What steps would you take to prevent a similar attack

Assignment Help Business Management
Reference no: EM133396193

Case Study: Background: A general medical and surgical hospital that originally opened in 1924 as Hollywood Hospital. It later became known as Queen of Angels-Hollywood Presbyterian when two hospitals merged in 1998. It was sold to South Korean CHC Medical Group in 2004 and currently has 424 beds and more than 500 doctors who saw 16,175 patients, according to data from the latest year available.

How it Happened: According to Wired Magazine, the computer system was hit by a ransomware virus called Locky, which locks users out and won't send a decrypting key unless a ransom is paid. Since the President and CEO Allen Stefanek stated that the attack was random and Symantec says Locky is spread usually via a malicious Word document disguised as an invoice, it's very likely the attack occurred because an employee mistakenly clicked on an email attachment that was actually a phishing scam.

While who sent it, and who opened it wasn't reported when the email was sent, on February 5, 2016 some members of the staff at Hollywood Presbyterian reported to their supervisors that they were unable to access the network. In order for the hospital to regain access, the ransomware demanded 40 Bitcoin (approximately $17,000).

Immediately, an internal emergency was declared and the computer system taken offline. Some departments, including Radiation Oncology were told not to turn on their computers at all. Doctors told reporters they were unable to access patient's medical histories and could not share x-rays, CT scans, and other medical tests. Some patients were diverted to nearby hospitals, and staff had to resort to doing patient admissions and other record-keeping by pen and paper.

The Locky screen of death. Photo: Palo Alto Networks

NBC4 first reported the breach on February 12, 2016, and stated that both the LAPD and FBI had begun an investigation. However, the LA Times stated in a later report that law enforcement wasn't notified about the breach until after the hospital had already paid the ransom. According to Hollywood Presbyterian Medical Center's official statement, all services were restored on February 15, ten days after the attack.

"All systems currently in use were cleared of the malware and thoroughly tested. We continue to work with our team of experts to understand more about this event," Stefanek said in the statement.

Aftermath: No further breaches of Hollywood Presbyterian Medical Center have been reported and things appear to have gone back to "normal." IT experts have concluded that Hollywood Presbyterian Medical Center did not have any backup data available and, due to the widespread infection of their system, likely had a very weak security infrastructure. The hospital has kept mum as to its plans for security and education.

Hollywood Presbyterian Medical Center has middling-to-negative reviews on Google and Yelp, although none seem to be related to the ransomware attack. Administrative decisions have got them in trouble before: in 2007, they paid a million dollar fine for admitting to dumping patients on Skid Row.

The successful attack and lucrative payout has likely emboldened the criminals, who have not yet been identified or caught, to continue their terrorism of hospitals. Indeed, Palo Alto Networks observed nearly half a million unique sessions of Locky shortly after the Hollywood Presbyterian attack; Symantec stated it had already destroyed 5 million emails containing the virus by February 17.

Question: Using what you have read in the text and other sources throughout the course, what steps would you take to prevent a similar attack and/or limit its damage and disruption? You may do some outside research during the exam if you wish. For full credit, your answer should include at least THREE preventative or limiting measures.

Reference no: EM133396193

Questions Cloud

Describe health service administration within the health : Describe health service administration within the health industry and how could it impact continual quality improvement efforts as a professional in the field
How to demonstrate mise en place activities when preparing : How to demonstrate mise en place activities when preparing a Thai beef salad? Is it necessary to put the method and steps of preparing the dressing
How would a carbon tax on manufacturers impact prices : In the switch from ICE to BEV, carbon emissions switch from buyer back to the manufacturer. How would a carbon tax on manufacturers impact prices?
Identify how you would use budget data to reduce costs : Identify how you would use budget data to reduce costs and improve operational performance. Please include at least 2 scholarly peer reviewed references
What steps would you take to prevent a similar attack : what you have read in the text and other sources throughout the course, what steps would you take to prevent a similar attack and/or limit its damage
Should mona be able to terminate her pregnancy without : Should Mona be able to terminate her pregnancy without parental consent? Is the law ethically just?
Compute the savings-investment ratio : The lifetime of the project will be 10 years with a cashflow stream of 2,000 per year and an interest rate of 6.77. Compute the Savings/Investment ratio.
What is the expected value of this contract : What is the expected value of this contract? Now, EZ learns that it can obtain a seismic study 0f the property that would specify whether piers have to be sunk
Description of pain theories, description of types of pain : Description of pain theories, description of types of pain, and treatment methods used for each type of pain

Reviews

Write a Review

Business Management Questions & Answers

  Critical forces and the steps of the decision making

Why the decision making is important in digital resolution, industrial resolution and critical forces and the steps of the decision making?

  Think of examples of controlling performance

Think of examples of controlling performance in your daily life. Do you control your use of time? Use of money?

  Experience outside the classroom

Internship course question: What can you do to build on your experience outside the classroom? How will this enhance your career?

  Product warranty

Have you ever purchased a product and a few days after the warranty expires the product breaks? What are your thoughts around this?

  What will be the new equilibrium level

What will be the new equilibrium level of income if planned investment spending increases by $500?

  Find an instance of a cyber crime

Find an instance of a cyber crime which was committed by "Organized Crime" and assess the use of the Attacker Methodology.

  Understand the job responsibilities of the job

The Human Resources (HR) Department staff perform a myriad of duties in an organization. One of their most important functions is recruiting the right person fo

  Implement a historical change grid at the top of document

Document several cloud services needed for this project Create a flow chart of the course lab application Implement a historical change grid at the top of the

  What is the scope of work plan in management attribution

1.what are the score card point that render the relevance of the time objectivity factor in any management body in setting and planning goals?

  What are the manager roles in a development system

What are the manager's roles in a development system? Which role do you think is most difficult for the typical manager?

  Determine student-centered approaches

State the approach you support: teacher-centered or student-centered education. Briefly summarize your point of view, including the philosophies of education

  List some key sources of export assistance

List some key sources of export assistance. How can these sources be useful to small business firms?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd