4 Steps for Fighting Ransomware
Dean Sittig professor at the University of Texas School of Biomedical Informatics and Hardeep Singh, MD. Chief of Veterans Affairs Health Policy, Quality and Informatics Programme say that CIOs and CISOs understand that user training is one aspect of cybersecurity healthcare management should not overlook.
data. Another critical aspect not to overlook, of course, is user training.
“While preventing all ransomware attacks is not possible, there are a number of steps healthcare organisations can take to reduce their risk as well as mitigate potential harm,” they say.
The researchers’ strategy is four-pronged and prevention focused. Based on the framework of the NIST, Sittig and Singh propose the following steps to secure EHRs and protecting underlying computing infrastructure:
Keep security protection in mind when configuring computers and networks
Backup data and update software regularly;
Create system-wide data backup processes and keep programmes up to date with latest patches. This includes operating systems, applications, browsers, plug-ins, firmware and anti-virus tools;
Keep a ‘white list’ of software programmes that users are permitted to run and another list f those that risk carrying malicious code that staff are prohibited to use.
See Also: Meet Latest Ransomware: Crysis
Put user-focused strategies in place to ensure reliability of defence systems
Train users for secure operation of apps and devices;
Teach staff how to identity potentially malicious emails;
Conduct regular phishing attacks in order to educate employees;
Conduct regular risk and impact assessments in order to prioritise applications which can undergo downtime and, in the event of an attack, for how long.
Step 3: Monitor suspicious activity thoroughly
Use systems for surveillance of suspicious activity. These could include receipt of email messages from notorious sources or a noticeable and unexpected rise in traffic.
Step 4: Respond, recover, investigate, and track lessons learned
In the event of an attack, shut down computers and networks immediately;
When the threat is contained, contact the insurance provider a computer forensics expert and the FBI’s Internet Crime Complaint Centre;
Following the attack, IT professionals and clinicians should meet to try to identify the root of the attack in order to prevent a recurrence;
“Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users,” said Sittig and Singh wrote.
Image Credit: Pixabay
Published on : Tue, 26 Jul 2016
Print as PDF
Based on the long-established and reliable OTF/AS cryostat, the new OTF5000 brings the extensive range of Bright cryostats completely up to date. New styling coupled with improved user ergonomics, the latest blade systems in the ever-reliable and powerful...
The HAMILTON-T1 combines for the first time the functionality of a fully featured intensive care unit ventilator with the compactness and ruggedness required for transport. This is why the HAMILTON-T1 enables you to provide optimal ventilation therapy...
Certified Hospital Applications from Surgical Planning to Patient-Specific Treatment The Materialise Mimics Care Suite is the essential, certified platform for image-based planning and Medical 3D Printing in hospitals. With one package, you can address...
The Clini-RF is a new type of freezer designed to rapidly freeze specimens for sectioning or processing. It has a rapid freezer tank which can hold object holders as well as hexane for immersion of the specimens. The Clini-RF eliminates the need to use...
The fully featured ICU ventilator, HAMILTON-MR1, guarantees uncompromised continuous ventilation care from the ICU to the MRI scanner and back. Its reliability and high performance, with advanced lung-protective strategies and patient-adaptive modes,...