

Gold Coast Health Plan said about 37,000 clients’ health information may have gotten into crooks’ hands due to a data breach.

Potentially affected by the breach are clients whose claim information was sent by email. The data included health plan ID numbers, dates of medical service, and in some cases, names, dates of birth, and medical procedure codes, Gold Coast said in a news release.

The attackers did not gain access to clients’ Social Security numbers or financial information, according to Gold Coast, a publicly funded entity that administers Medi-Cal health insurance to nearly 200,000 low-income residents of Ventura County.

Not all of those affected had the same information breached, the agency’s public relations manager, Susana Enriquez-Euyoque, said. For some, only one element was disclosed, she said, while others had two or more items compromised.

Those affected by the breach, totaling about 37,000 people, will be notified by mail, Enriquez-Euyoque said.

Officials with the health plan believe the attackers were trying to fraudulently transfer Gold Coast funds to their account. Gold Coast, however, said it is not aware that any misuse or attempted misuse of the information has occurred.

Gold Coast urged those affected to check their credit reports and look for suspicious medical bills. Gold Coast said it is offering identity theft protection services through ID Experts and providing affected clients with MyIDCare.

The data breach was linked to a phishing email attack, according to Gold Coast. In such an attack, hackers often send a fake link that appears to be tied to a legitimate site. When the victim clicks on the link, data can be compromised.

The attack compromised one employee’s email account, giving the attacker access to emails sent to the account between June 18 and Aug. 1, Gold Coast said.

Gold Coast said that when the problem was discovered on Aug. 9, it halted the attack, notified law enforcement authorities, disabled the compromised account, required a password change, maintained heightened monitoring, had a cybersecurity firm assess the problem, improved information security, and worked on educating employees about security issues, with an expanded focus on phishing emails.

VC Star has the full story

Sponsored Recommendations

ASK THE EXPERT: ServiceNow’s Erin Smithouser on what C-suite healthcare executives need to know about artificial intelligence

Generative artificial intelligence, also known as GenAI, learns from vast amounts of existing data and large language models to help healthcare organizations improve hospital ...

TEST: Ask the Expert: Is Your Patients' Understanding Putting You at Risk?

Effective health literacy in healthcare is essential for ensuring informed consent, reducing medical malpractice risks, and enhancing patient-provider communication. Unfortunately...

From Strategy to Action: The Power of Enterprise Value-Based Care

Ever wonder why your meticulously planned value-based care model hasn't moved beyond the concept stage? You're not alone! Transition from theory to practice with enterprise value...

State of the Market: Transforming Healthcare; Strategies for Building a Resilient and Adaptive Workforce

The U.S. healthcare system is facing critical challenges, including workforce shortages, high turnover, and regulatory pressures. This guide highlights the vital role of technology...