Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Let me ask you a question… let’s say that you’re about one year from your projected retirement, when a ransomware attack encrypts all of your files. What do you do? Pack it in and retire early? This is precisely the situation that the practitioners of Brookside ENT & Hearing Services of Battle Creek, Michigan, have found themselves in - and it may not be over yet.

What Happened to Brookside ENT?

Typical of a ransomware attack, the malware began by deleting and overwriting all of the practice’s data - every medical record, bill, and upcoming appointment. A duplicate of each file was left behind, locked behind a password that the person or persons responsible promised to provide in exchange for a $6,500 wire transfer.

Under the advisement of an “IT guy,” Dr. William Scalf and Michigan state senator Dr. John Bizon didn’t pay the ransom, as they couldn’t be sure that the password would even work, or that the ransomware wouldn’t return in the near future. As their IT resource determined that the attacker hadn’t actually viewed any of the records, this event technically didn’t need to be reported as a breach under the Health Insurance Portability and Accountability Act (HIPAA). Nevertheless, without access to this data, the physicians saw little choice than to retire early.

Well, kind of. As they had no means of knowing who had an appointment scheduled, the physicians had little choice than to wait around the office for a few weeks and see whomever showed up.

Why Throwing in the Towel May Not Be Enough

From a purely academic point of view, it only makes sense that the medical industry would be one targeted by ransomware. Not only do its establishments rely greatly on the data they have stored, there is an urgency to this reliance that cannot be denied. Think about the possible ramifications if a medical practitioner was unable to properly diagnose a patient and recommend treatment because of some unavailable data.

Of course, the strategy that Brookside ENT has adopted to close up shop doesn’t leave its owners off the hook, either. They could still find themselves in plenty of regulatory hot water.

For instance, a ransomware attack (paid or not) could be considered a reportable incident under HIPAA, or even an instigation of a negligence-based legal action. Any patient could invoke HIPAA rules if their data was in digital form and have an investigation started by the Department of Health and Human Services’ Office of Civil Rights, simply by leaving a complaint.

How You Can Protect Your Business from Ransomware

While the best way to keep your business safe is to be able to spot ransomware infection attempts before they successfully fool you into allowing them on your system, statistically, you aren’t going to be able to spot all of them… so what can you do?

One great resource you have available to you is your team. Each uneducated user offers ransomware another way in, but each educated user is another shield to help protect your business.

You should also develop and maintain a comprehensive backup plan to help protect your data from ransomware attacks and other attempts against it. While it would be ideal to not need to use this backup, it would be far less ideal to need one and not have it. Make sure that you keep your backup isolated from the rest of your network as well, so that your backup isn’t also encrypted by a ransomware attack.

