2. Keyword- Awareness
• Increasing and diverse populations connecting to the internet
• Dramatically increasing vectors
• Increasingly available tools for hacking
• Increasing value of patient data, market price for one CC
record= 1.00US, one full medical record= 50.00US.
• Small hospitals are an exceptionally vulnerable target: low
budgets = weakened security.
3. The Changing Reality of Computing in Today’s World
makes continual training needed.
• Human nature
• We do not want barriers to our work,
• we seek the most expedient path,
• A call to action,
• respond to seemingly sincere requests for help. EX- Franklin
Jyubuti, displaced refugee from South Africa.
• People become victims, avoid blaming others- counter
productive, need an open environment of reporting.
4. • Human nature
• We do not want barriers to our work,
• we seek the most expedient path,
• A call to action,
• respond to seemingly sincere requests for help. EX- Franklin
Jyubuti, displaced refugee from South Africa.
• People become victims, avoid blaming others- counter
productive, need an open environment of reporting.
The Changing Reality of Computing in Today’s World
makes continual training needed.
5. • Human nature
• We do not want barriers to our work,
• we seek the most expedient path,
• A call to action,
• respond to seemingly sincere requests for help. EX- Franklin
Jyubuti, displaced refugee from South Africa.
• People become victims, avoid blaming others- counter
productive, need an open environment of reporting.
The Changing Reality of Computing in Today’s World
makes continual training needed.
6. The Changing Reality of Computing in Today’s World
makes continual training needed.
• Human nature
• We do not want barriers to our work,
• we seek the most expedient path,
• A call to action,
• respond to seemingly sincere requests for help. EX- Franklin
Jyubuti, displaced refugee from South Africa.
• People become victims, avoid blaming others- counter
productive, need an open environment of reporting.
7. The Changing Reality of Computing in Today’s World
makes continual training needed.
• Human nature
• We do not want barriers to our work,
• we seek the most expedient path,
• A call to action,
• respond to seemingly sincere requests for help. EX- Franklin
Jyubuti, displaced refugee from South Africa.
• People become victims, avoid blaming ourselves or others-
counter productive, need an open environment of reporting.
8. The Changing Reality of Computing in Today’s World
makes continual training needed.
• Human nature
• We do not want barriers to our work,
• we seek the most expedient path,
• A call to action,
• respond to seemingly sincere requests for help. EX- Franklin
Jyubuti, displaced refugee from South Africa.
• People become victims, avoid blaming ourselves or others-
counter productive, need an open environment of reporting.
9. The Changing Reality of Computing in Today’s World
makes continual training needed.
• Human nature
• We do not want barriers to our work,
• we seek the most expedient path,
• A call to action,
• respond to seemingly sincere requests for help. EX- Franklin
Jyubuti, displaced refugee from South Africa.
• People become victims, avoid blaming ourselves or others-
counter productive, need an open environment of reporting.
10. Keyword- Awareness
Cost 2015 2016
Healthcare 42,000,000 71,000,000
Hollywood Presbyterian Hospital said
it had paid $17,000 in ransom
money to regain access to files that
had been locked in a ransomware
attack.
Expect such attacks to increase, says James Scott,
senior fellow at the Institute for Critical
Infrastructure Security (ICIT), which recently
released a report on the ransomware threat to
organizations in critical infrastructure sectors.
“Hospitals are an easy target for many reasons,”
Scott says. “Employees typically lack cyber hygiene
training and their technology landscape, in most
cases, is eerily absent of layered security centric
protocols.“
Scott predicts that adversaries are going to start
using ransomware as a diversionary tactic while
they steal electronic health records and other
sensitive data from healthcare networks. “The
ransom will be secondary to the primary revenue
generated by the sale of the data,” Scott says.
Firms that fall victim to infection
from file encrypting ransomware
should simply pay the ransom, Joseph
Bonavolonta, an assistant special
agent with the FBI.
30. Keyword- Awareness= Defense
Watch what you click In most cases, computers are unwittingly infected
by users clicking on cleverly disguised malware links.
Browse trusted websites. Avoid suspicious-looking sites and be wary of
pop-up boxes that ask you to click on unfamiliar links.
Be wary of social media notifications
Scrutinize social media notifications and check links by hovering your
mouse over them to confirm link addresses before clicking.
If you suspect you are infected- UNPLUG, DO NOT SHUT DOWN!
Call for help!
What symptoms indicate a computer has been compromised?
Computer performs unusually slow
Computer reboots on its own
Web browser jumps to the wrong pages
Web browser won’t display certain pages
Emails aren’t displayed properly
Emails randomly disappear
Pop-up ads randomly display on your screen