Get in touch

Would You Pay Ransom If Your Medical Equipment Was Hacked?

Would You Pay Ransom If Your Medical Equipment Was Hacked?

How strong is your IT security policy? Do you have the confidence your policies could stand up to a major attack? Most organizations do … until the unthinkable happens. 

You walk in and boot up your equipment, ready for another day at the office. But as different pieces of equipment warm up, you notice something is wrong. They don’t operate correctly. 

A small note appears telling you your equipment is now being held for ransom. They blink, giving you a choice: pay the price or lose your data forever. 

What would you do?

Studies show we’re working hard to combat malicious attacks. 85 percent of respondents said they have a plan in place to protect themselves from such attacks. But even with all of this work being done to combat potential threats, 25 percent say they’d be willing to pay the ransom in the event of a cyberattack. 

And we get it; we do. The thought of losing your data can be terrifying at best. When a cyberattack clearly sets out to undermine the data you hold most precious - your EHR database - you’ll do anything to keep it safe. 

The trouble is there are always two sides to playing this game. 

On your side, you work hard to create a functioning office. One where your patients and employees can easily access the system and do what they need to do. 

On the other side, hackers are working to find ways to get in. They have their own ulterior motives; it might be to sell the data for money, or it might just be for fun. 

How do you bring the two together to create a strategy that is all-encompassing for everyone? 

Employee training is the starting point. They are the weakest point of entry, and also your strongest defense. The more training they receive, the more they can avoid the problems in the first place. This is even more imperative today as almost everyone brings their own devices into play when accessing company data. 

It’s equally important to have reliable technology that can counter any attack. That means having up to date equipment, and installing patches and upgrades as soon as they are available. 

And finally, having a comprehensive disaster recovery plan ready and waiting. Attacks are less likely to occur when you’ve thought about them from every detail. This isn’t the time for the head-in-the-sand approach. 

The same studies from above show that companies are investing in employee education, security solutions, and threat intelligence like never before. Have we finally reached the point where as a society we realize that cybersecurity is no longer an option, but a necessity? 

Have you?

For IT Strategy, Cloud Conversion, or Help Desk Services reach out to us at Silver Linings Technology 360-450-4759.