At Telesys Voice and Data, we have plenty of experience in mitigating the damage that ransomware can cause, as well as in solving various other IT issues. For assistance with any of your business’ IT needs, reach out to us at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Friday, 24 January 2020
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Business Computing Best Practices Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Network Security Software Internet IT Services Windows 10 Productivity Computer Managed Service Provider Backup Data Backup Ransomware Innovation Mobile Devices Business Continuity Smartphone Outsourced IT Upgrade Google Data Android Hardware Efficiency Data Recovery Disaster Recovery Social Media Managed IT services User Tips Browser Communication IT Support Workplace Tips IT Support Small Business Cloud Computing Managed IT Services Data Management Business Management Smartphones App Miscellaneous Server Holiday Microsoft Office Network Internet of Things Office Remote Monitoring Phishing communications Paperless Office WiFi Office 365 Cybersecurity Windows Password Facebook VoIP Save Money Spam Passwords Tech Term Artificial Intelligence Gmail Big Data Encryption Customer Relationship Management Employer-Employee Relationship Windows 10 Risk Management Collaboration Document Management Bandwidth Firewall Unified Threat Management Saving Money Apps Hosted Solution Recovery Robot Wi-Fi Office Tips Money Managed IT Infrastructure Chrome Work/Life Balance Analytics Tip of the week Apple Avoiding Downtime Compliance Vendor Management Word Hacker Customer Service Mobile Device Management Operating System Windows 7 Content Filtering Remote Computing How To Downtime Government Project Management Data loss BDR Outlook SaaS BYOD Business Technology Two-factor Authentication Settings Telephone Systems Health The Internet of Things File Sharing Computers Healthcare Vulnerability Hacking Mobile Computing Help Desk Tech Support Automation Managed Service Going Green Data Security Alert Education Printing Data storage Cybercrime Applications IT Management Computing Software as a Service Mobile Device Presentation Business Growth Antivirus Social Redundancy Virtual Reality Training Website YouTube User Automobile Upgrades Unified Communications Budget End of Support Access Control Retail LiFi Laptops Mouse Best Practice Lithium-ion battery Business Owner Legal Display Patch Management Solid State Drive Augmented Reality Identity Theft Scam Marketing Twitter Monitors Running Cable Politics IBM Travel Google Drive VPN Competition Websites Assessment Search Regulations Physical Security Bring Your Own Device Server Management Taxes Sports Licensing Information Technology IT service Virtual Private Network Botnet Consultation Cortana Digital Payment Humor Samsung Virtualization Net Neutrality Administration Proactive Maintenance Meetings Smart Technology Analyitcs Storage Safety HIPAA IT solutions Remote Monitoring and Management Router Computer Care Wireless Technology Mobile Security Wireless Tablet Specifications Error Mirgation Staffing Comparison Fleet Tracking Zero-Day Threat Windows 8 Proactive Maintenance Network Management Cookies Break Fix Data Breach Printer Windows Server 2008 Company Culture Domains Language 5G Migration GPS Entrepreneur Black Friday Asset Tracking Backup and Disaster Recovery VoIP Technology Laws Processor Touchscreen Web Server Nanotechnology Google Maps Update Application Dark Web Co-Managed IT Users Vulnerabilities Disaster Public Speaking Computing Infrastructure Digital iPhone Administrator Chatbots Tracking 3D Printing Cyber Monday Lenovo Remote Workers RMM Unified Threat Management Cameras IoT Chromebook Data Warehousing Network Congestion SharePoint Business Telephone Shortcut Geography Uninterrupted Power Supply Law Enforcement Alerts Procurement Spyware Identity Unsupported Software flu season Superfish Information business communications systems Active Directory CCTV Laptop Utility Computing Emoji Hard Drives Microsoft Excel Downloads Virtual Desktop Cables Gadget Cooperation Remote Worker How To Mobile Data Fort Worth Hacks Monitoring Internet Protocol Windows Server Heating/Cooling Halloween Refrigeration Blockchain PowerPoint Multi-Factor Security Wires Electronic Health Records Hard Disk Drive Staff Professional Services Firefox Fun Supercomputer flu shot Current Events Networking Deep Learning Consulting VoIP streamlines User Management Servers G Suite Scary Stories Cost Management Consumers Processors Permissions Google Calendar Cyberattacks Flexibility Virtual Assistant Motion Sickness IT Budget Fort Worth IT business network infrastructure Batteries Hard Drive Undo Fraud Google Docs Operations Writing Legislation MSP Bookmarks eWaste IP Address Voice over Internet Protocol Social Networking Personal Information DFW IT Service IT Sevices Techology Alt Codes Remote Work Statistics IT Consultant Recycling Software Tips Wearable Technology Social Engineering Mail Merge Favorites Environment Machine Learning Mobile Office Typing Motherboard Computer Repair Disaster Resistance File Management Bluetooth Cleaning Buisness Management Notifications Internet Exlporer Address Conferencing Corporate Profile Troubleshooting Relocation Cryptocurrency Manufacturing Quick Tips Webcam Knowledge Electronic Medical Records Distributed Denial of Service Google Wallet Proactive IT data services Telephone Enterprise Resource Planning History Crowdsourcing Dark Data IT Technicians Phone System Technology Tips WPA3 Employees WannaCry Private Cloud Bitcoin Gadgets Time Management Point of Sale Experience Modem Managed IT Service Drones IT Consulting User Error Mobile VoIP Mobility Mobile Cabling Hotspot

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code