Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Ransomware Shuts Down Doctors’ Office - Is Your Business Protected?

Let me ask you a question… let’s say that you’re about one year from your projected retirement, when a ransomware attack encrypts all of your files. What do you do? Pack it in and retire early? This is precisely the situation that the practitioners of Brookside ENT & Hearing Services of Battle Creek, Michigan, have found themselves in - and it may not be over yet.

What Happened to Brookside ENT?

Typical of a ransomware attack, the malware began by deleting and overwriting all of the practice’s data - every medical record, bill, and upcoming appointment. A duplicate of each file was left behind, locked behind a password that the person or persons responsible promised to provide in exchange for a $6,500 wire transfer.

Under the advisement of an “IT guy,” Dr. William Scalf and Michigan state senator Dr. John Bizon didn’t pay the ransom, as they couldn’t be sure that the password would even work, or that the ransomware wouldn’t return in the near future. As their IT resource determined that the attacker hadn’t actually viewed any of the records, this event technically didn’t need to be reported as a breach under the Health Insurance Portability and Accountability Act (HIPAA). Nevertheless, without access to this data, the physicians saw little choice than to retire early.

Well, kind of. As they had no means of knowing who had an appointment scheduled, the physicians had little choice than to wait around the office for a few weeks and see whomever showed up.

Why Throwing in the Towel May Not Be Enough

From a purely academic point of view, it only makes sense that the medical industry would be one targeted by ransomware. Not only do its establishments rely greatly on the data they have stored, there is an urgency to this reliance that cannot be denied. Think about the possible ramifications if a medical practitioner was unable to properly diagnose a patient and recommend treatment because of some unavailable data.

Of course, the strategy that Brookside ENT has adopted to close up shop doesn’t leave its owners off the hook, either. They could still find themselves in plenty of regulatory hot water.

For instance, a ransomware attack (paid or not) could be considered a reportable incident under HIPAA, or even an instigation of a negligence-based legal action. Any patient could invoke HIPAA rules if their data was in digital form and have an investigation started by the Department of Health and Human Services’ Office of Civil Rights, simply by leaving a complaint.

How You Can Protect Your Business from Ransomware

While the best way to keep your business safe is to be able to spot ransomware infection attempts before they successfully fool you into allowing them on your system, statistically, you aren’t going to be able to spot all of them… so what can you do?

One great resource you have available to you is your team. Each uneducated user offers ransomware another way in, but each educated user is another shield to help protect your business.

You should also develop and maintain a comprehensive backup plan to help protect your data from ransomware attacks and other attempts against it. While it would be ideal to not need to use this backup, it would be far less ideal to need one and not have it. Make sure that you keep your backup isolated from the rest of your network as well, so that your backup isn’t also encrypted by a ransomware attack.

At Central Technology Solutions, we have plenty of experience in mitigating the damage that ransomware can cause, as well as in solving various other IT issues. For assistance with any of your business’ IT needs, reach out to us at 1-844-237-4300.

