Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Let me ask you a question… let’s say that you’re about one year from your projected retirement, when a ransomware attack encrypts all of your files. What do you do? Pack it in and retire early? This is precisely the situation that the practitioners of Brookside ENT & Hearing Services of Battle Creek, Michigan, have found themselves in - and it may not be over yet.

What Happened to Brookside ENT?

Typical of a ransomware attack, the malware began by deleting and overwriting all of the practice’s data - every medical record, bill, and upcoming appointment. A duplicate of each file was left behind, locked behind a password that the person or persons responsible promised to provide in exchange for a $6,500 wire transfer.

Under the advisement of an “IT guy,” Dr. William Scalf and Michigan state senator Dr. John Bizon didn’t pay the ransom, as they couldn’t be sure that the password would even work, or that the ransomware wouldn’t return in the near future. As their IT resource determined that the attacker hadn’t actually viewed any of the records, this event technically didn’t need to be reported as a breach under the Health Insurance Portability and Accountability Act (HIPAA). Nevertheless, without access to this data, the physicians saw little choice than to retire early.

Well, kind of. As they had no means of knowing who had an appointment scheduled, the physicians had little choice than to wait around the office for a few weeks and see whomever showed up.

Why Throwing in the Towel May Not Be Enough

From a purely academic point of view, it only makes sense that the medical industry would be one targeted by ransomware. Not only do its establishments rely greatly on the data they have stored, there is an urgency to this reliance that cannot be denied. Think about the possible ramifications if a medical practitioner was unable to properly diagnose a patient and recommend treatment because of some unavailable data.

Of course, the strategy that Brookside ENT has adopted to close up shop doesn’t leave its owners off the hook, either. They could still find themselves in plenty of regulatory hot water.

For instance, a ransomware attack (paid or not) could be considered a reportable incident under HIPAA, or even an instigation of a negligence-based legal action. Any patient could invoke HIPAA rules if their data was in digital form and have an investigation started by the Department of Health and Human Services’ Office of Civil Rights, simply by leaving a complaint.

How You Can Protect Your Business from Ransomware

While the best way to keep your business safe is to be able to spot ransomware infection attempts before they successfully fool you into allowing them on your system, statistically, you aren’t going to be able to spot all of them… so what can you do?

One great resource you have available to you is your team. Each uneducated user offers ransomware another way in, but each educated user is another shield to help protect your business.

You should also develop and maintain a comprehensive backup plan to help protect your data from ransomware attacks and other attempts against it. While it would be ideal to not need to use this backup, it would be far less ideal to need one and not have it. Make sure that you keep your backup isolated from the rest of your network as well, so that your backup isn’t also encrypted by a ransomware attack.

