
How to minimize ransomware attacks in healthcare
Ransomware is on the rise. What can healthcare organizations do to stop these hacks?
Not only expensive to attempt to resolve, ransomware attacks also can be very difficult to prevent; cybercriminals continue to evolve their strategy. Recent attacks have demanded more substantial sums of money than ever before and targeted small and midsize providers who often have less sophisticated IT systems and therefore are more willing to pay to protect their patients’ information.
So how can healthcare providers harden their security measures and protect information in the event of an attack? Let’s start by taking a more in-depth look at how ransomware works.
What is ransomware?
The average office worker receives more than
Instead of paying off a cybercriminal, try a three-pronged approach using prevention, detection and response to limit fallout from an attack. Here’s how this strategy looks across the organization:
Secure your systems
The first step to preventing a ransomware attack is to restrict access to certain areas of the network. Instead of allowing every employee access to every part of the system, set specific privileges for different departments or even each individual. Next, equip the system with effective anti-malware and anti-virus software to block any known threats from entering the IT environment. These tools can flag employee activity on possibly malicious sites, and also scan inbound emails.
Train your employees
Your staff is your best line of defense. Educating the staff on the
Build a response plan
Should an attack occur, it’s vital to have a plan in place to execute a quick response. Start by completing a forensic analysis of the system and testing to outline weaknesses or potential threats. From here, enhance your organization’s tech stack. Implement an incident response manager tool that will identify how and when you’ve been compromised, and also reveal any changes that were made to the system and stored data. Early identification is the first step to restoring security within a system.
Create emergency response policies
The final step is to have early conversations with law enforcement to determine the odds of recovering data within a system. In some circumstances, and depending on the type of ransomware deployed, a healthcare provider could get a decryption key from the FBI’s database. Providers also must perform an analysis of their system to determine what communications were sent and what specific actions were taken on the network to provide insights into possible gaps within the security stack.
Ransomware attacks are a serious issue and should be treated as a potential threat for any healthcare provider. Instead of waiting for a ransomware attack to occur, take action now. Implement systems and strategies to prevent the possibility and establish a plan to recover data quickly when an attack does occur.
Rick Clark is the Corporate Security Director at
Newsletter
Stay informed and empowered with Medical Economics enewsletter, delivering expert insights, financial strategies, practice management tips and technology trends — tailored for today’s physicians.