Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Let me ask you a question… let’s say that you’re about one year from your projected retirement, when a ransomware attack encrypts all of your files. What do you do? Pack it in and retire early? This is precisely the situation that the practitioners of Brookside ENT & Hearing Services of Battle Creek, Michigan, have found themselves in - and it may not be over yet.

What Happened to Brookside ENT?

Typical of a ransomware attack, the malware began by deleting and overwriting all of the practice’s data - every medical record, bill, and upcoming appointment. A duplicate of each file was left behind, locked behind a password that the person or persons responsible promised to provide in exchange for a $6,500 wire transfer.

Under the advisement of an “IT guy,” Dr. William Scalf and Michigan state senator Dr. John Bizon didn’t pay the ransom, as they couldn’t be sure that the password would even work, or that the ransomware wouldn’t return in the near future. As their IT resource determined that the attacker hadn’t actually viewed any of the records, this event technically didn’t need to be reported as a breach under the Health Insurance Portability and Accountability Act (HIPAA). Nevertheless, without access to this data, the physicians saw little choice than to retire early.

Well, kind of. As they had no means of knowing who had an appointment scheduled, the physicians had little choice than to wait around the office for a few weeks and see whomever showed up.

Why Throwing in the Towel May Not Be Enough

From a purely academic point of view, it only makes sense that the medical industry would be one targeted by ransomware. Not only do its establishments rely greatly on the data they have stored, there is an urgency to this reliance that cannot be denied. Think about the possible ramifications if a medical practitioner was unable to properly diagnose a patient and recommend treatment because of some unavailable data.

Of course, the strategy that Brookside ENT has adopted to close up shop doesn’t leave its owners off the hook, either. They could still find themselves in plenty of regulatory hot water.

For instance, a ransomware attack (paid or not) could be considered a reportable incident under HIPAA, or even an instigation of a negligence-based legal action. Any patient could invoke HIPAA rules if their data was in digital form and have an investigation started by the Department of Health and Human Services’ Office of Civil Rights, simply by leaving a complaint.

How You Can Protect Your Business from Ransomware

While the best way to keep your business safe is to be able to spot ransomware infection attempts before they successfully fool you into allowing them on your system, statistically, you aren’t going to be able to spot all of them… so what can you do?

One great resource you have available to you is your team. Each uneducated user offers ransomware another way in, but each educated user is another shield to help protect your business.

You should also develop and maintain a comprehensive backup plan to help protect your data from ransomware attacks and other attempts against it. While it would be ideal to not need to use this backup, it would be far less ideal to need one and not have it. Make sure that you keep your backup isolated from the rest of your network as well, so that your backup isn’t also encrypted by a ransomware attack.

At Telesys Voice and Data, we have plenty of experience in mitigating the damage that ransomware can cause, as well as in solving various other IT issues. For assistance with any of your business’ IT needs, reach out to us at (800) 588-4430.


