Quest Diagnostics Data Breach is a Concern For All Americans

  • By David Lukic
  • Published: Feb 03, 2021
  • Last Updated: Mar 18, 2022

Medical privacy is a major concern for most Americans, and when a breach threatens the vulnerability of our healthcare information, it can be worrisome. This year another attack revealed that a Quest Diagnostics data breach had been ongoing from August 2018 until March of 2019. Quest Diagnostics is a medical testing facility with satellite offices all over the country. They clearly state that none of their systems or databases were breached, and no medical test results were taken. However, their payment and collections partner American Medical Collection Agency (AMCA) was breached, and the data stolen was payment information (credit and debit cards, and bank account information) names, dates of birth, phone numbers, addresses, and also social security numbers. Quest Diagnostics stresses that no medical test results were accessed during the Quest data breach, but doctor’s names, test codes, and other related items were accessed.

When Was the Quest Diagnostics Data Breach?

quest diagnostics breach

The actual Quest Diagnostics data breach occurred between August 1, 2018, and March 30, 2019. The Quest Diagnostics hack was discovered in March and reported to Quest Diagnostics immediately. The payment vendor AMCA has since filed for bankruptcy and closed its doors. Quest Diagnostics stopped using them immediately upon hearing of the breach. 

How to Check if Your Data Was Breached By Quest Diagnostics Hack

quest diagnostics data breach

Quest Diagnostics is hugely concerned about the Quest Diagnostics hack and has taken every step to mitigate the effects. They have contacted every affected patient via mail and have set up a page on their website to explain the details of the incident and provide additional information. They have a phone number you can call, 1‐800‐491‐5304 every Monday-Friday between 8 a.m. and 5:30 p.m. CST to inquire about your records. You can also visit https://amcaincident.kroll.com for additional information from Kroll, a Division of Duff and Phelps.

What to Do if Your Data Was Stolen From The Quest Diagnostics Breach

quest diagnostics hack

Unfortunately, the Quest Diagnostics data breach affected 12M people who used them for medical tests. If you were one of the affected parties from the Quest data breach, you would need to take quick action. The data stolen was highly useful to hackers and identity thieves. Follow these steps below to protect your privacy:

  • Cancel any credit or debit cards that you used to pay for services with Quest Diagnostics.

  • Contact your bank if you provided bank account information and explain the situation.

  • Closely monitor your credit reports and consider a credit freeze so that no one can open up new lines of credit in your name.

  • Sign up for credit monitoring with a good company like IDStrong.com.

  • Change your logins for credit/debit cards and banking. Use complex passwords with a combination of letters, symbols, and numbers. 

  • Be very cautious about emails you receive that look or sound suspicious. 

  • Report any fraud or identity theft to IdentityTheft.gov.

Can Quest Diagnostics Data Breach Cause Identity Theft?

quest breach

Yes, and it is highly likely that is what the data is being used for. Cybercriminals don’t need a lot to wage an identity theft campaign. Unfortunately, in the Quest Diagnostics data breach, they obtained everything they needed, including social security numbers, bank accounts, and credit card data. Be extremely watchful for any emails that appear to be coming from AMCA or Quest Diagnostics that ask you to verify your information or something of that nature. They could be related to the Quest Diagnostics hack incident and sent by hackers trying to get more information. 

What to Do to Protect Yourself Against Future Leaks

quest data breach

With more data breaches occurring in the news daily, it seems impossible to keep your private information safe. However, there are things you can do to minimize your exposure and protect yourself. 

  • Keep all your devices safe with antivirus software and run scans frequently.

  • Never give out any personal or payment information unless you initiated the action.

  • Always scan your monthly bank and credit card statements carefully looking for unauthorized transactions.

  • Change your online passwords often and use very complex hard-to-guess combinations.

  • Monitor your credit reports frequently and consider a credit freeze to keep things safe.

  • Use common sense when opening emails and never download any attachments or click on links. Go to the web address from a new browser page instead.

These days, you have to do all you can to keep your privacy intact and your personal details safe.

About the Author
IDStrong Logo

Related Articles

What is Data Leak and How to Prevent Accidental Data Leakage

Data breaches take many forms, and one of them is through data leak and accidental web exposure. M ... Read More

The Saga of T-Mobile Data Breach: 2013, 2015, 2021 and 2023 Hacks

T-Mobile has experienced a number of data breaches in the past decade. The first case occurred som ... Read More

Anthem Data Breach Exposed 78 Million Records

In the Anthem Data Breach of 2015, hackers were able to steal 78.8 million member’s records. ... Read More

Everything You Need to Know About Insider Data Breach

Data breaches are on the news frequently, but the average person doesn’t really know that mu ... Read More

The NSA Hack, How Did it Happen?

The National Security Agency (NSA) was the main attraction in a major data breach involving three ... Read More

Latest Articles

What is Single Sign-On: The Benefits and Importance of Implementing SSO

What is Single Sign-On: The Benefits and Importance of Implementing SSO

Every day, more people get online - most do it for leisure, but organizations are increasingly moving into the digital environment.

Personal vs Sensitive Personal Information (SPI): What’s the Difference

Personal vs Sensitive Personal Information (SPI): What’s the Difference

What is there to know about a person? Certainly, their name, but how about their affiliations, philosophical beliefs, or sexual orientation?

What Is An On-Path Attack and How Does It Work? 

What Is An On-Path Attack and How Does It Work? 

Suppose someone left their home, got in their car, and drove to the grocery store. Much like data packets that travel over Internet highways, the car will use various pathways to reach its destination; however, once the car gets to the store, a question remains: what happened between the generating point and the destination?

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close