Cargando…
A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks
Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user’s computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup;...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Schattauer
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4941865/ https://www.ncbi.nlm.nih.gov/pubmed/27437066 http://dx.doi.org/10.4338/ACI-2016-04-SOA-0064 |
_version_ | 1782442354624430080 |
---|---|
author | Sittig, Dean F. Singh, Hardeep |
author_facet | Sittig, Dean F. Singh, Hardeep |
author_sort | Sittig, Dean F. |
collection | PubMed |
description | Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user’s computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users. |
format | Online Article Text |
id | pubmed-4941865 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | Schattauer |
record_format | MEDLINE/PubMed |
spelling | pubmed-49418652016-07-19 A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks Sittig, Dean F. Singh, Hardeep Appl Clin Inform State of the Art / Best Practice Paper Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user’s computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users. Schattauer 2016-06-29 /pmc/articles/PMC4941865/ /pubmed/27437066 http://dx.doi.org/10.4338/ACI-2016-04-SOA-0064 Text en © The Authors 2016 http://creativecommons.org/licenses/by/3.0/ This article is distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use and redistribution provided that the original author and source are credited. |
spellingShingle | State of the Art / Best Practice Paper Sittig, Dean F. Singh, Hardeep A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks |
title | A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks |
title_full | A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks |
title_fullStr | A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks |
title_full_unstemmed | A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks |
title_short | A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks |
title_sort | socio-technical approach to preventing, mitigating, and recovering from ransomware attacks |
topic | State of the Art / Best Practice Paper |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4941865/ https://www.ncbi.nlm.nih.gov/pubmed/27437066 http://dx.doi.org/10.4338/ACI-2016-04-SOA-0064 |
work_keys_str_mv | AT sittigdeanf asociotechnicalapproachtopreventingmitigatingandrecoveringfromransomwareattacks AT singhhardeep asociotechnicalapproachtopreventingmitigatingandrecoveringfromransomwareattacks AT sittigdeanf sociotechnicalapproachtopreventingmitigatingandrecoveringfromransomwareattacks AT singhhardeep sociotechnicalapproachtopreventingmitigatingandrecoveringfromransomwareattacks |