{"id":33252,"date":"2020-03-30T02:57:00","date_gmt":"2020-03-30T06:57:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=33252"},"modified":"2020-03-30T02:57:00","modified_gmt":"2020-03-30T06:57:00","slug":"ransomware-hits-healthcare-hardest-preys-on-smbs","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2020\/03\/30\/ransomware-hits-healthcare-hardest-preys-on-smbs\/","title":{"rendered":"Ransomware hits healthcare hardest"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/www.ciodive.com\/editors\/sschwartz\/\">Samantha Ann Schwartz<\/a> &#8211; <strong>Ransomware<\/strong>&nbsp;targeted healthcare more than any other industry, accounting for 29%&nbsp;of total <strong>ransomware<\/strong> attacks in 2019, according to cyber insurer&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.beazley.com\/news\/2020\/beazley_breach_briefing_2020.html\" target=\"_blank\">Beazley&#8217;s 2020 Breach Briefing report<\/a>. Professional services (14%) and financial institutions (11%) rounded out the top three targets.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2014\/12\/10\/20\/56\/medical-563427__340.jpg\" alt=\"\" width=\"383\" height=\"255\"\/><\/figure><\/div>\n\n\n\n<p class=\"has-text-align-left\"><strong>Ransomware<\/strong> increased 131% from 2018 to 2019. About six in 10 attacks were aimed at small- and medium-sized businesses as they are &#8220;easier to exploit,&#8221; according to the report.<\/p>\n\n\n\n<p>Organizations restoring their systems after a cyber incident could unintentionally ruin an investigation. Beazley described a small healthcare provider that restored its environment after a&nbsp;ransomware&nbsp;attack. However, during the remediation, any forensic evidence for determining if data was stolen was also wiped clean.&nbsp;<\/p>\n\n\n\n<p> Beazley has historically seen ransomware limited to only data encryption. Now, ransomware is also stealing data, leading to data breaches.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.ciodive.com\/news\/ransomware-healthcare-data-breach\/574828\/&amp;ct=ga&amp;cd=CAEYAioUMTQyMjU4NjMyNTE0MDY5MTM4NTQyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AFQjCNGQgAwp-xnEfUz_9JBme8cZh9jY6A\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Samantha Ann Schwartz &#8211; Ransomware&nbsp;targeted healthcare more than any other industry, accounting for 29%&nbsp;of total ransomware attacks in 2019, according to cyber insurer&nbsp;Beazley&#8217;s 2020 Breach Briefing report. Professional services (14%) and financial institutions (11%) rounded out the top three <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2020\/03\/30\/ransomware-hits-healthcare-hardest-preys-on-smbs\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-33252","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=33252"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33252\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=33252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=33252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=33252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}