SlideShare a Scribd company logo
1 of 11
Download to read offline
WHAT EVERY PHYSICIAN
NEEDS TO KNOW:
RANSOMWARE ATTACKS
2.
about
In a ransomware attack, your data
is held ransom. Cyber criminals
use software (ransomware) to take
control of and encrypt the data on
your network. The criminals then
threaten to destroy the data unless
you pay a ransom.
ABOUT
RANSOMWARE
ATTACKS
Health care professionals
are now the preferred targets
of these attacks.
3.
case study 1
CASE STUDY 1
A practice manager for a small group opened an email attachment
and immediately noticed that she could no longer open any files on her
computer. She received a pop-up alert with a ransom demand.
IT staff investigated and found that because several months had passed
since the last system back up, their patient data was irretrievable. The
group reluctantly paid the ransom.
4.
case study 1
CASE STUDY 1
(continued)
Three weeks later, the employee received another
ransomware notice. Again it was decided to pay the ransom,
which had doubled.
Prompted by the second attack, the group revised its process
to make sure current back ups would always be available.
They also added more layers of cyber security and trained
staff on how to avoid phishing emails.
Traditional IT security includes ๏ฌrewalls and antivirus software, but
these tools may no longer provide enough protection. Learn about data
protection and privacy issues and teach staff about what to avoid.
CASE STUDY 1
(continued)
5.
case study 1
6.
case study 2
CASE STUDY 2
A medium-sized medical practice was unable to access their legacy
practice management system. When IT was called, they found a ransom
demand on the server.
IT staff took down the network to prevent the spread of the ransomware.
A new server was restored from backup. Within two days, the practice
was functioning normally.
7.
case study 2
CASE STUDY 2
(continued)
Conducting frequent backups and ensuring the ability to
recover data is crucial to recovering from a ransomware
attack. Restorations should be tested regularly.
8.
case study 3
CASE STUDY 3
A physicianโ€™s staff returned from lunch to find their network encrypted,
along with a ransom demand. Patientsโ€™ protected health information had
been breached, and 30,000 patients were notified.
Before this incident, the physician believed that his practice was too
small to be hacked, insisting โ€œwho would want my data?โ€ The practice
has now invested heavily in new IT, cyber risk management, and cyber
security services.
Physicians and employees are the greatest vulnerability when it comes
to ransomware attacks. Simply clicking on a link, opening an attachment
or using weak or infrequently changed passwords can be the beginning
of a long and costly process.
CASE STUDY 3
(continued)
9.
case study 3
PROTECTION FOR A
NEW ERA OF MEDICINE
ABOUT TMLT:
With more than 20,000 health care professionals in its care, Texas Medical
Liability Trust (TMLT) provides malpractice insurance and related products
to physicians. Our purpose is to make a positive impact on the quality of
health care for patients by educating, protecting, and defending physicians.
www.tmlt.org
Find us on:
Ransomware attacks

More Related Content

What's hot

case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crimeParas Kansagara
ย 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
ย 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)phexcom1
ย 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomwareJawhar Ali
ย 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityEryk Budi Pratama
ย 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry RansomwareZoho Corporation
ย 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGSCrowdStrike
ย 
Ransomware
RansomwareRansomware
RansomwareNick Miller
ย 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowSkycure
ย 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
ย 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPESdaniyalqureshi712
ย 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligencemohamed nasri
ย 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
ย 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokeshLokesh Bysani
ย 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
ย 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK frameworkBhushan Gurav
ย 

What's hot (20)

Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
ย 
case study on cyber crime
case study on cyber crimecase study on cyber crime
case study on cyber crime
ย 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
ย 
Ransomware
RansomwareRansomware
Ransomware
ย 
The rise of malware(ransomware)
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
ย 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
ย 
Malware
MalwareMalware
Malware
ย 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
ย 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
ย 
TOR... ALL THE THINGS
TOR... ALL THE THINGSTOR... ALL THE THINGS
TOR... ALL THE THINGS
ย 
Ransomware
RansomwareRansomware
Ransomware
ย 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
ย 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
ย 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
ย 
Ransomeware
RansomewareRansomeware
Ransomeware
ย 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
ย 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
ย 
Ransomware by lokesh
Ransomware by lokeshRansomware by lokesh
Ransomware by lokesh
ย 
Cyber security
Cyber securityCyber security
Cyber security
ย 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
ย 

