Part 2 - Policy
Part 2 - Policy
Part 2 - Policy
The ransomware cybersecurity policy is specially designed to emphasize the areas that are at particular
risk of ransomware as well as to extent the cybersecurity policies that already exist.
The main reason for the ransomware attacks in hospitals and the healthcare department is due to the
high cost that is in dollars. The other reason is the patient care of any interruption of service that makes
the hospital's high risk target of ransomware attacks. Span od systems are involved, from the records of
patients as well as billing to the equipment that is used for critical patient care. A large number of roles
are involved in hospital operations that provide a large attack area.
Objectives
The purpose of the ransomware cybersecurity policy is to facilitate rapid recovery and to decrease the
risk of any catastrophic ransomware attack on hospitals.
The policy involved the personnel who are part of cybersecurity, or they handle email or part of any
organization. Ransomware attacks protection needs awareness as well as action from a large group of
people. Implementation of this ransomware policy will help to limit, prevent as well as recover from the
attacks without any payment.
Currently, ransomware works by transmitted malware through emails. It is being executed on the
system of the end-user. It encrypts the user and system data with the private key. The data can not be
accessible by the user. It will only be decrypted if the user will pay to ransom. (1)
If the ransom is not paid and there is the information of theft, then the ransomware attacks focused on
the loss of the data. The document mainly focuses on the prevention of loss of data. The existing
cybersecurity policies deal with the prevention of theft data.
The shared data used by the hospitals. Records, billing, range of systems involved in patient care, and
normal IT functions are at the critical risk of ransomware.
HIPAA protected health information should be protected from loss and disclosure. This includes the
information of any individual’s record that was created and used. The variety of identifiers, as well as
various information that is recorded throughout the routine treatment and billing also. (2)
Furthermore, operational systems that are usually involved in patient care should also be protected—for
instance, monitoring devices of any patient and immediate management systems of patients.
General approach
There are several weaknesses of ransomware attacks that occur before the attack. The end-user can see
the email, and the user must open the email. The end-user must have un unpatched or unknown
vulnerability to allow the execution of ransomware code. It must have access to critical data for
encryption. The organization must lack the ability to detect, to isolate, and to recover from the attack of
ransomware quickly.
The approach of the problem is to make try to decrease the ability of ransomware. It reduces its ability
to infect the systems of hospitals and networks, to provide the specific strategy for recovering from any
infection, to limit the range of the impact when the attack occurs. Most of this approach overlaps with
already existing policies for the hospital.
Prevention
Limiting impact
Recovery
By the alignment of these elements, this policy helps in the reduction of ransomware attacks.
User classification
This document will be used directly or indirectly by the large group of security and hospital staff. It can
be used with a sharp division between end-users and cybersecurity staff.
Systems at risk
Ransomware attacks are unusual, and the aim of the attacker is not to steak the valuable information. Its
objective is to encrypt the available information.
Prevention:
Prevention consists of human and technical components. Currently, a ransomware attack does not occur
if the source of the attack is not systematically filtered through suspicious emails or suspicious emails
are blocked by email users.
The first step is to prevent email containing ransomware from reaching email users, the second step is
to train users not to open suspicious emails and the third step is to tighten the system to reduce the
ransomware malware's ability to compromise the system.
Evaluation:
The first line of defence in preventing attacks is end user ransomware and risk
awareness to help reduce the rate of ransomware incidents.
Limit Impact
The bad impact of a malware attack can be reduced by proper planning and mitigation. The aim is
basically to finish the malware, minimize the footprint of the data that the virus can access, and start the
recovery process. This process needs proper planning, financing, and constant practice.
Moreover, the process must include technical and process solutions to identify a malware attack and to
back up all data. The malware diagnosis process is in addition to existing cybersecurity processes for
malware detection.
From an information and organization engineering viewpoint, firewalls and other organization security
gadgets can be utilized to seclude what frameworks and applications can keep in touch with the
appropriately parceled information store to lessen the capacity of malware to peruse and scramble
information.
Planning:
The DRP must have the capacity to discover and separate malware-infected systems.
A DRP must have the capacity to retrieve from malware attacks, including the purifying of
contaminated systems and the reclamation of scrambled information.
The DRP must address patient-care implications, guaranteeing that patients are not affected
during a malware occasion.
The DRP must address joint effort with the business and business coherence partners to
distinguish and implement alternate (isolate) systems and information that can be utilized as
choices to support basic activities during an assault.
· Coordinate between various reaction partners and chief administration, including accomplice clinics,
providers, innovation merchants, and so on.
· Ensure that the association conveys timely communications to internal and external partners.
· Proactively work with medical clinic divisions to create and test techniques, guaranteeing that, patient
care and time-sensitive activities can continue during a malware attack.
We will divide the network and data storage resources to isolate systems access only to
resources required to function.
We will lessen the capacity of information storage systems to execute additional programming.
· Partner with Information Security to proactively execute reinforcement and recuperation capacities
that explicitly address the malware danger.
We will partition data stores to limit the range of data that anyone system can access.
Recovery
The recovery process can start after the stoppage of propagation and cause of the ransomware. The
only way it can be done is by producing information backups and a group response that not restores the
functions but also maintains the method in a standard way. The aim is to readily recover from the
ransomware attack without paying anything for the ransom.
Conclusion
Ransomwares target hospitals due to the level of attacking surface, HIPPA requirements concerning
patient information, the urgent requirement to manage functions, and the monetary assets to pay for
the ransoms. The effect of ransomware attacks can be lessened, and their number can be decreased by
proper planning, practice, investment, and response.
References
(1) https://blog.barkly.com/how-ransomware-infects-computers
(2) https://compliancy-group.com/protected-health-information-understanding-phi/
(3) https://www.provaltech.com/2018/07/best-practices-protecting-data-ransomware/
(4) https://avalution.com/addressing-the-ransomware-threat-at-hospitals-and-health-systems/
(5) https://blog.barkly.com/things-to-do-now-hospital-ransomware
(6) https://slate.com/technology/2018/06/how-hospitals-can-protect-themselves-against-
ransomware.html
(7) https://insights.sei.cmu.edu/sei_blog/2017/05/ransomware-best-practices-for-prevention-and-
response.html