Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Let me ask you a question… let’s say that you’re about one year from your projected retirement, when a ransomware attack encrypts all of your files. What do you do? Pack it in and retire early? This is precisely the situation that the practitioners of Brookside ENT & Hearing Services of Battle Creek, Michigan, have found themselves in - and it may not be over yet.

What Happened to Brookside ENT?

Typical of a ransomware attack, the malware began by deleting and overwriting all of the practice’s data - every medical record, bill, and upcoming appointment. A duplicate of each file was left behind, locked behind a password that the person or persons responsible promised to provide in exchange for a $6,500 wire transfer.

Under the advisement of an “IT guy,” Dr. William Scalf and Michigan state senator Dr. John Bizon didn’t pay the ransom, as they couldn’t be sure that the password would even work, or that the ransomware wouldn’t return in the near future. As their IT resource determined that the attacker hadn’t actually viewed any of the records, this event technically didn’t need to be reported as a breach under the Health Insurance Portability and Accountability Act (HIPAA). Nevertheless, without access to this data, the physicians saw little choice than to retire early.

Well, kind of. As they had no means of knowing who had an appointment scheduled, the physicians had little choice than to wait around the office for a few weeks and see whomever showed up.

Why Throwing in the Towel May Not Be Enough

From a purely academic point of view, it only makes sense that the medical industry would be one targeted by ransomware. Not only do its establishments rely greatly on the data they have stored, there is an urgency to this reliance that cannot be denied. Think about the possible ramifications if a medical practitioner was unable to properly diagnose a patient and recommend treatment because of some unavailable data.

Of course, the strategy that Brookside ENT has adopted to close up shop doesn’t leave its owners off the hook, either. They could still find themselves in plenty of regulatory hot water.

For instance, a ransomware attack (paid or not) could be considered a reportable incident under HIPAA, or even an instigation of a negligence-based legal action. Any patient could invoke HIPAA rules if their data was in digital form and have an investigation started by the Department of Health and Human Services’ Office of Civil Rights, simply by leaving a complaint.

How You Can Protect Your Business from Ransomware

While the best way to keep your business safe is to be able to spot ransomware infection attempts before they successfully fool you into allowing them on your system, statistically, you aren’t going to be able to spot all of them… so what can you do?

One great resource you have available to you is your team. Each uneducated user offers ransomware another way in, but each educated user is another shield to help protect your business.

You should also develop and maintain a comprehensive backup plan to help protect your data from ransomware attacks and other attempts against it. While it would be ideal to not need to use this backup, it would be far less ideal to need one and not have it. Make sure that you keep your backup isolated from the rest of your network as well, so that your backup isn’t also encrypted by a ransomware attack.

At Telesys Voice and Data, we have plenty of experience in mitigating the damage that ransomware can cause, as well as in solving various other IT issues. For assistance with any of your business’ IT needs, reach out to us at (800) 588-4430.


