Cybersecurity is a growing concern within the health care industry. There’s one attack in particular that’s doing a sizable amount of damage. It’s ransomware—and depending on the size of the targeted company, which data or systems are affected, and whether or not backups are available—which can cost a health care organization anywhere from $700K and $1.5 million. Beyond the financial burden, ransomware can damage a company’s reputation, or worse, adversely impact patient care by interfering with access to life-saving medical information.
Surely you’ve experienced annoying pop-up ads redirecting you to other websites. Ransomware operates in similar ways. The simple act of clicking the wrong link or downloading the wrong attachment, can infect the computer by invisibly installing ransomware on the operating system. Once installed, it holds the data/system “hostage” by preventing access. Then, it demands payment to regain access – hence the term “ransomware.”
88 percent of ransomware attacks target hospitals. Consider an administrator or caregiver using a shared information system to access patient data, when a pop-up notification appears stating that the employee broke the law. The alert continues, citing that a fine must be paid to regain access. Because the information is on a shared patient health care network—something many hospitals utilize with employees—a single click on the wrong link can infect the entire network, locking out all employees on that workstation, and potentially the whole system.
There are two types of ransomware, Locker and Crypto. Locker-ransomware locks access to all systems preventing users from obtaining any information or performing any tasks on those computers that are networked to the targeted system. A screen message—the ransom note—is displayed on all desktops stating that all data and system access are locked, and payment is required to regain access. Presently, the most common form of ransomware is crypto-ransomware. Crypto targets specific files and data systems, then encrypts them. It leaves ransom notes throughout the system demanding payment for the key that will decrypt or unlock the needed files.
Because ransomware blocks access to data, it often serves the more nefarious intent of stealing sensitive data. Even if payment is received, many times the hackers won’t restore systems right away. They may also try to extort more money if they know the victim is willing to pay.
The best way to fight ransomware is to develop and implement a holistic plan involving people, process and technology. Proper preparation and management on the front-end prevents attacks from happening, saving time, money, and possibly, lives.
All three of these things—people, process, and technology—must also undergo routine, mandatory testing to be sure systems and plans function as designed and that employees are up-to-date on education and training.
If you're worried about being vulnerable to an attack, reach out to us, the experts. We'll make sure your data is secure.
By Steve Unger
Published with permission from http://blog.techdata.com/authority