Video: Every Case Tells a Story| Webinar: ACR/CHEST ILD Guidelines in Practice

An official publication of the ACR and the ARP serving rheumatologists and rheumatology professionals

  • Conditions
    • Axial Spondyloarthritis
    • Gout and Crystalline Arthritis
    • Myositis
    • Osteoarthritis and Bone Disorders
    • Pain Syndromes
    • Pediatric Conditions
    • Psoriatic Arthritis
    • Rheumatoid Arthritis
    • Sjögren’s Disease
    • Systemic Lupus Erythematosus
    • Systemic Sclerosis
    • Vasculitis
    • Other Rheumatic Conditions
  • FocusRheum
    • ANCA-Associated Vasculitis
    • Axial Spondyloarthritis
    • Gout
    • Psoriatic Arthritis
    • Rheumatoid Arthritis
    • Systemic Lupus Erythematosus
  • Guidance
    • Clinical Criteria/Guidelines
    • Ethics
    • Legal Updates
    • Legislation & Advocacy
    • Meeting Reports
      • ACR Convergence
      • Other ACR meetings
      • EULAR/Other
    • Research Rheum
  • Drug Updates
    • Analgesics
    • Biologics/DMARDs
  • Practice Support
    • Billing/Coding
    • EMRs
    • Facility
    • Insurance
    • QA/QI
    • Technology
    • Workforce
  • Opinion
    • Patient Perspective
    • Profiles
    • Rheuminations
      • Video
    • Speak Out Rheum
  • Career
    • ACR ExamRheum
    • Awards
    • Career Development
  • ACR
    • ACR Home
    • ACR Convergence
    • ACR Guidelines
    • Journals
      • ACR Open Rheumatology
      • Arthritis & Rheumatology
      • Arthritis Care & Research
    • From the College
    • Events/CME
    • President’s Perspective
  • Search

How to Prevent, Detect and Respond to a Ransomware Attack

Steven M. Harris, Esq.  |  Issue: November 2017  |  November 8, 2017

Certain ransomware variants encrypt the data on the server, while others are capable of destroying or exfiltrating data outside of the affected system. Most recently, in May 2017, the wannacry ransomware made headlines when it infected computer systems globally.

Beyond the Ransom

Historically, ransomware has been used by cybercriminals to extort money from unsuspecting businesses and individuals. It was very simple: The data of affected businesses or individuals was held hostage until the owner of the data paid a ransom in exchange for a decryption key to unlock the data.

ad goes here:advert-1
ADVERTISEMENT
SCROLL TO CONTINUE

Fast forward to today and the ransomware game has changed significantly. The objective is no longer just about the money. The mission is now to cause widespread disruption. In fact, the cybercriminals from the notpetya global ransomware attack that occurred on June 27, 2017, walked away with only $10,000. However, the attack caused severe damages to many businesses, with some businesses losing between $200 million and $300 million in damages resulting from the interruption.

Preventing Attacks

Because the goal of ransomware is to encrypt your files and effectively disable access to them, the first and best line of defense is to make sure you back up your data regularly. It is recommended that the backups occur at least daily. Also, the backup should be encrypted.

ad goes here:advert-2
ADVERTISEMENT
SCROLL TO CONTINUE

In addition, exercise extreme caution when opening unsolicited attachments. Ransomware is often embedded in documents included as attachments to email. Train (and then retrain) your staff to recognize a suspicious email to mitigate the chance that an unsolicited attachment will be opened.

It is also recommended that you limit the number of users who have access to your system to only those individuals who absolutely need access to perform their job functions. Doing so inherently reduces your exposure.

Finally, don’t put all your eggs in one basket. In other words, segregate your programs through the use of secure firewalls and separate servers. This can help prevent an infection from spreading across all your data, thereby shutting down your business.

These are just a few preventive measures you should take to prevent an attack. There are certainly other measures you can and should take to enhance overall compliance and prevent unauthorized access. These include implementing a written information security plan, performing external penetration testing, implementing privacy and security policies and procedures, implementing and periodically testing an incident response plan, and conducting regular and periodic training for your employees.

Now What?

If you fall victim to ransomware, you should immediately notify your cyber liability carrier and legal counsel. These resources will be able to assist you in navigating the attack. With many ransomware attacks, it is necessary to engage a forensic IT firm to conduct an analysis of the affected system to determine the extent of the impact and whether the particular ransomware variant is capable of accessing or exfiltrating data, which is a critical factor in a ransomware risk analysis. Your cyber liability insurance carrier and your legal counsel can put you in touch with such a firm. To retain attorney–client privilege over the results of the forensic investigation, the forensic IT firm should be retained by your legal counsel on your behalf.

Page: 1 2 3 | Single Page
Share: 

Filed under:Legal UpdatesPractice Support Tagged with:information technologyLegalPractice ManagementpreventransomwarerheumatologistscamsoftwareTechnologyvirus

Related Articles

    Legal Updates: Healthcare Data Privacy and Security under HIPAA

    May 1, 2014

    Maintaining the privacy of healthcare data Is paramount, and a breach can cost you hundreds of thousands of dollars

    Preparing for Increased HIPAA Audits Among Smaller Rheumatology Providers

    May 13, 2016

    Recent enforcement activities of the Department of Health and Human Services’ Office for Civil Rights (OCR) have shown an increase in fines and penalties assessed against smaller providers for failing to comply with the privacy, security and breach notification requirements of the Health Insurance Portability and Accountability Act (HIPAA). Historically, OCR has focused on larger…

    Phase 2 of HIPAA Audit Program Launches

    May 13, 2016

    With many competing priorities facing physician practices, HIPAA compliance and security is not a topic that usually makes it to the top of the list. But this is not the case with the Department of Health and Human Services’ Office for Civil Rights (OCR), because it has initiated a new phase of audits of physician…

    HIPAA Audit Activities Increase in 2016

    August 17, 2016

    In the coming months, rheumatologists may want to pay particular attention to their email inboxes. By the end of the year, the Department of Health and Human Services (HHS) Office for Civil Rights (OCR) will complete stage I, phase II of a series of desk and on-site audits designed to assess providers and their business…

  • About Us
  • Meet the Editors
  • Issue Archives
  • Contribute
  • Advertise
  • Contact Us
  • Copyright © 2025 by John Wiley & Sons, Inc. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies. ISSN 1931-3268 (print). ISSN 1931-3209 (online).
  • DEI Statement
  • Privacy Policy
  • Terms of Use
  • Cookie Preferences