It’s reported to have been one of the largest cyber extortion attacks to-date. The WannaCry (aka WanaCryptor 2.0) ransomware attack hit globally and hit hard. In the U.S., security analysts have leaped into the fray with patches and detection software, trying to stay ahead of the infiltration to quickly repair and mitigate damage.
Ransomware is a nasty business. Typically, what happens is an unsuspecting user clicks on a phishing link in an email or downloads an attachment which contains malware. The hacker’s malware then takes control of a users’ system, locking their files and data, and blocking it until a ransom is paid. Often there’s a timer that corresponds to the amount of money – usually Bitcoins – that the hackers demand before releasing the data. The longer it takes to pay, the higher the ransom gets.
Have you already been affected by ransomware? OCR reports that there have been “4,000 daily ransomware attacks since early 2016.” Also, if you’re a healthcare organization hit by ransomware, and files containing ePHI have been breached, you need to report it to OCR. Once the attack happens, go into containment and mitigation mode:
Not yet a ransomware victim? Then you’re in protection and prevention mode.
There are a lot of moving parts to organizational cybersecurity. Yet a platform like MyVCM can help connect the dots. It helps you track assets, including software, keep patching on-schedule and transparently monitor how your vendors are doing on their security, too. Taking preventive steps becomes business-as-usual, and makes it harder for cybercriminals to bring the business of healthcare to an abrupt and potentially dangerous halt.
Contact us today to learn more about Ostendio's MyVCM or request a demo.