Securing Healthcare Data from Ransomware
432
![]() 680
![]() 122
![]() |
Ransomware attack has been a growing threat, affecting the data of different industries. The healthcare sector is no exception. Safeguarding the hospital's system from ransomware attack is the top priority in system admin's to-do list. According to the leading IT experts, this kind of cyber attack, especially on healthcare facilities, is increasing on a daily basis.
The most commonly targeted equipment by hackers in the medical sector is devices that are connected to the networks. These medical devices are often prone to threats because they are not updated and run on an outdated OS. These devices usually have a weak security and hence will be used as a potential gateway by the hackers to break into hospitals’ main networks. The targeted medical machinery is often difficult to protect and clean up than servers and workstations. Security is often not as the top priority, while building these devices during development lifecycles. In an instance, a US hacker had breached into the remote desktop of a particular vendor. He stole millions of records and asked for the ransom in return of that information. However, if the hospital gives security an utmost importance and takes some measures associated with network security, they can certainly avoid security breach caused by a ransomware attack.
Building the Wall for Blocking Ransomware
Here are some of the important tips to protect confidential information from the attack:
• Ensure that all the medical devices and equipment are running disparately from the general network that accesses patient’s protected health information (PHI).
• While storing the backup information or any sensitive data, save it in a separate location rather than saving in the hospital's main network, so there is a lower chance that sensitive data will be affected by ransomware.
• It is wise to save the sensitive data using secured network instead of local disks to store PHI. With the help of secured network, the data can be restored quickly once a ransomware attack hits.
• Healthcare organizations can design a specific incident response strategy that helps in managing the operation when the system is attacked. According to data from Intel Security’s Advanced Threat Research Team, hospitals that were hit by ransomware are the once that a contingency plan in place and ended up paying the ransom to restore their data.
• Healthcare facilities must provide a robust training to their staff on best practices to avoid malware. Ransomware is seen infecting networks mostly when office staffs click on malicious links or open suspicious email attachments from unknown senders. Health institutions must educate staffs on how to identify email spam, and remind them to be aware and not click on it.
• In addition to that improving internal spam filters might help in blocking those attacks. Many ransomware programs are masked under a compressed .zip files and saved in uncommon file formats. Ensure that system admin has spam filters that can recognize these types of files and block them.
• Another way is to block unnecessary programs and traffic from the network. By filtering out significant traffic helps in keeping hackers away from being able to break into the systems and encrypt the hospital’s information.
• “White listing medical devices and equipment” is one of the efficient ways to fight against ransomware. White listing only allows specific programs to update or run on the tools connection, which means illegal programs cannot get executed without permission and infect.
• Keep computers and other general network devices up to date. Make sure the latest versions of these devices are running at all times.
• Finally, instead of depending on the default system settings, capitalize on advance settings to protect data and devices, which can automatically block the devices and hardware.
FEATURED VENDORS

Featured Vendor
Smartlink Mobile Systems: Patient/Provider Mobile Communication App Improves Quality of Care and Ensures Full Compliance with Medicare Chronic Care Management
GSI Health: Enabling Effective Population Health Management through the Marriage of Care Coordination with Analytics
HealthCare Information Management, Inc: Simplifying Healthcare Payer Operations through Claims Automation
Wipro Healthcare & Life Sciences Combining Innovation with Expertise to Redefine Healthcare Delivery
Shareable Ink: Simplified Clinical Documentation for Anesthesia, Providers, Patient Check in &Surgery Centers
EDITOR'S PICK
Leverage The Customer's Personal Mobile Interaction Point
By Debra Jensen, CIO, Charlotte Russe
Use Technology to Understand Customer Better
By Phil Jordan, CIO, Telefonica
Staying Connected to Organizational Priorities is Vital...
By Alberto Ruocco, CIO, American Electric Power
IT Competing in a Segmented Marketplace
By Sven Gerjets, SVP-IT, DIRECTV
Fueling Your Business through Insights- Driven...
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
The Next 10 Years in Wireless: A Vision for Enterprise...
By Mike Fitton, Wireless Business Unit Director, Altera
Leveraging Cloud and Big Data to Enable Mobile Work...
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Graham Welch, Director-Cisco Security, Cisco
Cisco Stakes Its Claim on the Data Center -Even Your...
By Michael Watkins, Senior Product Director, Global Knowledge
Cloud Computing- Revolutionizing the Education Industry
By Nelson C. Vincent, EdD, VP for IT and CIO, University of...
4Must-Have Technologies for Metals & Mining
By Sharon Gietl, VP-IT & CIO, The Doe Run Company
Optimized Customer Experience through Technology
By Arnold Leap, CIO, 1-800-Flowers.com
By Gary Barlet, CIO, USPS OIG
Your Next Transportation Management System: TMS 2.0
By Mike Dieter, CTO, Transplace
Connecting People and Technology to Deliver the Best...
By Bill Schimikowski, VP, Customer Experience, Fidelity...
The Exchanges Sector Need to Evolve Technologically
By Kevin Kometer, CIO, CME Group
You better watch out, You better not pout, IOT is...
By John Landwehr, Public Sector CTO, Adobe
Four Cybersecurity Weak Spots You Should Care About When...
By Marc Probst, CIO & VP, Intermountain Healthcare
Change Agents in a Digital Healthcare World: People,...
By Charles Koontz, President & CEO, GE Healthcare IT & Chief...
Revolutionizing Industrial Mining through Smart Tools
By Jeff Bauserman, VP-Information Systems & Technology,...