Nude “before and after” photos stolen from plastic surgeon, posted online, and sent to victims’ family and friends::The FBI is investigating a data breach where cybercriminals were able to steal patients’ records from a Las Vegas plastic surgeon’s office and then publish them online.

  • LWD@lemm.ee
    link
    fedilink
    English
    arrow-up
    168
    arrow-down
    5
    ·
    1 year ago

    The “I don’t need privacy because I have nothing to hide” crowd always forgets one group of people they do want to hide from: deranged assholes.

      • naonintendois@programming.dev
        link
        fedilink
        English
        arrow-up
        39
        arrow-down
        1
        ·
        1 year ago

        HD encryption only helps if they get physical access to the disk when the device is locked or powered off. If they get it via a backdoor or virus, then it doesn’t help.

      • KairuByte@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        31
        arrow-down
        1
        ·
        1 year ago

        That isn’t at all the argument presented by those opposed to “nothing to hide” mentality. You’re simply going from one extreme to the other, and presenting a strawman.

  • HeyJoe@lemmy.world
    link
    fedilink
    English
    arrow-up
    77
    ·
    1 year ago

    Found the info I was looking for in the article. The documents did not appear to be stored with any kind of encryption… so yeah this was terrible it happened, but it happened partially due to not spending enough on IT resources to guide them on proper practices for handling documents with confidential information and violated HIPAA. As someone who works in the field all patient information must be encrypted at rest or another form of encryption on the data must exist for it to fall within compliance. On top of this only the bare minimum amount of people should have access to this data and absolutely should have audit logs for anyone accessing the data normally through the 3rd party application used to store and lookup the information.

    • Treczoks@lemmy.world
      link
      fedilink
      English
      arrow-up
      15
      arrow-down
      1
      ·
      edit-2
      1 year ago

      Not that the audit logs would help anyone except listing “these files were copied by [user account used by hacker] on [date the office was hacked]”.

      The real issue is that most medical offices still rely on Windows, Active Directory, and Exchange, and most of them are far, far away from up-to-date, patched versions (which actually don’t prevent hacks, but make them a bit more difficult).

      • HeyJoe@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 year ago

        I was more referencing the application that they, hopefully, use to store their documents. I really hope they are not just stored in a directory, but I guess who knows… some of the applications I have used reference everything in audit logs from when it was uploaded, to who and when it is viewed, any changes, and more. Without the application the data is encrypted at rest so the files are useless without using the application to open them. We have others that are stored within an encrypted database or use blob storage thats encrypted. Anything, but never plain old windows for storage!

  • Treczoks@lemmy.world
    link
    fedilink
    English
    arrow-up
    49
    ·
    1 year ago

    Let me guess without reading the article: The data was stored on an unecrypted drive connected to a computer in a network running with Windows, Active Directory, and Outlook/Exchange?

    With that combo, you can just post your “secret” data on the web site, it won’t make much of a difference.

    • CaptFeather@lemm.ee
      link
      fedilink
      English
      arrow-up
      10
      ·
      1 year ago

      Spot on lmao

      According to 8NewsNow, about a dozen women have since filed a lawsuit against the firm, claiming they did not do enough to protect their private and personal information. None of the documents posted online were encrypted

    • Kissaki@feddit.de
      link
      fedilink
      English
      arrow-up
      10
      ·
      1 year ago

      I’m not sure what do do about the before and after though. Any suggestions?

    • DrMango@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      2
      ·
      1 year ago

      This guy is on to something.

      You know those AI generated “average male/female face” images you see sometimes? I feel like it could be interesting to have an “average nude body” image, but we need so many normal nudes to feed to the AI.

  • andrew@lemmy.stuart.fun
    link
    fedilink
    English
    arrow-up
    18
    arrow-down
    7
    ·
    edit-2
    1 year ago

    Honestly the whole before/after nude photo aspect of plastic surgery feels so weird even if they’re never hacked. No other doctors do this with photos. And I get it, portfolio and all that, but at least offer a discount of something. But everyone? For medical reasons? Not even just kinda creepy, that’s meaningfully creepy. And as made evident by this breach, not even a little surprising that they have substandard information security policies. Anybody at the office could probably get access to the shared folder they probably stuff these into. And the doctor’s kids all probably know his crappy password that never changes. So so so many ways this could and will go wrong.

    • Kissaki@feddit.de
      link
      fedilink
      English
      arrow-up
      9
      arrow-down
      2
      ·
      1 year ago

      How do you track and improve impact and quality of work without before and after documentation?

      • andrew@lemmy.stuart.fun
        link
        fedilink
        English
        arrow-up
        12
        arrow-down
        2
        ·
        edit-2
        1 year ago

        Notes? Close-up wound/scar photos? Any number of ways every other doctor manages to handle it?