Back to Blog Home

Cyber SecurityBy now you’ve heard, ransomware is prevailing against medical and dental practices, and the trend is likely not going to cease or lessen any time in the future. In fact, while I’m writing this I received and email with the subject line that says a ransomware attack froze eight years of police evidence. Osterman Research suggests that almost one out of every two organizations have been hit by the ransomware bug within the last 12 months. While these number might be a little high or overly stated, there are some numbers that are very eye opening.

In March 2016 alone there were 56,000 ransomware infections; $209 million was paid to criminals in the first quarter of 2016 and the average ransom demand was $679. To top that off, less than half of ransomware victims fully recover their data even with backups.

How is ransomware delivered? Email is the most prevalent way people receive ransomware. Emails with malicious links and malicious attachments account for 59 percent of ransomware infections, and according to the Osterman Research survey, users are more than twice as likely to infect their systems when clicking a link in an email than they are visiting an infected website directly.

Ransomware attacks are a type of malicious software (malware) that attempts to generate profit for attackers by encrypting a user or company’s files and demanding payment to decrypt them. Since 1989, when a PhD researcher developed a floppy disk version of ransomware that was physically mailed to hundreds of recipients throughout the world, (excluding the US,) ransomware has been an area of concern for IT professionals.

Ransomware encrypts a user’s data and holds it for ransom and can affect any computer device.

According to Symantec, a security software vendor, companies and organizations in general aren’t reporting the full extent of their breaches. In 2015, the firm reported a record-setting total of nine mega-breaches, and the reported number of exposed identities jumped to 429 million, from all sectors. But, also in 2015, more companies chose not to reveal the full extent of their data breaches; a conservative estimate of unreported breaches pushes the number of records lost to more than half a billion. Also reported in 2015, large businesses targeted for attack once were most likely to be targeted again at least three more times throughout the year. Businesses of all sizes are potentially vulnerable to targeted attacks. No business is without risk – even your dental practice.

You need to make sure you have a plan and are doing everything you can to protect yourself and your practice.

Five steps to protect your practice

An ounce of prevention is worth a pound of cure, as Ben Franklin once said. The same can be said here. Regarding ransomware and dental practices, prevention (and education and awareness) is the best defense. Practices must take the necessary steps and develop strategies to protect themselves now because there is a very good chance that an attack will occur. Thus, below there are five key ways that can help build a defensive in-depth strategy to protect against a ransomware attack.

  1. Maintain secure backups

Backing up your critical data should be as second-nature as brushing your teeth, but often those backup copies are not secured. If the backup data is in the same network (or not secured) and a ransomware attack reaches all the systems in your network, then the backups get encrypted as well. Having your backups under ransom is as good as not having backups at all. Consider carefully whether cloud or offline storage (DVD, tapes, or other means.) of backup data is appropriate for your organization.

  1. Advanced email scanning

Emailing filtering is common these days, but the threats are more sinister than offers of free vacations or free medications. Ransomware hackers are crafting new, zero day (brand new) attachments and phishing hacks to get into your systems.

Email is the easiest way into your network and is commonly the least secured. We have found that services like MimeCast give robust attachment transcription (making a Word doc into a PDF, for example) and more advanced virus and phishing filtering to help protect your end users.

  1. Network segmentation

Keeping critical data and servers segmented logically from computers that are used for web browsing and email keeps your critical data safe from ransomware attacks. Work with your local IT resource or vendor to put together a solid network segmentation configuration for your critical systems.

  1. Create a response plan

Knowing what to do (and not to do) is critical if and when an attack happens. You’ll want to have phone numbers handy, know where those secure backups are and how to get to them so you can recover quickly and efficiently. Ensure that the plan is written down and printed out (you don’t want the plan ransomed) and that it’s reviewed yearly at a minimum.

  1. Staff Training

At the end of the day it’s not the sophistication of an attack that determines its success, it’s the weakness of the end user. As programs from the Sans Institute teach us, the most important security measure is end-user training. End users need to know about:

  • Email attachment safety. Be suspicious of any attachments and only open if they’ve been screened by a third-party filtering solution.
  • Clickable URLs: Never click hyperlinks (URLs) contained in emails. If you feel that the email is legitimate then simply navigate to that location manually in your browser. Phishing emails that contain deceptive web addresses are an easy way to get ransomware into your network.
  • Social engineering: Beware of people (physically) interacting with your computer systems, as well as attempting to extract data from you over the phone pretending to be someone they are not. Require identification for anybody working on critical data systems in your office.

There is a lot more information on how to protect your practice from ransomware on the internet. The ADA and U.S. Department of Justice also have information on their sites that can give you additional information. Take the time to review this information and protect yourself and your practice. The investment made today could not only prevent your patients’ health information from being illegally disseminated, but it could also save your practice a ton of headaches and money in the future.

DentalPost is the dental industry’s premier and largest online and mobile job board.
We connect and educate more than850,000 job seekers in the U.S. and Canada to build better places to work through teams that excel.

Featured Posts

Want to Temp as a Dental Hygienist or Assistant? Use This Mindset Checklist for Success 

Posted June 21, 2019

Spend more time with family.  Have more time to pursue hobbies, go back to college, or write a book.  Earn extra income to supplement your current job.  Why do you want to temp as a dental assistant or hygienist? Temping in a dental office can be a super-convenient way to earn while maintaining a flexible […]

Read more

6 Ways to Take Advantage of a Slow Job Market

Posted May 24, 2019

So you’ve decided to find a new job—only to discover that the market is scarce. Job markets (like any market) ebb and flow. Some months, like September and October, are better than others because a lot of companies want to hire before the frenzy of the holidays. Other months, like June and July, aren’t so […]

Read more

5 Ways to Handle a Difficult Coworker

Posted May 10, 2019

Every working professional runs into a problematic coworker eventually. It’s simply the odds of working with other people. Not everyone you work with will mesh or vibe with your personality or work style. While you can solve a lot of these situations by just ignoring the person, bad coworkers can become a serious issue if […]

Read more