Beta Site

Subject to frequent updates

For free live help: 888-400-5530


Austin Manual Therapy Associates (2017) We Calculated the Austin Manual Therapy Associates Breach Clarity Score using our patent-pending algorithm. The results are based on an analysis of 1,000+ data points. Each Breach Clarity Score is packaged with a set of most-likely risks and action steps based on the specific data breach searched. Each data breach is different in terms of the amount and type of data compromised, which means each carries a unique risk profile. Breach Clarity recommends the most important actions you should take for this particular data breach.

Medical ID theft New financial credit account Up to 9 more fraud or privacy risks
Breach Clarity Score: Breach Clarity's algorithms dynamically compute a high-level simplified estimated risk rating for all publicly-reported US data breaches. (We currently have the last 29 months of breaches in the database maintained by the ITRC, with more being added daily). Estimated risk scores are based on how impactful the 'likely exposed ID records' are projected to be on 11 possible categories of identity crimes (such as the top two risks calculated and displayed for this breach below). Breach Clarity's algorithm design and values are based on our ongoing research of fraud mitigation professionals and practices.
out of 10
Top Risks:
Medical ID theft Medical accounts can be accessed by identity criminals to obtain cost-saving or even life-saving treatment, obtain prescriptions for personal use or profit, or violate one's privacy. While generally less common, ‘medical ID fraud’ can create substantial out-of-pocket costs.
New financial credit account ID criminals use information such as SSNs to open new financial accounts at banks, payments, investment, or lenders , and then 'cash out' with fraudulent payments.These crimes can go undetected for significant time, extending losses.
Up to 9 more fraud or privacy risks Breach Clarity is capable of computing up to 10 total identity risks, including Medical ID theft, New financial credit account, New financial deposit account, Tax refund identity theft, Government documents/benefits, Evading the law, Existing financial acct. (not credit card), Existing credit card account, Employment or wage-related, Phone or utilities, and Other existing account misuse
  • Health acct login or personal details
  • Name
  • Date of birth
  • Health provider acct #
  • Drivers license or state ID
  • Health insurance # or login
  • Home address current
  • Social Security #, full
  • Phone account #
9 of 9 likely exposed records listed

Prioritize These Actions:

Change affected/similar passwords If your account credentials were exposed it's essential to change them right away, with both the breached entity and also everywhere else you use the same password. Criminals use a method called ‘credential stuffing’ to ‘stuff’ account names and passwords exposed in one account–for example a social media site–and then try them out at financial institutions or other sites where they can steal your money. Always select passwords unique to each account, 8 or more characters long, with a combination of numbers, UPPER and lower case letters, and at least one [email protected] character. A password manager is a great way to avoid keeping a list of your passwords from prying eyes, which is always essential.
Get free credit reports You’re entitled to one free credit report from each of the three top bureaus per year–and possibly more depending on what financial provider(s) you use. Monitoring these regularly can spot potential fraudulent opening of new accounts or even misuse of an account that you haven’t used in awhile.
Beware of social engineering When your contact information is exposed–such as a phone number and either email or street address–it’s more likely that you’ll be contacted by identity criminals who will pretend to be a trusted authority in order to obtain even more private data–all in order to commit costly identity fraud.
  • 10+ additional action steps
  • 2-9 additional risks
  • Integrate multiple breaches
  • Integrate breach-finding and dark web monitoring
  • More financial tools and service integrations
  • Recommended commercial protection service features