Get Started Today!  321-259-5500

croom new

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Let me ask you a question… let’s say that you’re about one year from your projected retirement, when a ransomware attack encrypts all of your files. What do you do? Pack it in and retire early? This is precisely the situation that the practitioners of Brookside ENT & Hearing Services of Battle Creek, Michigan, have found themselves in - and it may not be over yet.

What Happened to Brookside ENT?

Typical of a ransomware attack, the malware began by deleting and overwriting all of the practice’s data - every medical record, bill, and upcoming appointment. A duplicate of each file was left behind, locked behind a password that the person or persons responsible promised to provide in exchange for a $6,500 wire transfer.

Under the advisement of an “IT guy,” Dr. William Scalf and Michigan state senator Dr. John Bizon didn’t pay the ransom, as they couldn’t be sure that the password would even work, or that the ransomware wouldn’t return in the near future. As their IT resource determined that the attacker hadn’t actually viewed any of the records, this event technically didn’t need to be reported as a breach under the Health Insurance Portability and Accountability Act (HIPAA). Nevertheless, without access to this data, the physicians saw little choice than to retire early.

Well, kind of. As they had no means of knowing who had an appointment scheduled, the physicians had little choice than to wait around the office for a few weeks and see whomever showed up.

Why Throwing in the Towel May Not Be Enough

From a purely academic point of view, it only makes sense that the medical industry would be one targeted by ransomware. Not only do its establishments rely greatly on the data they have stored, there is an urgency to this reliance that cannot be denied. Think about the possible ramifications if a medical practitioner was unable to properly diagnose a patient and recommend treatment because of some unavailable data.

Of course, the strategy that Brookside ENT has adopted to close up shop doesn’t leave its owners off the hook, either. They could still find themselves in plenty of regulatory hot water.

For instance, a ransomware attack (paid or not) could be considered a reportable incident under HIPAA, or even an instigation of a negligence-based legal action. Any patient could invoke HIPAA rules if their data was in digital form and have an investigation started by the Department of Health and Human Services’ Office of Civil Rights, simply by leaving a complaint.

How You Can Protect Your Business from Ransomware

While the best way to keep your business safe is to be able to spot ransomware infection attempts before they successfully fool you into allowing them on your system, statistically, you aren’t going to be able to spot all of them… so what can you do?

One great resource you have available to you is your team. Each uneducated user offers ransomware another way in, but each educated user is another shield to help protect your business.

You should also develop and maintain a comprehensive backup plan to help protect your data from ransomware attacks and other attempts against it. While it would be ideal to not need to use this backup, it would be far less ideal to need one and not have it. Make sure that you keep your backup isolated from the rest of your network as well, so that your backup isn’t also encrypted by a ransomware attack.

At TotalCareIT™, we have plenty of experience in mitigating the damage that ransomware can cause, as well as in solving various other IT issues. For assistance with any of your business’ IT needs, reach out to us at 321-259-5500.

How to Plan Your Data Storage Needs
Taking a Look at a Manufacturer’s IT
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!

 

Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Business Malware Hosted Solutions Internet Email IT Services Productivity Network Security Data Computer Productivity Backup Mobile Devices Microsoft Software Hardware Ransomware Google Workplace Tips User Tips Efficiency Managed Service Provider Windows 10 Tech Term Android Smartphone Innovation Business Continuity Server Disaster Recovery Small Business Cloud Computing Communication Business Management Smartphones Upgrade IT Support Data Management IT Support Social Media Encryption Browser Managed IT Services Data Backup Network App Phishing BYOD Outsourced IT Office 365 Data Recovery Facebook Paperless Office Windows Artificial Intelligence Windows 10 Big Data Passwords Employer-Employee Relationship Gmail Office Internet of Things Collaboration Apps Holiday Government Mobile Device Management Vendor Management VoIP Save Money Remote Monitoring Managed IT Services Microsoft Office Hosted Solution WiFi communications Virtualization Firewall Wireless Technology Spam Risk Management Alert Recovery Wireless Cybersecurity Vulnerability Wi-Fi Saving Money Robot Chrome Two-factor Authentication Office Tips Miscellaneous How To Password Tip of the week Word Managed Service Mobile Device IT solutions Budget Content Filtering Avoiding Downtime Bandwidth Scam Work/Life Balance Analytics Website Hacker Money Customer Service Automation Document Management IT Management VPN Business Technology Settings Social Quick Tips Antivirus Infrastructure Politics Tech Support SaaS Downtime The Internet of Things Information Maintenance Twitter Remote Computing Cybercrime Healthcare Blockchain Storage Customer Relationship Management Going Green Unified Threat Management Machine Learning Education Compliance Tablet Bring Your Own Device Applications IT service BDR Data storage Virtual Reality Hard Drives Computing Apple Legal File Sharing G Suite Router Outlook Health Point of Sale Presentation Cortana Safety Taxes Upgrades Websites Telephone Systems YouTube IBM Operating System Electronic Medical Records Augmented Reality Net Neutrality Physical Security Unified Communications Cost Management How To Botnet Virtual Desktop Automobile Chromebook Lithium-ion battery Server Management Google Drive Solid State Drive Gadgets Monitors User Error Network Management Hacking Patch Management LiFi Access Control HIPAA Business Owner Networking Sports Users Management Business Intelligence Competition Data loss Samsung Printing User Computers Computer Care Administration Best Practice Data Security Running Cable Regulations Mouse eWaste Mobile Security Search Identity Theft Virtual Private Network End of Support Training Private Cloud Heating/Cooling Cooperation Spyware Black Friday Managing Stress Permission Co-managed IT Save Time Google Maps Environment Lenovo Hotspot Features Laptop Alt Codes Refrigeration Hard Drive Authorization OneDrive Retail Crowdsourcing Information Technology Supercomputer Mail Merge Microsoft Excel Wasting Time Multi-Factor Security Mirgation Voice over Internet Protocol Network Congestion Trending Staffing VoIP Dark Web Security Cameras Travel Disaster Unified Threat Management Staff Connectivity Bookmarks Analyitcs Cyber Monday Enterprise Content Management Test Error Superfish Language Modem Humor Update Halloween Typing Cache Employees Manufacturing Social Engineering Google Wallet IT Budget Servers Address Monitoring Identities Web Server Corporate Profile iPhone Google Calendar Chatbots Windows 7 Display Processors CIO Current Events GPS Time Management Shortcut ROI Motion Sickness Uninterrupted Power Supply Printer Wearable Technology IoT Favorites IT Consultant Marketing Smart Technology Vulnerabilities RMM 3D Printing Troubleshooting Computing Infrastructure Cookies Electronic Health Records Scary Stories Cryptocurrency Legislation Identity Recycling Remote Monitoring and Management Hard Disk Drives Drones Digital Payment Permissions Consulting Managed IT Mobile Computing Application Fun Cameras WannaCry Tracking FCC OneNote Notes Knowledge Hard Disk Drive Star Wars Instant Messaging Bitcoin Cleaning Firefox Statistics Distributed Denial of Service Development Tech Terms Unsupported Software Administrator Alerts Nanotechnology Files Dark Data Emoji Comparison Zero-Day Threat Solid State Drives Law Enforcement Entrepreneur Fraud Managed Services Provider Google Docs Help Desk CCTV Finance Teamwork Touchscreen Title II Employee-Employer Relationship PowerPoint Backups Personal Information Experience Law Meetings SharePoint Assessment Windows 8 Undo Bluetooth Managed IT Service Cables Theft Mobile Data Relocation IP Address Cabling Licensing Screen Reader Read Only Specifications Social Networking Company Culture Human Error Gadget Motherboard E-Commerce Business Growth Digital Internet Exlporer Authentication Shared resources Writing Notifications Public Speaking Online Remote Workers Professional Services Computer Repair Deep Learning 5G Webcam Downloads IT Technicians Black Market Buisness Hacks Break Fix Wires Financial Hiring/Firing Mobile Office Techology Smart Tech Printers Database CrashOverride Regulation Students Emergency Domains USB Wireless Internet Flexibility

      Latest Blog Entry

      Subscription-based solutions are quite popular these days, and Microsoft Office 365 is perhaps one of the most important ones on the market. However, the services provided by Office 365 are contingent upon successfully renewing the subscription, making it critical that the u...

      Account Login