If you're among the 5.4 million patients impacted by the recent Episource health data breach, you're likely facing a whirlwind of concerns and questions. The breach has laid bare an array of sensitive data, causing potential vulnerabilities in personal information security. Understanding what was exposed and how to safeguard yourself moving forward is critical. This guide will break down the breach, detail the specific data at risk, and provide actionable steps to protect your personal health information.
What Datapoints Were Leaked?
The Episource health data breach wasn’t just another blip in the headlines—it exposed the raw details of daily life for over 5 million people. If your information was part of that breach, it’s important to know exactly what might be out there.
Here’s what was compromised:
Full Names: Your complete name, not just initials.
Physical Addresses: Street, city, and zip code details.
Dates of Birth: The kind of data that makes identity theft easier.
Social Security Numbers (SSNs): The single most sensitive identifier in the U.S.
Medical Record Numbers: Tied directly to your health files.
Insurance Policy Details: Including policy numbers and sometimes group numbers.
Diagnosis and Treatment Information: This could include medical conditions, test results, and treatment plans.
This isn’t just about a name or two floating in the digital ether. It’s a detailed snapshot of personal and health information. Each of these datapoints, especially when combined, can be misused in ways that hit hard—think fraudulent insurance claims or even fake medical histories created in your name.
The breach’s scope means both personal identity and private health details are at risk. If you’re feeling uneasy, you’re not alone. The seriousness of this situation can’t be overstated.
Should You Be Worried?
A breach like the Episource incident isn’t just a headline—it’s a wake-up call. The information exposed goes beyond the ordinary. We're talking about personal details tied to your health and identity, not just your email address or phone number. Let’s break down the risks and what they actually mean for you.
What’s at Stake?
When sensitive data slips into the wrong hands, the consequences can be serious:
Identity Theft: Stolen names, dates of birth, and Social Security numbers are gold mines for criminals. With enough information, someone could open new credit accounts, file fraudulent tax returns, or even access your medical benefits.
Medical Fraud: Exposed health records make you a target for scammers. They might use your insurance for their own treatment or create fake medical claims under your name.
Account Compromise: If login credentials were exposed, hackers could try those on your other accounts. Many people reuse passwords, making it easier for attackers to gain access elsewhere.
Why You Need to Stay Alert
The effects of a breach don’t always show up right away. Fraudsters might wait months before using stolen information, so letting your guard down is risky.
Watch for Unusual Activity: Keep an eye on your credit reports and bank statements. Small, unexplained transactions often come before bigger theft.
Monitor Your Health Records: Unexpected changes in your medical files or insurance activity could mean someone is using your information.
Be Skeptical of Unexpected Emails or Calls: Phishing attempts often follow breaches, as attackers use stolen info to craft convincing messages.
Simple Steps to Protect Yourself
You don’t need to be a cybersecurity expert, but a few smart moves can make a difference:
Change passwords on accounts tied to your health or finances. Use strong, unique combinations.
Enable two-factor authentication (2FA) wherever possible. It adds an extra hurdle for attackers.
Use privacy tools like Cloaked to generate masked emails, phone numbers, and passwords for online accounts. This makes it much harder for anyone to piece together your real identity if a breach occurs.
Staying vigilant isn’t about living in fear—it’s about staying one step ahead. Even if you haven’t noticed anything suspicious yet, now’s the time to take action.
What Should Be Your Next Steps?
When your health data is exposed, taking action isn’t just wise—it’s necessary. A breach of your medical information can put you at risk for health fraud, identity theft, and unexpected bills. Here’s a straight-shooting plan to help you get back in control.
1. Scrutinize Your Explanation of Benefits (EOBs)
Your EOBs are like bank statements for your health. They show what services were billed to your insurance—even if you didn’t receive them. Pay close attention:
Review every EOB for services or providers you don’t recognize.
Flag anything suspicious—unauthorized procedures, wrong dates, or unknown doctors.
Contact your insurer immediately if you spot a problem. A quick call can stop fraud in its tracks.
2. Stay Alert to Health Fraud
Fraudsters can use stolen health data to get prescriptions, file fake claims, or even create false medical histories. To protect yourself:
Be wary of calls or emails asking for more personal information—even if they sound official.
Never share sensitive details (like your Social Security number or insurance ID) unless you’re sure who you’re speaking with.
Request a copy of your medical records from your provider. Double-check for errors or unfamiliar treatments.
3. Lock Down Your Personal Information
Once your health data is out there, you need to play defense. Here’s how to make it harder for scammers to do more damage:
Change passwords on your health portals and related accounts. Use strong, unique combinations.
Consider using privacy-focused tools like Cloaked, which help you manage and mask personal info. Cloaked lets you create aliases and shields your real contact details, making it harder for fraudsters to get what they need.
Enable two-factor authentication wherever possible. It’s a simple but powerful way to keep unwanted visitors out.
4. Report and Document Everything
Don’t wait for things to spiral. Be proactive:
Report the breach to your health provider, insurer, and, if necessary, government agencies like the FTC.
Keep a log of all communications, including who you spoke to and when. This can help later if you need to dispute a bill or clear your name.
5. Monitor Your Credit and Medical History
Your health data can fuel more than just medical scams—it can spill over into financial fraud:
Check your credit report for new accounts or activity you don’t recognize.
Request a medical identity theft report if you suspect misuse. This can help you correct your medical file and avoid dangerous mix-ups.
Staying vigilant after a health data breach isn’t just about protecting your wallet—it’s about keeping your health and your identity safe. Take these steps seriously, and don’t hesitate to use privacy tools like Cloaked if you want an extra layer of defense.
Cloaked FAQs Accordion
Frequently Asked Questions
First, change your passwords—especially if you've reused them across sites. Then enable two-factor authentication (2FA) on all key accounts. Review your account and credit activity regularly for any unusual behavior. If suspicious actions surface, consider freezing your credit and alerting your bank. To proactively reduce exposure in the future, tools like Cloaked can mask your personal information before breaches happen.
Cloaked provides you with disposable emails, phone numbers, and payment details, making it harder for bad actors to access your real identity. These tools help you safely sign up for services, communicate, and shop online without putting your core identity at risk.
Commonly targeted data includes full names, email addresses, phone numbers, birthdates, physical addresses, login credentials, and payment info. Tools like Cloaked help shield this information by providing secure, masked alternatives.
Always be skeptical. Malicious links are one of the most common ways hackers infect devices or steal data. Avoid clicking unless you can verify the source. Services like Cloaked can add layers of security so your real contact info isn’t exposed even if you make a mistake.
Using the same contact info across platforms makes it easy for attackers to build a full profile of you. If one platform gets breached, all your accounts can be at risk. That’s why Cloaked allows you to use different, secure contact methods for each service.
At Cloaked, we believe the best way to protect your personal information is to keep it private before it ever gets out. That’s why we help you remove your data from people-search sites that expose your home address, phone number, SSN, and other personal details. And to keep your info private going forward, Cloaked lets you create unique, secure emails and phone numbers with one click - so you sign up for new experiences without giving away your real info. With Cloaked, your privacy isn’t a setting - it’s the default. Take back control of your personal data with thousands of Cloaked users.
*Disclaimer: You agree not to use any aspect of the Cloaked Services for FCRA purposes.