No comments yet
Already Registered? Login Here
Tuesday, 12 November 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Internet Network Security IT Services Computer Windows 10 Managed Service Provider Productivity Data Backup Backup Ransomware Innovation Mobile Devices Outsourced IT Business Continuity Android Smartphone Disaster Recovery Social Media Managed IT services Data Recovery Hardware Efficiency User Tips Google Workplace Tips Upgrade Data Browser Communication IT Support Small Business Business Management Cloud Computing IT Support Managed IT Services Data Management App Smartphones Holiday Microsoft Office Internet of Things Phishing Office Remote Monitoring Server Miscellaneous Windows Network Facebook Paperless Office communications Office 365 WiFi Artificial Intelligence Gmail Big Data Password Save Money Encryption Tech Term VoIP Spam Passwords Unified Threat Management Bandwidth Firewall Apps Robot Hosted Solution Saving Money Recovery Document Management Collaboration Cybersecurity Customer Relationship Management Employer-Employee Relationship Risk Management Apple Word Avoiding Downtime Hacker Customer Service Mobile Device Management How To Managed IT Infrastructure Content Filtering Government Operating System Money Windows 10 Remote Computing Work/Life Balance Downtime Tip of the week Wi-Fi Compliance Office Tips Analytics Vendor Management Chrome Going Green Computers Alert Health IT Management Printing Data storage Mobile Device Antivirus Hacking Computing Mobile Computing Redundancy Education Tech Support Project Management Data loss BDR Cybercrime Virtual Reality Training Business Technology SaaS BYOD Telephone Systems Social Presentation Website Business Growth Healthcare Managed Service Vulnerability Outlook File Sharing Help Desk Two-factor Authentication Settings Data Security Applications Automation The Internet of Things Software as a Service Physical Security Augmented Reality Best Practice HIPAA Router Taxes Maintenance Lithium-ion battery Business Owner IBM Running Cable Mobile Security Botnet Samsung Marketing Meetings Bring Your Own Device Search Laptops Sports Storage Tablet IT service Competition Cortana Virtualization Computer Care Access Control Administration Information Technology IT solutions Humor Safety Wireless Technology Upgrades Analyitcs Wireless Automobile Budget End of Support Patch Management Mouse YouTube Identity Theft Scam Unified Communications Specifications Regulations Windows 7 Legal Display LiFi Proactive VPN Twitter User Monitors Net Neutrality Politics Assessment Travel Server Management Licensing Remote Monitoring and Management Virtual Private Network Smart Technology Google Drive Retail Digital Payment Websites Consultation Motion Sickness Statistics Zero-Day Threat Software Tips WPA3 Refrigeration Mail Merge Distributed Denial of Service Proactive Maintenance Halloween Google Docs Writing Mobile Disaster Resistance data services Bluetooth Technology Tips Backup and Disaster Recovery Deep Learning Personal Information Fun Fleet Tracking IT Technicians Modem IT Consultant Address Managed IT Service Processor Corporate Profile Scary Stories Social Engineering Company Culture Proactive IT Hotspot Machine Learning Quick Tips User Error Mirgation Comparison RMM Computer Repair History PowerPoint Asset Tracking Undo Cookies Cleaning Break Fix Notifications WannaCry Time Management Printer Consumers IP Address Vulnerabilities IT Consulting Language Relocation Migration Webcam Mobility Black Friday Procurement Alt Codes Electronic Medical Records Cabling Google Wallet Remote Workers Staffing Nanotechnology Dark Web Active Directory Crowdsourcing Dark Data Network Management Mobile Office Geography Data Breach Computing Infrastructure Private Cloud Chatbots Point of Sale Cyber Monday Remote Worker Typing eWaste Drones Information GPS IT Sevices IoT Data Warehousing Windows Server VoIP Buisness Touchscreen SharePoint Google Maps Cables Technology Laws Alerts Error Identity flu season Professional Services Cryptocurrency Disaster Environment Knowledge Monitoring Tracking Utility Computing Lenovo Microsoft Excel User Management Digital Downloads Wires Unified Threat Management Cooperation Web Server Shortcut Fort Worth Virtual Assistant Bitcoin Update Uninterrupted Power Supply Troubleshooting Experience Electronic Health Records Superfish Blockchain Batteries Spyware Administrator Multi-Factor Security Bookmarks 3D Printing business communications systems Staff Cameras flu shot Voice over Internet Protocol Windows 8 Chromebook Solid State Drive Phone System Cyberattacks Network Congestion Domains Cost Management Permissions Remote Work Law Enforcement How To Heating/Cooling Google Calendar Favorites Unsupported Software 5G MSP Entrepreneur Internet Protocol Flexibility Application CCTV Fort Worth IT Emoji Hard Disk Drive Users Supercomputer Public Speaking Recycling Networking Fraud File Management Gadget Firefox Servers Legislation Conferencing Mobile Data Hacks VoIP streamlines Operations Social Networking DFW IT Service Manufacturing IT Budget Management Telephone Employees Current Events business network infrastructure Wearable Technology Hard Drives Motherboard G Suite Gadgets Processors iPhone Laptop Virtual Desktop Enterprise Resource Planning Techology Internet Exlporer Mobile VoIP

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...