Advertisement
Advertisement
092716_CTBLocker
ATD Blog

How to Protect Your Healthcare Brand From a Ransomware Attack

Wednesday, September 28, 2016
Advertisement

This is the last image you ever want to see on your desktop. Unfortunately, this is usually just the beginning. 

Simply clicking on a malicious link or file sent to you in an email has the potential for disastrous consequences that start with this screenshot. A new Cisco report suggests that despite efforts to improve cybersecurity at many organizations, ransomware is still one of the top threats to companies because of their reliance on aging infrastructure and complex environments, which leaves them at risk. 

Why You Need to Be Aware 

Ransomware is a cash cow for cybercriminals and is becoming an area of concentrated focus. Once a cybercriminal hacks into a company's files and encrypts them, the victim company—if poorly prepared—has little recourse but to pay the ransom.  

What’s even more alarming is that cybercriminals know whom to target: hospitals. The healthcare industry is particularly at risk for cyber-attacks due to antiquated or misconfigured computer security systems and the amount of sensitive data they control. Right now these criminals target hospitals only to encrypt files (thereby making them unusable) and extract a ransom.  

This action, while painful and costly, doesn’t actually modify patient records or release them to the public. What it does do is completely shut down a hospital system and force it to turn to paper records—a nightmare scenario considering how far the industry has come to adopt an all-electronic healthcare environment. 

Advertisement

Role of Talent and Training 

The diverse type of workforce at most hospitals represents another vulnerability for ransomware, because it can often impede the cybersecurity safety training process. Doctors, nurses, and medical technicians, as well as professional staff including accountants and HR officials, all work in the same environment yet have very different roles and responsibilities. 

Known as spear phishing, cybersecurity breaches in these settings are most frequently perpetrated through emails sent to targeted employees with attachments with names such as "updated patient list," "billing codes," or other typical medical communications that have a high likelihood of being opened without due diligence. 

Advertisement

What Should Companies Do? 

  1. Improve network hygiene. Upgrade aging infrastructure to limit vulnerabilities. Diversify your backup capabilities (cloud and physical). 
  2. Educate employees. You are only as strong as your weakest link. Humans factor into this equation, so educate them on good security practices and common attack methods, such as phishing attacks. 
  3. Have a Plan. Plan for the worst, hope for the best. Just like fire drills, practice makes perfect. HITRUST’s CyberRX exercises are a good resource if you’re looking to run mock cyber drills with employees. 
  4. Don’t forget whom you are working for. Healthcare providers and staff work for the patients, and their health and safety comes first. Properly investing in healthcare security ensures that it is delivered across the continuum of care.  

If you do find yourself the victim of ransomware and facing a ransomware demand, my advice is don’t pay. Unless access to the files are mission critical or backups are somehow corrupted, each payment to cybercriminals perpetuates this unlawful business and ensures that others will also become victims. While some may think that paying the ransom for a few encrypted computers is low compared with investing in the infrastructure necessary to protect against these attacks, try explaining that to patients whose quality of care has suffered as a result of a cyber-attack and see how your healthcare company’s brand is viewed afterwards. 

Want to learn more about the role of talent in cybersecurity in the field of healthcare? Join me November 13-14 in San Antonio at the ATD Healthcare Executive Summit.

About the Author

Carl A. Anderson, vice president at Van Scoyoc Associates, has spent more than 12 years in the federal government and on Capitol Hill. He specializes in communications and information technology, healthcare policy, cyber security, and energy policy. He served as a counsel on the House Committee on Energy and Commerce, tackling several high profile investigations and examining the growing areas of cyber threats and cybersecurity.  Carl previously served at the U.S. Department of Justice (DOJ) in the Office of Justice Programs where he managed internal investigations and litigation, and responded to congressional requests and investigations. He was also selected into the Attorney General’s Honors Program, served in the Civil Rights Division at the DOJ, and was appointed as a Special Assistant U.S. Attorney in the District of Columbia.  Carl graduated from Virginia Tech with a BA in political science and received a JD from the Columbus School of Law at the Catholic University of America. He has been admitted to practice law in the District of Columbia.

Be the first to comment
Sign In to Post a Comment
Sorry! Something went wrong on our end. Please try again later.