Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":111909,"date":"2024-12-10T20:49:31","date_gmt":"2024-12-10T20:49:31","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/"},"modified":"2024-12-10T20:49:31","modified_gmt":"2024-12-10T20:49:31","slug":"protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/","title":{"rendered":"Protect Your Healthcare Facility By Understanding the Anatomy of a Ransomware Attack Tamer Baker"},"content":{"rendered":"

There used to be some honor among thieves. Threat actors, once upon a time, left healthcare providers alone to avoid the potential of killing a patient. Unfortunately, those times are behind us. Today, healthcare is among the top three industries targeted by ransomware. And the threat continues to grow. Last year Zscaler alone blocked nearly 4.5 million attacks, up from 3.8 million the previous year. Recovering from ransomware is expensive. The largest payout to a ransomware threat was $75 million and that does not include money lost to downtime, lost revenue and damage to provider reputation. <\/p>\n

The good news is that based on successful attacks we know the villains as well as their strategies and we have the technology to block their efforts. The Change Healthcare attack targeted a third party application widely used across healthcare organizations to facilitate payments. The application was infiltrated and data was encrypted, rendering it inaccessible by users. Ascension Health, one of the largest healthcare systems in the U.S. was breached when an employee unknowingly downloaded a malicious file which was able to move across the network, disrupting critical systems, including electronic health records (EHR), systems used for ordering tests and medications, and patient communication portals. <\/p>\n

In both cases an external facing system, one accessible by the internet, was to blame, proving the adage, \u201cif you are reachable, you are breachable.\u201d Luckily there are steps to take to decrease your \u201creachability.\u201d<\/p>\n

Ransomware Defense To prevent attacks and minimize damage there are actions you can take at each stage of the attack cycle. <\/p>\n

Minimize your attack surface – To do so you must hide, or proxy, applications and security appliances by pulling them off the internet. This means avoiding logins to VPNs or other internet-exposed systems and appliances. Phished credentials are no good if there is no where to enter them.
\nPrevent initial compromise \u2013 Attackers encrypt malware payloads. Plus, if someone gets into your system the first move is to encrypt everything they are doing so you cannot see what they are moving and where. It is difficult and extremely expensive [cost prohibitive] to do full decryption on firewalls so a better and easier solution is SaaS\/Cloud-based full SSL\/TLS inspection, browser isolation, advanced threat protection, as well as the use of sandboxes and deception decoys.
\nPrevent lateral movement \u2013 Utilizing a zero trust architecture, ensure users are only connecting to the apps they need and connecting directly to those apps versus connecting to the network.
\nStop data loss and malware delivery \u2013 If they still somehow make it through, make sure you have a data protection plan in place \u2013 endpoint, internet, email, CASB, etc. <\/p>\n

Efforts must also be made at seeing and blocking the command and control of attackers. Zscaler supports all of these efforts with cyber threat protection, data protection, zero trust networking, and risk management solutions. <\/p>\n

Threats Keep EvolvingToday\u2019s strongest defense is no match for the threats of tomorrow. As highlighted on our ThreatLabz Ransomware Report, organizations need to start preparing for: <\/p>\n

Highly targeted attack strategies. Malware files are uniquely customized for each organization.
\nVoice-based social engineering will introduce a new phishing vector
\nGenAI allows for the quick creation of advanced malware plus personalized attacks that can imitate trusted entities including vendors, banks, and even your children\u2019s school.
\nMore reporting of incidents as mandated by SEC rules for public and private companies alike<\/p>\n

For more details on how healthcare organizations can prepare for and prevent ransomware attacks check out our recent webinar, hosted by Zscaler\u2019s Healthcare CTO, Tamer Baker.\u00a0\u00a0<\/p>\n

\u200b[#item_full_content]\u00a0[[{“value”:”There used to be some honor among thieves. Threat actors, once upon a time, left healthcare providers alone to avoid the potential of killing a patient. Unfortunately, those times are behind us. Today, healthcare is among the top three industries targeted by ransomware. And the threat continues to grow. Last year Zscaler alone blocked nearly 4.5 million attacks, up from 3.8 million the previous year. Recovering from ransomware is expensive. The largest payout to a ransomware threat was $75 million and that does not include money lost to downtime, lost revenue and damage to provider reputation. <\/p>\n

The good news is that based on successful attacks we know the villains as well as their strategies and we have the technology to block their efforts. The Change Healthcare attack targeted a third party application widely used across healthcare organizations to facilitate payments. The application was infiltrated and data was encrypted, rendering it inaccessible by users. Ascension Health, one of the largest healthcare systems in the U.S. was breached when an employee unknowingly downloaded a malicious file which was able to move across the network, disrupting critical systems, including electronic health records (EHR), systems used for ordering tests and medications, and patient communication portals. <\/p>\n

