Ransomware in hospital setting has evolved in a dangerous fashion in the year since Ron's webinar on the subject in April 2016.
According to a report released by the Ponemon Institute earlier this year, 90 percent of health care organizations suffer data breaches. Close to 45 percent of all data breaches in the industry are due to criminal activity such as nation-state cyber espionage units; ransomware; malicious insiders; and physical theft of patient information, clinical research and pharmaceutical formulations.
This up-to-date session examines recent ransomware occurrences across both hospital software and devices, reviews how they happened and gives you steps to take to lessen the chance of one of the new breed of ransomware attacks at your institution.
At the completion of this program, participants will understand:
- How ransomware is evolving and why health care is a tempting target.
- Recent ransomware instances in health care institutions.
- Potential medical device hacks and their effect on patient safety.
- New threats presented at the Blackhat 2016 conference (such as use of drones to sniff hospital networks)
- Can HVAC systems be hacked?
- Can other equipment, with an IP address, be hacked?
- An update on HIPAA and ransomware.
- What medical devices are particularly at risk.
- What a ransomware attack looks like in real time.
- TorrentLocker, CTB Locker, TeslaCrypt and JBoss attacks.
- Potential future patient safety issues.
- Mac and Linux vulnerabilities, as well as PCs.
- What can health care institutions do to prevent ransomware?
- Ransomware in a web browser and PDFs.
- How hackers harvest data from LinkedIn profiles.
- How employee education is a superior preventative.
- Seven practices all employees should know to prevent ransomware.