Similar to Ransomware attacks

A Secure Network Bridging the Gap
A Secure Network Bridging the GapA Secure Network Bridging the Gap
A Secure Network Bridging the GapColloqueRISQ
ย 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilaslicservernoida
ย 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept*****Dominic A Ienco
ย 
IRP on a Budget
IRP on a BudgetIRP on a Budget
IRP on a BudgetSean D. Goodwin
ย 
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!SecurityGen1
ย 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfforladies
ย 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attackskevinmass30
ย 
Cybersecurity Solution for a Drug Manufacturing Company.pdf
Cybersecurity Solution for a Drug Manufacturing Company.pdfCybersecurity Solution for a Drug Manufacturing Company.pdf
Cybersecurity Solution for a Drug Manufacturing Company.pdfNuvento Systems Pvt Ltd
ย 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsLondon School of Cyber Security
ย 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationIJERA Editor
ย 
The NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkThe NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkEMMAIntl
ย 
Healthcare_Security_White_Paper
Healthcare_Security_White_PaperHealthcare_Security_White_Paper
Healthcare_Security_White_PaperJames Maudlin
ย 
Project.pptx
Project.pptxProject.pptx
Project.pptxDhruv896840
ย 
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docxUnit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docxmarilucorr
ย 
ransome_case solved.pptx
ransome_case solved.pptxransome_case solved.pptx
ransome_case solved.pptxradhika457461
ย 
A cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetA cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetUltraUploader
ย 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superwormUltraUploader
ย 
Mansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docxMansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docxinfantsuk
ย 

Similar to Ransomware attacks (20)

A Secure Network Bridging the Gap
A Secure Network Bridging the GapA Secure Network Bridging the Gap
A Secure Network Bridging the Gap
ย 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas
ย 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
ย 
targeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-septtargeted-data-breach-bulletin-sept
targeted-data-breach-bulletin-sept
ย 
IRP on a Budget
IRP on a BudgetIRP on a Budget
IRP on a Budget
ย 
N018138696
N018138696N018138696
N018138696
ย 
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
SMS Security Unleashed: Your Toolkit for Bulletproof Fraud Detection!
ย 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
ย 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
ย 
Cybersecurity Solution for a Drug Manufacturing Company.pdf
Cybersecurity Solution for a Drug Manufacturing Company.pdfCybersecurity Solution for a Drug Manufacturing Company.pdf
Cybersecurity Solution for a Drug Manufacturing Company.pdf
ย 
How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
ย 
An Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an OrganizationAn Improved Method for Preventing Data Leakage in an Organization
An Improved Method for Preventing Data Leakage in an Organization
ย 
The NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework
ย 
Healthcare_Security_White_Paper
Healthcare_Security_White_PaperHealthcare_Security_White_Paper
Healthcare_Security_White_Paper
ย 
Project.pptx
Project.pptxProject.pptx
Project.pptx
ย 
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docxUnit III AssessmentQuestion 1 1. Compare and contrast two.docx
Unit III AssessmentQuestion 1 1. Compare and contrast two.docx
ย 
ransome_case solved.pptx
ransome_case solved.pptxransome_case solved.pptx
ransome_case solved.pptx
ย 
A cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internetA cooperative immunization system for an untrusting internet
A cooperative immunization system for an untrusting internet
ย 
A theoretical superworm
A theoretical superwormA theoretical superworm
A theoretical superworm
ย 
Mansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docxMansour Alirfan5632632IntroductionProposalResults.docx
Mansour Alirfan5632632IntroductionProposalResults.docx
ย 

More from Texas Medical Liability Trust

Addressing transgender health care disparities
Addressing transgender health care disparitiesAddressing transgender health care disparities
Addressing transgender health care disparitiesTexas Medical Liability Trust
ย 
Wernicke's Encephalopathy After Bariatric Surgery
Wernicke's Encephalopathy After Bariatric SurgeryWernicke's Encephalopathy After Bariatric Surgery
Wernicke's Encephalopathy After Bariatric SurgeryTexas Medical Liability Trust
ย 

More from Texas Medical Liability Trust (20)

