Ransomware Can Put Healthcare Providers – And Patients – in Critical Condition

0

A healthcare organization can find itself in critical condition if attacked by ransomware — a type of malware that prevents or limits users from accessing their files unless a ransom is paid.

Verizon’s 2018 Data Breach Investigations Report discovered that ransomware accounts for 85 percent of all malware targeting the healthcare industry. Ransomware attacks have been numerous in hospitals and other health facilities recently, and the consequences can be dire for providers and patients, who are denied access to their files and cannot receive the care they need.

“Many healthcare offices are not prepared to combat cyber attacks,” says Alex Zlatin, CEO of Maxim Software Systems and author of Responsible Dental Ownership (alexzlatin.com). “It can be a life-or-death situation if they can’t access data. So, they are more likely to pay up.

“Healthcare organizations are prime targets because of all the patients’ personal information they have to offer cyber criminals. It’s imperative they get up to speed on how to prevent such a nightmare scenario and know how to deal with a ransomware attack quickly.”

Zlatin offers ways for healthcare organizations to prevent or reduce the risks of ransomware attacks, and how they should respond if infected:

If attacked by ransomware

  • Isolate the infected computer immediately. “Infected systems should be removed from the network as soon as possible to prevent ransomware from attacking network or shared drives,” Zlatin says.
  • Isolate or power-off affected devices. Those devices that have not been completely corrupted should shut down or be isolated. Zlatin says this can provide time to recover data and contain the damage.
  • Secure backup data or systems by taking them offline. “You’ll want to ensure backups are free of malware before using them to restore inaccessible data,” Zlatin says.
  • Change online account passwords and network passwords. “After removing the system from the network, do this, and change all system passwords once the malware is removed,” Zlatin says.

To prevent attacks and mitigate risks

  • Train employees on cyber hygiene. “This is a healthcare organization’s best defense against ransomware,” Zlatin says. “Cyber hygiene is not putting yourself in a situation where you’re surrounded by malicious links — like surfing the internet for personal reasons, opening emails from unfamiliar sources, going on Facebook or checking your Twitter feed from a workstation.”
  • Keep all systems secure. To remain compliant with HIPPA regulations in the U.S. and Canadian ones like PIPEDA, PHIPA and Alberta’s IHA, all systems that contain protected health information are required to stay up to date. “To protect against a ransomware threat, a similar approach must be taken so that all systems are secured against any potential vulnerabilities,” Zlatin says.
  • Monitor network traffic and file access. “Data breaches can be discovered by monitoring for unusual behavior within the systems,” Zlatin says. “Detecting outbound connections can pinpoint the location of an infection.”
  • Back up all data. “If some or all of a system’s files get encrypted, restoring the files from a backup is the only recovery option,” Zlatin says. “Making sure that the backup restores properly is as important as having a backup from the get-go.”
  • Adopt additional protection. “Ransomware sometimes goes undetected by many antivirus tools,” Zlatin says, “and IT departments must apply safeguards to block suspicious emails and deploy additional filters that block potential harmful sites,” Zlatin says.

“Providers can’t just hope an attack doesn’t happen to them,” Zlatin says. “They must do everything they can to prevent it.”

About Alex Zlatin

Alex Zlatin, author of the book Responsible Dental Ownership (alexzlatin.com), had more than 10 years of management experience before he accepted the position of CEO of dental practice management company Maxim Software Systems. He earned his MBA at Edinburgh Business School and a B.Sc. in Technology Management at HIT in Israel.