Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsGovernment: Federal, State and Local

Two Unique DHS Cyber Incidents Exposed 1M People’s Data

By Security Staff
Opened padlock on computer keyboard
Sasun Bughdaryan via Unsplash
January 21, 2026

Within two weeks of each other, the Department of Human Services (DHS) for two separate states have announced data security incidents. 

The first was revealed by the Illinois DHS, or IDHS, on Jan. 2, 2026, although the incident itself was discovered on Sep. 22, 2025. Maps created by the department’s Division of Family and Community Services’ Bureau of Planning and Evaluation were found to be publicly viewable in result of incorrect privacy settings. These were intended for internal use only. 

According to the IDHS, the data leak may impact the two following categories: 

  • Division of Rehabilitation Services (DRS) Customers: The data of approximately 32,401 individuals were impacted, involving information such as “names, addresses, case numbers, case status, referral source information, region and office information, and status as DRS recipients.” 
  • Medicaid and Medicare Savings Program Recipients: 672,616 individuals were estimated to be impacted, including “addresses, case numbers, demographic information, and the name of medical assistance plans (such as Medicaid, Medicare, etc.).” However, names were not exposed. 

In total, the IDHS data leak approximates 700,000 residents affected. 

At this time, IDHS is unable to identify who viewed the maps. Likewise, it is unknown if any personal information has been misused as a result of this exposure. 

The second DHS incident impacts residents of Minnesota. This incident was announced on Jan. 16, 2026 and directly impacted FEI Systems (FEI), the managing organization of one of the department’s systems (called MnCHOICES). FEI discovered the security event on Nov. 18, 2025, and reported its findings to the department the following day. 

According to a notice sent out by the department, “a user affiliated with a licensed health care provider accessed data in the MnCHOICES system without authorization. While FEI confirmed the user was authorized to access limited data in the system, the user accessed more data than was reasonably necessary to perform work assignments.” Exposed data includes “first name, last name, alternative names, address, email addresses, sex, date of birth, phone number, Medicaid ID, the last four digits of your social security number, ethnicity, race, birth record, physical traits, education, income, benefits, Medicaid information, financial eligibility, program eligibility, lock-in data, and spenddown data.” 

303,965 individuals’ were impacted by this event. In combination with the IDHS event, this totals approximately 1 million people affected. 

The exposure of such personally identifiable information (PII) could potentially leave people vulnerable to phishing schemes, social engineering attacks and other targeted cybercrimes. 

KEYWORDS: cyberattack data privacy data protection state government

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Top Tech Trends for 2026

Sizing Up Top Tech Trends and Priorities for 2026

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 29, 2026

Protecting Data Centers as National-Level Critical Infrastructure

Data centers have quietly become some of the most critical infrastructure around the globe — often as essential as power grids, financial networks and telecommunications. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Credit card and padlock

    5M unique credit and debit cards exposed in data breach

    See More
  • Green code

    Sensitive Intel Exposed: DHS Data Hub Accessible to Thousands

    See More
  • Adult holding infant hand

    1M Adoption Agency Records Exposed

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    ON DEMAND: What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing