Other articles


  1. Lifespan Breach 2017

    Sat 24 September 2022

    In General.

    Here is a draft blog article on the Lifespan data breach of 2017:

    Hacking Healthcare: The Top 5 Healthcare Data Breaches of the 1990s

    Introduction The healthcare industry has long been a prime target for cyber criminals due to the sensitive nature of patient data and the critical importance of …

    read more
  2. Stanford Hospital & Clinics Breach 2010

    Sat 24 September 2022

    In General.

    Hacking Healthcare: The Top 5 Healthcare Data Breaches of the 1990s

    Stanford Hospital & Clinics Breach 2010

    In the ever-evolving landscape of healthcare data security, the Stanford Hospital & Clinics breach in 2010 stands as a sobering reminder of the vulnerability that healthcare organizations face. As the healthcare industry grapples with the …

    read more
  3. Sutter Health Breach 2011

    Sat 24 September 2022

    In General.

    Here is a draft blog article on the Sutter Health data breach of 2011:

    Hacking Healthcare: The Top 5 Healthcare Data Breaches of the 1990s

    Sutter Health Breach 2011

    The healthcare industry has long been a target for cybercriminals seeking to access valuable patient data. One of the most significant …

    read more
  4. UCLA Health System Breach 2011

    Sat 24 September 2022

    In General.

    Hacking Healthcare: The Top 5 Healthcare Data Breaches of the 1990s

    Topic: UCLA Health System Breach 2011

    In the ever-evolving landscape of healthcare technology, data breaches have become an unfortunate reality. One of the most significant incidents in recent history occurred in 2011, when the UCLA Health System experienced a …

    read more
  5. Veterans Affairs Data Theft 2006

    Sat 24 September 2022

    In General.

    Here is a draft blog article on the topic of the Veterans Affairs Data Theft in 2006:

    Hacking Healthcare: The Top 5 Healthcare Data Breaches of the 1990s

    The Veterans Affairs Data Theft of 2006

    The healthcare industry has long been a prime target for cyber criminals looking to steal …

    read more