Every organization should understand their own unique risk profile based on the impact to their organization of a breach, the vulnerabilities that exist within their unique portfolio of information assets and all reasonable threats that might exploit those vulnerabilities including insider threats.

The Ohio-based system says its call center was affected and customers are getting calls from individuals claiming to work for Kettering and seeking payment.