How to Protect Your Organization Against Ransomware

Frustrated security professional

Ransomware attacks are rapidly increasing in frequency and intensity as technology advances. Malicious actors tend to target industries with large amounts of high-value data, making healthcare organizations a prime target. 

Data security and patient privacy are crucial in healthcare. Not only can a ransomware attack negatively affect an organization’s bottom line, but it can also negatively impact patient care with incorrect information, slow data exchange and privacy invasion. Protecting against ransomware is a non-negotiable requirement for healthcare organizations. 

Healthcare Industry Ransomware Epidemic 

In 2021, the Health Sector Cybersecurity Coordination Center (HC3) tracked 48 ransomware incidents in the U.S. It found that 72% of respondents experienced a data leak because of the attacks. 

Furthermore, patient data from healthcare facilities and organizations is the most lucrative data for attackers. A 2019 global security report found that the average healthcare data record was selling for up to $250 on the dark web. When you compare this to the $5.40 charged for payment card information — the next high-value record — it’s clear why the healthcare industry faces an epidemic of ransomware and data breaches. 

Damages Beyond Privacy Invasion 

Having patient data exchanged in the digital underground economy is a major privacy invasion and could seriously damage a healthcare organization’s reputation. More importantly, it’s held liable under state or federal regulations for breaking laws such as The Health Insurance Portability and Accountability Act (HIPAA).  

Ransomware doesn’t only open data to issues like identity theft, its core feature is keeping files hostage through encryption for ransom. The financial implications for stakeholders can be overwhelming. 

Additionally, when healthcare providers are unable to quickly and securely access patient data — anything from medical history and records to test results and scans — it can severely delay the administration of appropriate treatments and procedures. It’s very possible that patients die. 

Understanding Attack Avenues 

The first step toward protecting your healthcare organization against ransomware is understanding its weak points. 

Poor Data Management 

Patient data is the primary target of the actors behind ransomware attacks. Databases need to be categorized based on sensitivity, allowing you to prioritize cybersecurity resources and efforts. 

Data management includes access privileges. Data access should be minimized by default to mitigate the chances of access through an unnecessary inside stakeholder. The more keys to a door there are, the more likely someone is to steal one and get inside.  

Human Error 

Human error is the leading weakness of ransomware and malware attacks across all industries. Different from malicious insider attacks, human error can happen at any employee level, compromising a system. 

Malicious actors can take advantage of human error through social engineering. They either phish for information that could enable them to access the patient database or trick an employee into leaving a back door open through malware delivered via digital or physical means. In some cases, it could be as simple as a stray USB drive left strategically on a front desk. 

Poor Cybersecurity 

Even if the infrastructure of a healthcare organization is optimized for privacy and security, using inappropriate or outdated cybersecurity tools could still cause issues. Through brute-force attacks, malicious individuals and organizations can gain access to an organization’s internal network, infecting it with ransomware. 

How to Protect Against Ransomware 

Effective protection against ransomware attacks requires both preventative and mitigative, responsive measures.  

Human Training 

A study called “Psychology of Human Error,” led by Stanford University professor Jeff Hancock, found that approximately 88% of data breaches are due to human error. Following logic, training employees on digital hygiene and cybersecurity fundamentals is enough to protect against nearly 9 out of 10 attacks. 

Employee training ranges from periodic seminars to consistent, regular workshops that cover the basics of internet security, data privacy and the latest phishing schemes. Training should be designed depending on their position in the organization. 

Access Privileges and Segmentation 

Limiting access privileges and segmenting databases can greatly reduce the damage of an attack. Instead of accessing the full database, the breach would be contained in the individual segment. Employees should be extremely limited — if not outright prohibited — from connecting personal devices to the organization’s network.  

Additionally, every employee should only have access to systems they frequently use at their work. Anything too sensitive, or that isn’t used as often, should be limited to permission-only access. 

Performing Regular Backups 

By regularly backing up data on a secure server, your IT department can wipe compromised databases and restore the data without having to pay a ransom or decrypt files. 

Zero-Trust Security 

Zero-trust security, as the name suggests, acts under the assumption that no device, inside or outside your organization’s network, is trustworthy. With zero-trust, all employees require additional authorization through identity authentication before accessing any systems or services through digital or physical means. 

In this scenario, ransomware is treated as a user with invalid credentials, allowing the zero-trust infrastructure to deny it access to patient data, even if it’s already inside the system. 

Finding Qualified Professionals 

Securing the systems of a healthcare organization is a bit different from securing systems in other industries when you consider the scale of operations and regulations. It’s critical to have someone who’s knowledgeable about both the healthcare industry and cybersecurity. For those seeking an opportunity in healthcare’s cybersecurity, a health informatics program may be beneficial. 

USF Health’s MS in Health Informatics is 100% online and designed for physicians, nurses, physical therapists, pharmacists, mental health workers and other healthcare workers.  

YES! Please send me a FREE guide with course info, pricing and more!
Facebook
Twitter
LinkedIn

Academic Calendar

SUMMER I – 2024

Application Deadline April 12, 2024
Start Date April 29, 2024
End Date June 23, 2024

SUMMER II – 2024

Application Deadline June 7, 2024
Start Date June 24, 2024
End Date August 18, 2024

FALL I – 2024

Application Deadline August 2, 2024
Start Date August 19, 2024
End Date October 13, 2024

FALL II – 2024

Application Deadline September 27, 2024
Start Date October 14, 2024
End Date December 8, 2024

SPRING I – 2025

Application Deadline December 13, 2024
Start Date January 6, 2025
End Date March 2, 2025

SPRING II – 2025

Application Deadline February 14, 2025
Start Date March 3, 2025
End Date April 27, 2025

SUMMER I – 2025

Application Deadline April 11, 2025
Start Date April 28, 2025
End Date June 22, 2025

Get Our Program Guide

If you are ready to learn more about our programs, get started by downloading our program guide now.