At Telesys Voice and Data, we have plenty of experience in mitigating the damage that ransomware can cause, as well as in solving various other IT issues. For assistance with any of your business’ IT needs, reach out to us at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Wednesday, 24 July 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Productivity Business Hosted Solutions Microsoft Software Internet Network Security Computer IT Services Windows 10 Managed Service Provider Ransomware Productivity Backup Innovation Mobile Devices Smartphone Android Outsourced IT Data Backup Hardware User Tips Google Social Media Business Continuity Managed IT services Efficiency Data Recovery Browser Communication IT Support Data Workplace Tips Disaster Recovery Upgrade Cloud Computing Business Management Smartphones Data Management Small Business App Phishing Server Holiday Microsoft Office Managed IT Services Internet of Things Office Remote Monitoring Miscellaneous WiFi Office 365 Network Windows IT Support Facebook Save Money VoIP Paperless Office Encryption communications Spam Passwords Artificial Intelligence Gmail Big Data Tech Term Password Hosted Solution Recovery Customer Relationship Management Collaboration Employer-Employee Relationship Risk Management Unified Threat Management Bandwidth Firewall Apps Robot Remote Computing Money Work/Life Balance Downtime Infrastructure Wi-Fi Office Tips Chrome Document Management Tip of the week Analytics Vendor Management Apple Cybersecurity Avoiding Downtime Word Hacker Mobile Device Management Customer Service Compliance Operating System How To Content Filtering Saving Money Government Antivirus Business Growth SaaS Presentation Project Management BYOD Social Managed IT Business Technology Applications Data loss Website BDR Outlook Windows 10 Telephone Systems File Sharing Two-factor Authentication Settings Vulnerability Health Automation The Internet of Things Computers Data Security Alert Hacking Mobile Computing Printing Data storage Tech Support Computing Education IT Management Cybercrime Virtual Reality Training Mobile Device IT solutions Safety Remote Monitoring and Management Wireless Technology Tablet Upgrades Wireless Net Neutrality Automobile Budget Specifications Laptops Smart Technology End of Support Software as a Service Mouse HIPAA Router YouTube Unified Communications User Mobile Security Legal Display LiFi Retail Patch Management Scam Twitter Monitors Best Practice Politics Travel Lithium-ion battery Business Owner Identity Theft Google Drive Websites Physical Security Augmented Reality Going Green VPN Marketing Taxes IBM Running Cable Botnet Help Desk Virtual Private Network Assessment Samsung Competition Server Management Licensing Meetings Bring Your Own Device Managed Service Search Consultation Digital Payment Sports Storage Healthcare Information Technology IT service Maintenance Cortana Humor Virtualization Computer Care Administration Proactive Analyitcs Regulations Troubleshooting Management Fraud Error History Legislation WannaCry Cryptocurrency Knowledge Operations Social Networking Processor Data Breach DFW IT Service Time Management Enterprise Resource Planning Phone System Cabling Web Server Bitcoin Update Staffing WPA3 Experience Wearable Technology Employees Motherboard Technology Laws Network Management 3D Printing Mobile Internet Exlporer Administrator Lenovo Cameras VoIP Windows 8 Chromebook GPS Fleet Tracking Zero-Day Threat Domains Unified Threat Management Distributed Denial of Service Touchscreen Law Enforcement Google Maps Network Congestion Disaster Unsupported Software Company Culture 5G Entrepreneur Shortcut Backup and Disaster Recovery Superfish Technology Tips CCTV Digital Emoji Tracking Asset Tracking IT Technicians Application Users Modem Public Speaking business communications systems Managed IT Service Gadget Uninterrupted Power Supply Mobile Data iPhone Vulnerabilities Hacks Hotspot User Error Mirgation Procurement Comparison Spyware Remote Workers Cookies Internet Protocol Break Fix Printer Solid State Drive Geography Current Events Language Migration Hard Drives Remote Worker Networking Black Friday G Suite How To Processors Information Laptop Virtual Desktop Nanotechnology VoIP streamlines Dark Web Heating/Cooling Access Control Motion Sickness Hard Disk Drive Cables Computing Infrastructure Chatbots Refrigeration Virtual Assistant Cyber Monday Firefox Supercomputer Electronic Health Records Halloween Google Docs Writing IoT business network infrastructure PowerPoint Data Warehousing Servers SharePoint Deep Learning Personal Information Wires Fun Alerts Consumers Identity Voice over Internet Protocol Techology flu season IT Consultant IT Budget Cyberattacks Scary Stories Social Engineering Utility Computing data services Microsoft Excel Machine Learning Downloads Computer Repair Cooperation Mail Merge Undo Windows 7 Disaster Resistance Fort Worth Cleaning Notifications Bookmarks eWaste IP Address Blockchain Statistics Relocation Software Tips IT Sevices Multi-Factor Security Webcam Alt Codes Electronic Medical Records MSP Google Wallet Staff Address Manufacturing Proactive IT flu shot Crowdsourcing Favorites Dark Data Environment Cost Management Mobile Office Permissions Bluetooth Private Cloud Google Calendar Point of Sale Corporate Profile Typing Drones Flexibility Redundancy Proactive Maintenance IT Consulting Fort Worth IT Quick Tips Conferencing Buisness

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...
QR-Code