TMB pain management rules
TMB pain management rulesTMB pain management rules
TMB pain management rules
ย 
Telemedicine: Managing your risks
Telemedicine: Managing your risksTelemedicine: Managing your risks
Telemedicine: Managing your risks
ย 
Cultural Competency
Cultural CompetencyCultural Competency
Cultural Competency
ย 
COVID-19 Re-opening Your Practice
COVID-19 Re-opening Your PracticeCOVID-19 Re-opening Your Practice
COVID-19 Re-opening Your Practice
ย 
Texas COVID-19 regulatory changes
Texas COVID-19 regulatory changesTexas COVID-19 regulatory changes
Texas COVID-19 regulatory changes
ย 
Strategies to Improve Patient Follow Up
Strategies to Improve Patient Follow UpStrategies to Improve Patient Follow Up
Strategies to Improve Patient Follow Up
ย 
Telemedicine and Telehealth
Telemedicine and TelehealthTelemedicine and Telehealth
Telemedicine and Telehealth
ย 
Medical Malpractice Claim Trends
Medical Malpractice Claim TrendsMedical Malpractice Claim Trends
Medical Malpractice Claim Trends
ย 
10 Things That Compromise Patient Data
10 Things That Compromise Patient Data10 Things That Compromise Patient Data
10 Things That Compromise Patient Data
ย 
Human Trafficking, Part 2
Human Trafficking, Part 2Human Trafficking, Part 2
Human Trafficking, Part 2
ย 
Human Trafficking, Part 1
Human Trafficking, Part 1Human Trafficking, Part 1
Human Trafficking, Part 1
ย 
Risk Management Trends
Risk Management TrendsRisk Management Trends
Risk Management Trends
ย 
Addressing transgender health care disparities
Addressing transgender health care disparitiesAddressing transgender health care disparities
Addressing transgender health care disparities
ย 
Keeping Your Email Secure
Keeping Your Email SecureKeeping Your Email Secure
Keeping Your Email Secure
ย 
Case Closed: HIPAA and patient privacy
Case Closed: HIPAA and patient privacyCase Closed: HIPAA and patient privacy
Case Closed: HIPAA and patient privacy
ย 
Googling Your Patients
Googling Your PatientsGoogling Your Patients
Googling Your Patients
ย 
CDC Guidelines for Prescribing Opioids
CDC Guidelines for Prescribing OpioidsCDC Guidelines for Prescribing Opioids
CDC Guidelines for Prescribing Opioids
ย 
Top 10 Risk Management Recommendations
Top 10 Risk Management RecommendationsTop 10 Risk Management Recommendations
Top 10 Risk Management Recommendations
ย 
Combating Physician Stress and Burnout
Combating Physician Stress and BurnoutCombating Physician Stress and Burnout
Combating Physician Stress and Burnout
ย 
Wernicke's Encephalopathy After Bariatric Surgery
Wernicke's Encephalopathy After Bariatric SurgeryWernicke's Encephalopathy After Bariatric Surgery
Wernicke's Encephalopathy After Bariatric Surgery
ย 