In both cases an external facing system, one accessible by the internet, was to blame, proving the adage, \u201cif you are reachable, you are breachable.\u201d Luckily there are steps to take to decrease your \u201creachability.\u201d<\/p>\n

Ransomware Defense To prevent attacks and minimize damage there are actions you can take at each stage of the attack cycle. <\/p>\n

Minimize your attack surface – To do so you must hide, or proxy, applications and security appliances by pulling them off the internet. This means avoiding logins to VPNs or other internet-exposed systems and appliances. Phished credentials are no good if there is no where to enter them.
\nPrevent initial compromise \u2013 Attackers encrypt malware payloads. Plus, if someone gets into your system the first move is to encrypt everything they are doing so you cannot see what they are moving and where. It is difficult and extremely expensive [cost prohibitive] to do full decryption on firewalls so a better and easier solution is SaaS\/Cloud-based full SSL\/TLS inspection, browser isolation, advanced threat protection, as well as the use of sandboxes and deception decoys.
\nPrevent lateral movement \u2013 Utilizing a zero trust architecture, ensure users are only connecting to the apps they need and connecting directly to those apps versus connecting to the network.
\nStop data loss and malware delivery \u2013 If they still somehow make it through, make sure you have a data protection plan in place \u2013 endpoint, internet, email, CASB, etc. <\/p>\n

Efforts must also be made at seeing and blocking the command and control of attackers. Zscaler supports all of these efforts with cyber threat protection, data protection, zero trust networking, and risk management solutions. <\/p>\n

Threats Keep EvolvingToday\u2019s strongest defense is no match for the threats of tomorrow. As highlighted on our ThreatLabz Ransomware Report, organizations need to start preparing for: <\/p>\n

Highly targeted attack strategies. Malware files are uniquely customized for each organization.
\nVoice-based social engineering will introduce a new phishing vector
\nGenAI allows for the quick creation of advanced malware plus personalized attacks that can imitate trusted entities including vendors, banks, and even your children\u2019s school.
\nMore reporting of incidents as mandated by SEC rules for public and private companies alike<\/p>\n

For more details on how healthcare organizations can prepare for and prevent ransomware attacks check out our recent webinar, hosted by Zscaler\u2019s Healthcare CTO, Tamer Baker.”}]]\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

There used to be some honor among thieves. Threat actors, […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-111909","post","type-post","status-publish","format-standard","hentry","category-zenith-zscaler"],"yoast_head":"\nProtect Your Healthcare Facility By Understanding the Anatomy of a Ransomware Attack Tamer Baker - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Your Healthcare Facility By Understanding the Anatomy of a Ransomware Attack Tamer Baker\" \/>\n<meta property=\"og:description\" content=\"There used to be some honor among thieves. Threat actors, […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-10T20:49:31+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Protect Your Healthcare Facility By Understanding the Anatomy of a Ransomware Attack Tamer Baker\",\"datePublished\":\"2024-12-10T20:49:31+00:00\",\"dateModified\":\"2024-12-10T20:49:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/\"},\"wordCount\":1190,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"articleSection\":[\"Zenith: Zscaler\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/\",\"name\":\"Protect Your Healthcare Facility By Understanding the Anatomy of a Ransomware Attack Tamer Baker - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"datePublished\":\"2024-12-10T20:49:31+00:00\",\"dateModified\":\"2024-12-10T20:49:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect Your Healthcare Facility By Understanding the Anatomy of a Ransomware Attack Tamer Baker\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protect Your Healthcare Facility By Understanding the Anatomy of a Ransomware Attack Tamer Baker - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/","og_locale":"en_US","og_type":"article","og_title":"Protect Your Healthcare Facility By Understanding the Anatomy of a Ransomware Attack Tamer Baker","og_description":"There used to be some honor among thieves. Threat actors, […]","og_url":"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/","og_site_name":"JHC","article_published_time":"2024-12-10T20:49:31+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/"},"author":{"name":"","@id":""},"headline":"Protect Your Healthcare Facility By Understanding the Anatomy of a Ransomware Attack Tamer Baker","datePublished":"2024-12-10T20:49:31+00:00","dateModified":"2024-12-10T20:49:31+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/"},"wordCount":1190,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"articleSection":["Zenith: Zscaler"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/","url":"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/","name":"Protect Your Healthcare Facility By Understanding the Anatomy of a Ransomware Attack Tamer Baker - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"datePublished":"2024-12-10T20:49:31+00:00","dateModified":"2024-12-10T20:49:31+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/protect-your-healthcare-facility-by-understanding-the-anatomy-of-a-ransomware-attack-tamer-baker\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Protect Your Healthcare Facility By Understanding the Anatomy of a Ransomware Attack Tamer Baker"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/111909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=111909"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/111909\/revisions"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=111909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=111909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=111909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}