Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Let me ask you a question… let’s say that you’re about one year from your projected retirement, when a ransomware attack encrypts all of your files. What do you do? Pack it in and retire early? This is precisely the situation that the practitioners of Brookside ENT & Hearing Services of Battle Creek, Michigan, have found themselves in - and it may not be over yet.

What Happened to Brookside ENT?

Typical of a ransomware attack, the malware began by deleting and overwriting all of the practice’s data - every medical record, bill, and upcoming appointment. A duplicate of each file was left behind, locked behind a password that the person or persons responsible promised to provide in exchange for a $6,500 wire transfer.

Under the advisement of an “IT guy,” Dr. William Scalf and Michigan state senator Dr. John Bizon didn’t pay the ransom, as they couldn’t be sure that the password would even work, or that the ransomware wouldn’t return in the near future. As their IT resource determined that the attacker hadn’t actually viewed any of the records, this event technically didn’t need to be reported as a breach under the Health Insurance Portability and Accountability Act (HIPAA). Nevertheless, without access to this data, the physicians saw little choice than to retire early.

Well, kind of. As they had no means of knowing who had an appointment scheduled, the physicians had little choice than to wait around the office for a few weeks and see whomever showed up.

Why Throwing in the Towel May Not Be Enough

From a purely academic point of view, it only makes sense that the medical industry would be one targeted by ransomware. Not only do its establishments rely greatly on the data they have stored, there is an urgency to this reliance that cannot be denied. Think about the possible ramifications if a medical practitioner was unable to properly diagnose a patient and recommend treatment because of some unavailable data.

Of course, the strategy that Brookside ENT has adopted to close up shop doesn’t leave its owners off the hook, either. They could still find themselves in plenty of regulatory hot water.

For instance, a ransomware attack (paid or not) could be considered a reportable incident under HIPAA, or even an instigation of a negligence-based legal action. Any patient could invoke HIPAA rules if their data was in digital form and have an investigation started by the Department of Health and Human Services’ Office of Civil Rights, simply by leaving a complaint.

How You Can Protect Your Business from Ransomware

While the best way to keep your business safe is to be able to spot ransomware infection attempts before they successfully fool you into allowing them on your system, statistically, you aren’t going to be able to spot all of them… so what can you do?

One great resource you have available to you is your team. Each uneducated user offers ransomware another way in, but each educated user is another shield to help protect your business.

You should also develop and maintain a comprehensive backup plan to help protect your data from ransomware attacks and other attempts against it. While it would be ideal to not need to use this backup, it would be far less ideal to need one and not have it. Make sure that you keep your backup isolated from the rest of your network as well, so that your backup isn’t also encrypted by a ransomware attack.