No comments yet
Already Registered? Login Here
Saturday, 15 August 2020
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Business Computing Cloud Best Practices Hackers Privacy Malware Business Email Productivity Hosted Solutions Microsoft Network Security Software Internet Productivity IT Services Computer Windows 10 Innovation Managed Service Provider Backup Data Backup Mobile Devices Ransomware Business Continuity Hardware Smartphone Outsourced IT Data Efficiency Google Upgrade Android User Tips Data Recovery Disaster Recovery Social Media Managed IT services Browser Communication IT Support Workplace Tips IT Support Business Management Small Business Cloud Computing Data Management Managed IT Services Smartphones App Office Server Remote Monitoring Miscellaneous Cybersecurity Internet of Things Holiday Microsoft Office Phishing Network VoIP Paperless Office Office 365 Windows WiFi Facebook communications Password Save Money Artificial Intelligence Gmail Spam Collaboration Big Data Passwords Encryption Tech Term Employer-Employee Relationship Robot Saving Money Risk Management Customer Relationship Management Windows 10 Bandwidth Document Management Firewall Vendor Management Apps Hosted Solution Unified Threat Management Recovery Compliance Wi-Fi Government Remote Computing Analytics Money Infrastructure Managed IT Work/Life Balance Word Hacker Tip of the week Chrome Content Filtering Apple Avoiding Downtime Healthcare Downtime Customer Service Mobile Device Management Windows 7 Managed Service Office Tips Operating System How To Two-factor Authentication Virtual Reality Training Settings Applications Project Management Data loss Presentation Business Growth SaaS BDR BYOD Software as a Service Business Technology The Internet of Things Computers Outlook Telephone Systems Education File Sharing Vulnerability Cybercrime Health Help Desk Automation Data Security Going Green Alert Hacking Mobile Computing Social Printing Data storage Website Tech Support Meetings IT Management Computing Storage Mobile Device Antivirus Redundancy LiFi Net Neutrality Time Management Tablet Analyitcs Proactive Mobility Smart Technology Remote Monitoring and Management HIPAA Router Automobile Upgrades Mobile Security Augmented Reality Budget End of Support Specifications IBM Running Cable Mouse Laptops User Legal Bring Your Own Device Search Solid State Drive Display Patch Management Sports Retail Scam Identity Theft IT service Cortana Twitter Access Control Politics Virtualization Monitors Electronic Health Records Best Practice IoT Administration Travel Lithium-ion battery Google Drive Business Owner Websites VPN IT solutions Assessment Safety Physical Security Marketing Taxes Server Management Licensing Botnet Wireless Technology Virtual Private Network Consultation Wireless Digital Payment Samsung Maintenance Competition YouTube Information Technology Regulations Unified Communications Humor Computer Care Recycling IT Consulting Point of Sale Gadgets Drones Cabling Mobile VoIP Wearable Technology Error Staffing Zero-Day Threat Troubleshooting Motherboard Management Data Breach Internet Exlporer Network Management Proactive Maintenance Windows Server 2008 Hard Drives Laptop Virtual Desktop Distributed Denial of Service VoIP GPS Backup and Disaster Recovery Phone System Enterprise Resource Planning Technology Laws Web Server Touchscreen Update data services Google Maps Processor Technology Tips Disaster Co-Managed IT Refrigeration WPA3 IT Technicians Halloween Modem Lenovo Administrator Managed IT Service Digital 3D Printing Tracking RMM Mobile Unified Threat Management Deep Learning Cameras Hotspot Fun Chromebook User Error Law Enforcement Comparison Uninterrupted Power Supply Business Telephone Network Congestion Fleet Tracking Mirgation Shortcut Scary Stories Cookies Superfish Break Fix Spyware Unsupported Software Procurement Company Culture business communications systems CCTV Language Emoji Printer Active Directory Gadget Black Friday Biometric Undo Asset Tracking Migration Nanotechnology Dark Web How To IP Address Mobile Data Remote Worker iPhone Hacks Vulnerabilities Internet Protocol Alt Codes Computing Infrastructure Heating/Cooling Windows Server Cyber Monday Hard Disk Drive Remote Workers Chatbots Networking Data Warehousing Firefox Mobile Office Supercomputer Professional Services Current Events Geography VoIP streamlines Typing G Suite Alerts Servers Processors SharePoint User Management Buisness flu season Cyberattacks Information Identity Utility Computing Motion Sickness Microsoft Excel IT Budget Virtual Assistant Google Docs Cables business network infrastructure Cryptocurrency Cooperation Knowledge Downloads Batteries Fort Worth Writing Bookmarks Monitoring PowerPoint Techology Blockchain Personal Information Voice over Internet Protocol Consumers Wires Bitcoin IT Consultant Staff Statistics Experience Multi-Factor Security Software Tips Remote Work Machine Learning flu shot Social Engineering Favorites Consulting Mail Merge Cost Management Disaster Resistance Permissions Computer Repair Windows 8 Cleaning Flexibility Bluetooth Notifications Google Calendar File Management Relocation Fort Worth IT Corporate Profile Domains Conferencing eWaste Address Hard Drive Proactive IT IT Sevices Webcam Fraud Quick Tips 5G Electronic Medical Records Manufacturing Entrepreneur Google Wallet Telephone Application Dark Data MSP Operations Crowdsourcing Legislation History Users Private Cloud DFW IT Service WannaCry Public Speaking Employees Environment Social Networking

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...