How to Plan Your Data Storage Needs
Taking a Look at a Manufacturer’s IT


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, May 26 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Hosted Solutions IT Services Malware Privacy Productivity Hackers Network Security Internet Data Productivity Managed IT Services Software Data Backup Outsourced IT Business Innovation IT Support Mobile Devices Data Recovery Ransomware Microsoft Computer Hardware Tech Term Google Backup IT Support Cloud Computing Small Business Efficiency Internet of Things Business Continuity Managed Service Provider Upgrade Communication Smartphone Android Business Management Paperless Office Remote Monitoring User Tips Disaster Recovery Encryption Data Management Social Media Collaboration Windows 10 Phishing Smartphones VoIP Workplace Tips Windows 10 Managed IT Services Managed IT Windows Artificial Intelligence Browser Risk Management Server Cybersecurity Save Money Mobile Device communications Facebook BYOD Holiday Saving Money Passwords Mobile Device Management App Office 365 Chrome Government Unified Threat Management Bring Your Own Device Document Management Bandwidth Vendor Management Automation Recovery Password Apps Virtualization Gmail Employer-Employee Relationship Analytics BDR Wi-Fi Firewall Applications Compliance Network Business Technology Robot SaaS Healthcare Telephone Systems Money Data storage Going Green Microsoft Office Hosted Solution IT Management Website Managed Service Tip of the week Wireless Information Quick Tips Scam Project Management Antivirus Content Filtering Help Desk Infrastructure File Sharing Vulnerability Big Data Unified Communications Two-factor Authentication Regulations Router Office IT Service Computing Politics Work/Life Balance Computers Storage Printing Blockchain VPN Remote Computing Training Settings Customer Relationship Management Customer Service Tablet Virtual Reality Data loss Data Security Apple Social Files Miscellaneous Users Software as a Service Wireless Technology Legal The Internet of Things Uninterrupted Power Supply Spam Private Cloud End of Support Health Maintenance WiFi Management Smart Technology Tech Support YouTube Remote Monitoring and Management Net Neutrality Monitors Downtime Word Remote Workers Alert Budget Digital Payment Electronic Medical Records Administration Redundancy Information Technology Websites Identity Theft Internet Exlporer Education Licensing LiFi Operating System IoT Outlook HIPAA How To Samsung Mouse Access Control Cooperation IT solutions Google Drive Mobile Security Chromebook Flexibility Patch Management Employees Networking Avoiding Downtime Sports Company Culture Business Growth Machine Learning Mobility Virtual Private Network RMM Mobile Computing Upgrades Network Management Gadgets Twitter Assessment Hacker How To Proactive Server Management Smart Tech Display Google Maps VoIP Managed Services Provider Sponsor Teamwork Current Events Migration Taxes 3D Printing Cables Touchscreen Backup and Disaster Recovery Techology Employee-Employer Relationship Database Operations Processors Enterprise Content Management Consultation Finance Lenovo Alt Codes Data Warehousing IT Budget Notes Cryptocurrency Computing Infrastructure Cabling Address Options Technology Assurance Group ’s 18 Office Tips Statistics Theft Update Cost Management Digital E-Commerce Obstacle Shared resources Technology Tips Chatbots Unsupported Software Virus Wires Human Error Disaster Resistance Connectivity Search Voice over Internet Protocol Hacks Multi-Factor Security Wearable Technology Point of Sale Vulnerabilities Authentication Superfish Typing Microsoft Excel Modem PowerPoint Bitcoin Printer Alerts Social Engineering USB Enterprise Resource Planning Bookmarks 5G Best Practice Distributed Denial of Service Annual Convention WPA3 Bluetooth Financial Sync Hard Drive Spyware Features Course OneDrive Comparison Identity Telephony Mobile Data Permission Proactive IT Shortcut Windows 7 Google Calendar Law Enforcement Geography Authorization Cookies Public Cloud Virtual Desktop Professional Services Windows 8 Save Time Travel Safety Mobile Firefox Favorites Wireless Internet Managed IT Service San Diego Botnet Dark Data Personal Information Fleet Tracking Procurement Identities Mobile Device Managment Software Tips Cache Electronic Health Records Manufacturing Specifications Heating/Cooling Test IT Consulting Security Cameras Star Wars WannaCry Monitoring Transportation Legislation IT Technicians Gadget Notifications High-Speed Internet Time Management Permissions Nanotechnology Automobile Computer Care Hacking Virtual Assistant SharePoint Staff Black Market Conferencing Google Wallet Break Fix Social Networking Asset Tracking Hard Drives Google Docs Unified Threat Management Hotspot Marketing Writing Emoji Recycling Cyberattacks Hard Disk Drives Black Friday Roanoke — Central Technology Solutions GPS MSP Servers Data Breach Remote Worker Network Congestion Utility Computing Consulting Humor Mirgation Buisness Development Zero-Day Threat Fraud Screen Reader Disaster OneNote Trending Wasting Time Backups Downloads Augmented Reality Crowdsourcing Meetings Managing Stress Instant Messaging Drones Dark Web Motherboard Supercomputer Computer Repair ROI Solid State Drive User Error Language G Suite Retail History Cortana eWaste Read Only Mail Merge Solid State Drives Deep Learning Cyber Monday technology services provider Tracking Physical Security Tech Terms Technology Laws Webcam Printers IT Consultant Error Cybercrime Hard Disk Drive Web Server Regulation Cameras Motion Sickness Emergency CrashOverride Students CCTV Administrator Relocation