Recently uploaded

Jalandhar Female Call Girls Contact Number 9053900678 ๐Ÿ’šJalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 ๐Ÿ’šJalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 ๐Ÿ’šJalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 ๐Ÿ’šJalandhar Female Call...Call Girls Service Chandigarh Ayushi
ย 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girls Service Gurgaon
ย 
Call Girls Service Chandigarh Grishma โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort Se...
Call Girls Service Chandigarh Grishma โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort Se...Call Girls Service Chandigarh Grishma โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort Se...
Call Girls Service Chandigarh Grishma โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort Se...High Profile Call Girls Chandigarh Aarushi
ย 
VIP Kolkata Call Girl New Town ๐Ÿ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl New Town ๐Ÿ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl New Town ๐Ÿ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl New Town ๐Ÿ‘‰ 8250192130 Available With Roomdivyansh0kumar0
ย 
โค๏ธโ™€๏ธ@ Jaipur Call Girl Agency โค๏ธโ™€๏ธ@ Manjeet Russian Call Girls Service in Jai...
โค๏ธโ™€๏ธ@ Jaipur Call Girl Agency โค๏ธโ™€๏ธ@ Manjeet Russian Call Girls Service in Jai...โค๏ธโ™€๏ธ@ Jaipur Call Girl Agency โค๏ธโ™€๏ธ@ Manjeet Russian Call Girls Service in Jai...
โค๏ธโ™€๏ธ@ Jaipur Call Girl Agency โค๏ธโ™€๏ธ@ Manjeet Russian Call Girls Service in Jai...Gfnyt.com
ย 
Dehradun Call Girls Service โค๏ธ๐Ÿ‘ 9675010100 ๐Ÿ‘„๐ŸซฆIndependent Escort Service Dehradun
Dehradun Call Girls Service โค๏ธ๐Ÿ‘ 9675010100 ๐Ÿ‘„๐ŸซฆIndependent Escort Service DehradunDehradun Call Girls Service โค๏ธ๐Ÿ‘ 9675010100 ๐Ÿ‘„๐ŸซฆIndependent Escort Service Dehradun
Dehradun Call Girls Service โค๏ธ๐Ÿ‘ 9675010100 ๐Ÿ‘„๐ŸซฆIndependent Escort Service DehradunNiamh verma
ย 
No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...
No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...
No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...Vip call girls In Chandigarh
ย 
Call Girl Raipur ๐Ÿ“ฒ 9999965857 ใƒ…10k NiGhT Call Girls In Raipur
Call Girl Raipur ๐Ÿ“ฒ 9999965857 ใƒ…10k NiGhT Call Girls In RaipurCall Girl Raipur ๐Ÿ“ฒ 9999965857 ใƒ…10k NiGhT Call Girls In Raipur
Call Girl Raipur ๐Ÿ“ฒ 9999965857 ใƒ…10k NiGhT Call Girls In Raipurgragmanisha42
ย 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...Call Girls Noida
ย 
Call Now โ˜Ž 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now โ˜Ž 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now โ˜Ž 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now โ˜Ž 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.ktanvi103
ย 
Russian Call Girls in Chandigarh Ojaswi โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort ...Russian Call Girls in Chandigarh Ojaswi โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort ...High Profile Call Girls Chandigarh Aarushi
ย 
Call Girls Service Chandigarh Gori WhatsApp โค9115573837 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp โค9115573837 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp โค9115573837 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp โค9115573837 VIP Call Girls Chandi...Niamh verma
ย 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591adityaroy0215
ย 
Call Girl Price Amritsar โค๏ธ๐Ÿ‘ 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar โค๏ธ๐Ÿ‘ 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar โค๏ธ๐Ÿ‘ 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar โค๏ธ๐Ÿ‘ 9053900678 Call Girls in Amritsar SumanCall Girls Service Chandigarh Ayushi
ย 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Memriyagarg453
ย 
๐Ÿ’š๐Ÿ˜‹Mumbai Escort Service Call Girls, โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹Mumbai Escort Service Call Girls, โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹Mumbai Escort Service Call Girls, โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹Mumbai Escort Service Call Girls, โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹Sheetaleventcompany
ย 

Recently uploaded (20)

Jalandhar Female Call Girls Contact Number 9053900678 ๐Ÿ’šJalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 ๐Ÿ’šJalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 ๐Ÿ’šJalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 ๐Ÿ’šJalandhar Female Call...
ย 
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service GurgaonCall Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
Call Girl Gurgaon Saloni 9711199012 Independent Escort Service Gurgaon
ย 
Call Girl Dehradun Aashi ๐Ÿ” 7001305949 ๐Ÿ” ๐Ÿ’ƒ Independent Escort Service Dehradun
Call Girl Dehradun Aashi ๐Ÿ” 7001305949 ๐Ÿ” ๐Ÿ’ƒ Independent Escort Service DehradunCall Girl Dehradun Aashi ๐Ÿ” 7001305949 ๐Ÿ” ๐Ÿ’ƒ Independent Escort Service Dehradun
Call Girl Dehradun Aashi ๐Ÿ” 7001305949 ๐Ÿ” ๐Ÿ’ƒ Independent Escort Service Dehradun
ย 
Call Girls Service Chandigarh Grishma โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort Se...
Call Girls Service Chandigarh Grishma โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort Se...Call Girls Service Chandigarh Grishma โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort Se...
Call Girls Service Chandigarh Grishma โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort Se...
ย 
VIP Kolkata Call Girl New Town ๐Ÿ‘‰ 8250192130 Available With Room
VIP Kolkata Call Girl New Town ๐Ÿ‘‰ 8250192130  Available With RoomVIP Kolkata Call Girl New Town ๐Ÿ‘‰ 8250192130  Available With Room
VIP Kolkata Call Girl New Town ๐Ÿ‘‰ 8250192130 Available With Room
ย 
โค๏ธโ™€๏ธ@ Jaipur Call Girl Agency โค๏ธโ™€๏ธ@ Manjeet Russian Call Girls Service in Jai...
โค๏ธโ™€๏ธ@ Jaipur Call Girl Agency โค๏ธโ™€๏ธ@ Manjeet Russian Call Girls Service in Jai...โค๏ธโ™€๏ธ@ Jaipur Call Girl Agency โค๏ธโ™€๏ธ@ Manjeet Russian Call Girls Service in Jai...
โค๏ธโ™€๏ธ@ Jaipur Call Girl Agency โค๏ธโ™€๏ธ@ Manjeet Russian Call Girls Service in Jai...
ย 
Dehradun Call Girls Service โค๏ธ๐Ÿ‘ 9675010100 ๐Ÿ‘„๐ŸซฆIndependent Escort Service Dehradun
Dehradun Call Girls Service โค๏ธ๐Ÿ‘ 9675010100 ๐Ÿ‘„๐ŸซฆIndependent Escort Service DehradunDehradun Call Girls Service โค๏ธ๐Ÿ‘ 9675010100 ๐Ÿ‘„๐ŸซฆIndependent Escort Service Dehradun
Dehradun Call Girls Service โค๏ธ๐Ÿ‘ 9675010100 ๐Ÿ‘„๐ŸซฆIndependent Escort Service Dehradun
ย 
No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...
No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...No Advance 9053900678 Chandigarh  Call Girls , Indian Call Girls  For Full Ni...
No Advance 9053900678 Chandigarh Call Girls , Indian Call Girls For Full Ni...
ย 
Call Girl Raipur ๐Ÿ“ฒ 9999965857 ใƒ…10k NiGhT Call Girls In Raipur
Call Girl Raipur ๐Ÿ“ฒ 9999965857 ใƒ…10k NiGhT Call Girls In RaipurCall Girl Raipur ๐Ÿ“ฒ 9999965857 ใƒ…10k NiGhT Call Girls In Raipur
Call Girl Raipur ๐Ÿ“ฒ 9999965857 ใƒ…10k NiGhT Call Girls In Raipur
ย 
Call Girl Guwahati Aashi ๐Ÿ‘‰ 7001305949 ๐Ÿ‘ˆ ๐Ÿ” Independent Escort Service Guwahati
Call Girl Guwahati Aashi ๐Ÿ‘‰ 7001305949 ๐Ÿ‘ˆ ๐Ÿ” Independent Escort Service GuwahatiCall Girl Guwahati Aashi ๐Ÿ‘‰ 7001305949 ๐Ÿ‘ˆ ๐Ÿ” Independent Escort Service Guwahati
Call Girl Guwahati Aashi ๐Ÿ‘‰ 7001305949 ๐Ÿ‘ˆ ๐Ÿ” Independent Escort Service Guwahati
ย 
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
pOOJA sexy Call Girls In Sector 49,9999965857 Young Female Escorts Service In...
ย 
Call Now โ˜Ž 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now โ˜Ž 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now โ˜Ž 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now โ˜Ž 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
ย 
Russian Call Girls in Chandigarh Ojaswi โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort ...Russian Call Girls in Chandigarh Ojaswi โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort ...
Russian Call Girls in Chandigarh Ojaswi โค๏ธ๐Ÿ‘ 9907093804 ๐Ÿ‘„๐Ÿซฆ Independent Escort ...
ย 
Call Girls Service Chandigarh Gori WhatsApp โค9115573837 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp โค9115573837 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp โค9115573837 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp โค9115573837 VIP Call Girls Chandi...
ย 
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
VIP Call Girl Sector 88 Gurgaon Delhi Just Call Me 9899900591
ย 
College Call Girls Dehradun Kavya ๐Ÿ” 7001305949 ๐Ÿ” ๐Ÿ“ Independent Escort Service...
College Call Girls Dehradun Kavya ๐Ÿ” 7001305949 ๐Ÿ” ๐Ÿ“ Independent Escort Service...College Call Girls Dehradun Kavya ๐Ÿ” 7001305949 ๐Ÿ” ๐Ÿ“ Independent Escort Service...
College Call Girls Dehradun Kavya ๐Ÿ” 7001305949 ๐Ÿ” ๐Ÿ“ Independent Escort Service...
ย 
Call Girl Price Amritsar โค๏ธ๐Ÿ‘ 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar โค๏ธ๐Ÿ‘ 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar โค๏ธ๐Ÿ‘ 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar โค๏ธ๐Ÿ‘ 9053900678 Call Girls in Amritsar Suman
ย 
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near MeVIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
VIP Call Girls Noida Sia 9711199171 High Class Call Girl Near Me
ย 
Russian Call Girls in Dehradun Komal ๐Ÿ” 7001305949 ๐Ÿ” ๐Ÿ“ Independent Escort Serv...
Russian Call Girls in Dehradun Komal ๐Ÿ” 7001305949 ๐Ÿ” ๐Ÿ“ Independent Escort Serv...Russian Call Girls in Dehradun Komal ๐Ÿ” 7001305949 ๐Ÿ” ๐Ÿ“ Independent Escort Serv...
Russian Call Girls in Dehradun Komal ๐Ÿ” 7001305949 ๐Ÿ” ๐Ÿ“ Independent Escort Serv...
ย 
๐Ÿ’š๐Ÿ˜‹Mumbai Escort Service Call Girls, โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹Mumbai Escort Service Call Girls, โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹๐Ÿ’š๐Ÿ˜‹Mumbai Escort Service Call Girls, โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
๐Ÿ’š๐Ÿ˜‹Mumbai Escort Service Call Girls, โ‚น5000 To 25K With AC๐Ÿ’š๐Ÿ˜‹
ย 

Ransomware attacks

  • 1. WHAT EVERY PHYSICIAN NEEDS TO KNOW: RANSOMWARE ATTACKS
  • 2. 2. about In a ransomware attack, your data is held ransom. Cyber criminals use software (ransomware) to take control of and encrypt the data on your network. The criminals then threaten to destroy the data unless you pay a ransom. ABOUT RANSOMWARE ATTACKS Health care professionals are now the preferred targets of these attacks.
  • 3. 3. case study 1 CASE STUDY 1 A practice manager for a small group opened an email attachment and immediately noticed that she could no longer open any files on her computer. She received a pop-up alert with a ransom demand. IT staff investigated and found that because several months had passed since the last system back up, their patient data was irretrievable. The group reluctantly paid the ransom.
  • 4. 4. case study 1 CASE STUDY 1 (continued) Three weeks later, the employee received another ransomware notice. Again it was decided to pay the ransom, which had doubled. Prompted by the second attack, the group revised its process to make sure current back ups would always be available. They also added more layers of cyber security and trained staff on how to avoid phishing emails.
  • 5. Traditional IT security includes ๏ฌrewalls and antivirus software, but these tools may no longer provide enough protection. Learn about data protection and privacy issues and teach staff about what to avoid. CASE STUDY 1 (continued) 5. case study 1
  • 6. 6. case study 2 CASE STUDY 2 A medium-sized medical practice was unable to access their legacy practice management system. When IT was called, they found a ransom demand on the server. IT staff took down the network to prevent the spread of the ransomware. A new server was restored from backup. Within two days, the practice was functioning normally.
  • 7. 7. case study 2 CASE STUDY 2 (continued) Conducting frequent backups and ensuring the ability to recover data is crucial to recovering from a ransomware attack. Restorations should be tested regularly.
  • 8. 8. case study 3 CASE STUDY 3 A physicianโ€™s staff returned from lunch to find their network encrypted, along with a ransom demand. Patientsโ€™ protected health information had been breached, and 30,000 patients were notified. Before this incident, the physician believed that his practice was too small to be hacked, insisting โ€œwho would want my data?โ€ The practice has now invested heavily in new IT, cyber risk management, and cyber security services.
  • 9. Physicians and employees are the greatest vulnerability when it comes to ransomware attacks. Simply clicking on a link, opening an attachment or using weak or infrequently changed passwords can be the beginning of a long and costly process. CASE STUDY 3 (continued) 9. case study 3
  • 10. PROTECTION FOR A NEW ERA OF MEDICINE ABOUT TMLT: With more than 20,000 health care professionals in its care, Texas Medical Liability Trust (TMLT) provides malpractice insurance and related products to physicians. Our purpose is to make a positive impact on the quality of health care for patients by educating, protecting, and defending physicians. www.tmlt.org Find us on: