A year ago I wrote that with the then epidemic of "ransomware" attacks the Hackers had learned how to monetise remote attacks on Healthcare practices. That piece included detailed suggestions on minimum necessary practices and questions for suppliers and vendors.
Thirty Years in I.T. Theories, Ideas, Opinions.... Leveraging knowledge of the past to understand now. @SteveJCbr & stevej.cbr@gmail.com
Showing posts with label healthcare. Show all posts
Showing posts with label healthcare. Show all posts
2014/01/27
2013/01/26
Security: Computer Security for Business Continuity in Healthcare
If you run a Healthcare-realted Business, things changed in the last 6 months...
Ransomware is set to boom [0] and cyber-security is now part of our National Security Plan.
Businesses now have to secure their computers and data just as they secure their premises and goods.
It's not optional, fail to do so and you will go out of business, just when is the question.
Ask yourself this: "If my computers were destroyed, how long could I continue the business? At reduced capacity or at all?", then act accordingly.
i.e. Does anyone around the world see you as a high-value, exploitable target?
Especially those in low-income countries with employment problems: poverty corrupts, not just power or the love of money.
The Internet is defined by its explosive growth: A few For-Profit hackers have noticed Business Ransomware is an ideal way to monetise remote computer attacks & exploits.
The numbers of these attacks will now double every few months as word gets around, new "toolkits" are sold to them and they ramp up their activities.
Every business that can raise $5,000 and relies on its systems and data for daily operations is now in their sights. These people have no morals, ethics or compassion in their work: they want your money and don't care about the damage they cause or the impact of their actions. Appeals to them will fall on deaf ears. Neither believe that a single ransom payment will be the last you'll hear of them. Why would you trust the word of criminals who've already broken in and callously damaged your systems?
Ransomware is set to boom [0] and cyber-security is now part of our National Security Plan.
Businesses now have to secure their computers and data just as they secure their premises and goods.
It's not optional, fail to do so and you will go out of business, just when is the question.
Ask yourself this: "If my computers were destroyed, how long could I continue the business? At reduced capacity or at all?", then act accordingly.
i.e. Does anyone around the world see you as a high-value, exploitable target?
Especially those in low-income countries with employment problems: poverty corrupts, not just power or the love of money.
The Internet is defined by its explosive growth: A few For-Profit hackers have noticed Business Ransomware is an ideal way to monetise remote computer attacks & exploits.
The numbers of these attacks will now double every few months as word gets around, new "toolkits" are sold to them and they ramp up their activities.
Every business that can raise $5,000 and relies on its systems and data for daily operations is now in their sights. These people have no morals, ethics or compassion in their work: they want your money and don't care about the damage they cause or the impact of their actions. Appeals to them will fall on deaf ears. Neither believe that a single ransom payment will be the last you'll hear of them. Why would you trust the word of criminals who've already broken in and callously damaged your systems?
2013/01/11
Security: Healthcare systems are "soft-targets": the Next Big Exploit
Previous pieces on Security:
There are two ways to monetise e-Health Records:
- NBN: the business case for 100-1000Mbps symmetric for SOHO & SME
- Security: The Massive hole in the PCEHR system
- Cyberwar: paper-tiger or real threat?
- NBN, stuxnet and Security: It's worse than you can believe
- Cyberwar: Bush/O'Bama authorised Stuxnet
- The NBN and defending against Cyber warfare attacks.
- The NBN as an Essential Strategic Defence for Cyber-warfare.
- CyberWars, Governments and Internet Security
- Why new Secure Internet solutions are technically Hard
There are two ways to monetise e-Health Records:
- Identity Theft. Huge amount of high-quality info. Medicare Cards are worth 'points' as Govt. ID's.
- Ransomware: healthcare can't operate without its data and they print money by the truckload.
2012/12/13
Security: The Massive hole in the PCEHR system
In the last few days, three computer security stories have hit the news:
- At ADFA, hacking of 10,000 staff and student identity details.
- Credit-Card hacking of small Australian retailers by a Romanian ring [Radio National B'fast with AusCERT]
- A Gold Coast Medical Centre had its data encrypted and held to ransom by 'Russians' [Radio National B'fast]
These may seem small, incidental stories, but they are signs of something much darker. At the end of 2004 the Hackers Turned Pro [and a 2007 piece]: now they're after the money, not publicity nor headlines. In fact, rather the reverse, like special tactical units, military or police, they now want to go completely undetected - to avoid detection, to be completely stealthy.
Subscribe to:
Posts (Atom)