Windows 7 End-of-life In case you are unaware -- Windows 7 is coming to an end. Microsoft has planned for this for a long time. However, most users have not it seems. According to web analytics vendor, Net Applications, Windows 7 actually saw its user share increase...read more
In recent months, hackers have begun targeting doctors offices and hospitals, receiving roughly 34% of all ransomware attacks. In an unprecedented incident, it just cost two doctors their practice.
Last month, the offices of Brookside ENT in Battle Creek, Michigan, experienced a ransomware attack. The hackers encrypted patient information and demanded a ransom in exchange for a password to decode the information.
Drs William Scalf and John Bizon decided not to pay the ransom.
The hackers then proceeded to delete all medical records for the patients. The doctors had no record of anything from appointments to surgery results.
Some who had just undergone surgery are having difficulty receiving follow up care because there is simply no record of their surgery.
And because there is no patient schedule the doctors have to wait at their practice for someone to show up. There isn’t even a way to call and inform their patients as there are no phone numbers on record.
Rather than try to rebuild their practice from scratch, Brookside ENT will permanently shut their doors on April 30th, 2019.
It could have been worse.
If the hackers would have been able to view the information, not only would that have resulted in a HIPAA violation on the part of the doctors but it also would have compromised the identity security of all the affected patients.
What other practices can learn
Protect Your Email
91% of all malware originates in an email. Because each email account is a potential vulnerability, it’s important to employ a spam filter as well as provide training to your employees on identifying threats.
“…Education about the risks and preparedness are as important as IT security measures for protecting individuals and assets from cyber attacks,” said Katherine Keefe, Beazley Breach Response Services Head in response to the Brookside Ransomware attack.
Use Endpoint Malware Security
In the event of a ransomware attack, endpoint malware security can block lateral movement. This isolates the attack to a single device rather than encrypting every device on a network.
Endpoint security can also block the ransomware’s download of encryption keys.
Small Business, Big Target
Repeatedly, hackers are targeting small business because they are viewed as easy targets.
This doesn’t have to be the case for your business. ITonDemand offers affordable and scalable IT solutions to partner in the prevention of these types of attacks.
Download our infographic and learn how to identify a phishing scam when you see one.
Other Articles You Might Be Interested In:
How to identify if an email is a phishing attack 91% of all cyber attacks are delivered through an email. A company of 5,000 employees will receive an estimated 14,400 malicious emails per year. It’s not abnormal to receive phishing emails. It’s only dangerous if you...read more
ITonDemand was created over a decade ago to help support businesses and organizations IT services. We kept hearing from businesses, like yours, that they just wanted their IT to work. And that is what we do. We make your IT work for you.