At Telesys Voice and Data, we have plenty of experience in mitigating the damage that ransomware can cause, as well as in solving various other IT issues. For assistance with any of your business’ IT needs, reach out to us at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Wednesday, 22 May 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Microsoft Hosted Solutions Internet Software Network Security IT Services Windows 10 Managed Service Provider Backup Ransomware Computer Innovation Mobile Devices Android Smartphone Productivity Social Media Managed IT services Hardware User Tips Google Outsourced IT Data Backup Business Continuity Efficiency Browser Communication IT Support Disaster Recovery Workplace Tips Data Recovery Data Upgrade Business Management Smartphones Small Business Cloud Computing App Data Management Office Remote Monitoring Managed IT Services Internet of Things Holiday Microsoft Office Server Office 365 IT Support Windows Miscellaneous WiFi Facebook Network Phishing Encryption Password Artificial Intelligence Save Money Paperless Office Tech Term Spam Gmail Big Data Passwords Hosted Solution Recovery communications Unified Threat Management Employer-Employee Relationship Risk Management VoIP Robot Customer Relationship Management Bandwidth Firewall Apps Infrastructure Customer Service Wi-Fi Mobile Device Management Office Tips Document Management Tip of the week Saving Money Cybersecurity Remote Computing Analytics How To Government Money Word Compliance Work/Life Balance Hacker Chrome Collaboration Content Filtering Apple Avoiding Downtime Vendor Management Hacking Social Automation Mobile Computing Alert Downtime Tech Support Website Printing Windows 10 Telephone Systems Data storage Computing Operating System Vulnerability Two-factor Authentication Settings Presentation Data Security Business Growth Virtual Reality The Internet of Things Computers SaaS BYOD Outlook IT Management Education Mobile Device Antivirus Project Management Cybercrime Applications Health File Sharing Managed IT Business Technology Data loss BDR Router Google Drive Wireless Technology Websites Mobile Security Wireless Going Green Physical Security Competition Taxes Botnet Samsung YouTube Information Technology Patch Management Unified Communications Scam Meetings Humor Storage Identity Theft LiFi Analyitcs VPN Computer Care Help Desk Virtual Private Network Training Assessment Augmented Reality Specifications Server Management Licensing Healthcare IBM Running Cable Digital Payment Automobile Upgrades Budget User End of Support Maintenance Proactive Bring Your Own Device Search Sports Mouse Regulations Retail IT service Remote Monitoring and Management Cortana Legal Best Practice Virtualization Lithium-ion battery Net Neutrality Administration Tablet Business Owner Twitter Smart Technology Politics IT solutions Monitors Safety Software as a Service Travel HIPAA Marketing Processors Distributed Denial of Service PowerPoint G Suite GPS Company Culture Virtual Assistant Lenovo VoIP Unified Threat Management Technology Tips Experience Touchscreen Google Maps Asset Tracking Motion Sickness IT Technicians Bitcoin Consumers Modem Managed IT Service Google Docs Shortcut Disaster Digital Tracking Vulnerabilities Hotspot Writing Voice over Internet Protocol Superfish User Error business communications systems Comparison Remote Workers Mirgation Windows 8 Personal Information Cookies eWaste Break Fix Domains Uninterrupted Power Supply IT Consultant Spyware Entrepreneur Geography Machine Learning Language Social Engineering Manufacturing Printer 5G IT Sevices Internet Protocol Black Friday Application Information Migration Computer Repair Nanotechnology Notifications Environment Dark Web Users Public Speaking Solid State Drive Cleaning How To Cables Relocation Computing Infrastructure Networking Access Control VoIP streamlines Cyber Monday Google Wallet Heating/Cooling Electronic Health Records Webcam Chatbots Electronic Medical Records IoT Crowdsourcing Troubleshooting Data Warehousing Dark Data Hard Disk Drive Firefox Supercomputer Wires Private Cloud Alerts SharePoint business network infrastructure flu season Laptop Drones Servers Hard Drives Cyberattacks Point of Sale Identity Utility Computing Microsoft Excel Virtual Desktop Phone System IT Budget Managed Service Error Cooperation Techology Downloads data services Fort Worth Halloween Refrigeration Bookmarks Blockchain Employees Mail Merge Consultation MSP Staff Deep Learning Disaster Resistance Multi-Factor Security Fun Update flu shot Scary Stories Statistics Software Tips Favorites Web Server Cost Management Permissions Zero-Day Threat Address Administrator Flexibility 3D Printing Proactive IT Google Calendar Chromebook Fort Worth IT Bluetooth Undo Conferencing Cameras Management Law Enforcement iPhone Fraud Network Congestion Backup and Disaster Recovery Redundancy IP Address Corporate Profile Quick Tips Operations Alt Codes Unsupported Software IT Consulting Legislation Social Networking Emoji DFW IT Service History CCTV Enterprise Resource Planning Gadget Display Procurement Mobile Office WannaCry Hacks Time Management WPA3 Wearable Technology Typing Mobile Data Data Breach Motherboard Buisness Cabling Staffing Mobile Internet Exlporer Remote Worker Knowledge Current Events Network Management Fleet Tracking Cryptocurrency Technology Laws

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...
QR-Code