Skip to content
  Thursday 22 May 2025
Trending
April 19, 2024Cybersecurity Architect and Engineer June 29, 2023CISA Releases Nine Industrial Control Systems Advisories April 13, 2025Sr Lead Cybersecurity Architect October 5, 2024Cybersecurity Vulnerability Assessment Engineer January 17, 2025Cybersecurity Engineer July 18, 2024IT CYBERSECURITY SPECIALIST (INFOSEC) July 9, 2024Johnson Controls Software House C●CURE 9000 September 30, 2023Cybersecurity Risk Management Manager (Remote) August 10, 2024Industrial Control System (ICS) Cybersecurity Engineer December 3, 2023Cybersecurity Engineer
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  

Neurology Practice Hit with $25K Fine After Ransomware Attack

Industry News

Neurology Practice Hit with $25K Fine After Ransomware Attack

SecuredyouadmSecuredyouadm—April 28, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Trump Axes Biden’s AI Safety Directive

January 21, 2025

Integrating Managed Risk and Strategy into SecOps

January 8, 2024

US Appeals Court Overturns Tornado Cash Sanctions

November 27, 2024

AI Scaling Laws Boost Efficiency and Slash Costs

January 30, 2025



In a recent enforcement action, federal regulators have imposed a $25,000 fine on a New York-based neurology practice following a 2020 ransomware breach that compromised the personal data of nearly 7,000 individuals. The investigation revealed that Comprehensive Neurology, a specialty practice located in Hollis, New York, with a team of five staff members, did not conduct a thorough risk analysis to assess potential vulnerabilities to its electronic protected health information (ePHI). This settlement also requires the practice to adhere to a corrective action plan.

This enforcement action by the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR) is part of their ongoing initiatives targeting ransomware-related HIPAA violations. It marks the 12th such enforcement since the initiative began in 2023 and the eighth action under their security risk analysis program. The program was launched to ensure healthcare entities identify and mitigate risks to ePHI adequately. Comprehensive Neurology’s failure to do so resulted in sensitive patient information, including names, clinical details, health insurance data, and Social Security numbers, being encrypted by hackers during the breach.

As part of the resolution agreement signed on February 7, Comprehensive Neurology is not only required to pay the financial penalty but must also implement a corrective action plan that HHS OCR will oversee for the next two years. The practice is mandated to perform a comprehensive security risk analysis and develop a risk management plan to address identified vulnerabilities. Additionally, they must train their workforce on HIPAA policies and procedures to prevent future breaches.

The 2020 incident at Comprehensive Neurology highlights the critical need for healthcare practices to prioritize cybersecurity and conduct regular risk assessments. With ransomware attacks on the rise, healthcare organizations must ensure robust security measures are in place to protect patient data from malicious actors. Comprehensive Neurology’s experience serves as a cautionary tale for other practices to bolster their cybersecurity defenses and comply with HIPAA regulations.

Comprehensive Neurology has so far declined to comment on its settlement with HHS OCR. Nevertheless, this case underscores the importance of regulatory compliance and proactive risk management in safeguarding sensitive health information against cyber threats.

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

CISA Adds Three Known Exploited Vulnerabilities to Catalog

RSAC Conference 2025: Day 1 Highlights Unveiled!

Related posts
  • Related posts
  • More from author
Industry News

Chinese Hackers Breach U.S. Government Networks using Trimble Cityworks Vulnerability

May 22, 20250
Industry News

Unpatched Versa Concerto Vulnerabilities Allow Hackers to Break Free from Docker and Hijack Host

May 22, 20250
Industry News

Act Now: Critical Windows Server 2025 Vulnerability Puts Active Directory at Risk

May 22, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Industry News

Chinese Hackers Breach U.S. Government Networks using Trimble Cityworks Vulnerability

May 22, 20250
Industry News

Unpatched Versa Concerto Vulnerabilities Allow Hackers to Break Free from Docker and Hijack Host

May 22, 20250
Threat Advisories

New Best Practices Guide for Securing AI Data Released

May 22, 20250
Careers

Cybersecurity Engineer (Top Secret Clearance Required)

May 22, 20250
Careers

Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

May 22, 20250
Careers

Cybersecurity Architect

May 22, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Chinese Hackers Breach U.S. Government Networks using Trimble Cityworks Vulnerability
  • Unpatched Versa Concerto Vulnerabilities Allow Hackers to Break Free from Docker and Hijack Host
  • New Best Practices Guide for Securing AI Data Released
  • Cybersecurity Engineer (Top Secret Clearance Required)
  • Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures