
Compliance suggestions for mitigating ransomware attacks, aftermath
In light of a major insurance company recently being hit with ransomware, the importance of protection, detection, and correction cannot be over emphasized.
Last month, a
In March, the
The FBI recommends never paying the ransom, as there is no guarantee that the scammer will send you the decryption key. Beyond that, the money you pay may be used to fund organized crime activity or acts terrorism while encouraging the future criminal activity by these cyber thieves.
In light of the uptick in and increasing severity of ransomware attacks, the following items should be considered as part of any ransomware checklist:
Item
Prevention
Post-Attack (Detection & Correction)
Comprehensive Policies and Procedures
Contact the FBI and other relevant law enforcement (ic3.gov)
Adequate technical, administrative, and physical safeguards
Contact supervisor and IT if detected by an employee.
This list is not meant to be comprehensive; however, it is a good starting point for any organization. The costs to any healthcare provider, business associate, or subcontractor can be significant. In addition to government investigations and penalties, class action lawsuits are time consuming and financially significant. Overall, it is imperative to implement adequate safeguards to detect ransomware attacks and be ready to respond in the event that one happens.
About the Author
Newsletter
Optimize your practice with the Physicians Practice newsletter, offering management pearls, leadership tips, and business strategies tailored for practice administrators and physicians of any specialty.














