Every user is moving towards digitization. The user keeps data secure on his or her computer. But what if these data are hijacked. A ransomware is one of the software virus that hijacks users data. Recently, the   Ransomware virus software has spread like a cyclone. A cyclone wind creates atmospheric instability; likewise, ransomware creates computer data instability. A ransomware may lock the system in a way which is not for a knowledgeable person to reverse. It not only targets home computers but the business also gets affected. It encrypts data in such a way that normal person can no longer decrypt. A person has to pay ransom to decrypt it. But it does not generate that files will be released.

These attacks are often launched to steal money, data, or intellectual property, but increasingly the aim is to cause overt disruption or political impact. They are often transnational and state-sponsored; attributing them to individuals can be difficult. Many attacks are undetected or unreported, and only a small minority enter the public domain; among recent examples are the major breaches at TalkTalk, Mossack Fonseca, the US Democratic National Committee, and Yahoo.

Particularly, Healthcare faces even larger risks than other sectors because of inherent weaknesses in its security posture.Healthcare systems around the world have rightly identified the huge potential for digital technology to improve clinical outcomes and transform care delivery. Consequently, It is one of the most targeted sectors globally; 81% of 223 organizations surveyed, and >110 million patients in the US had their data compromised in 2015 alone. Only half of these providers think that they are capable of defending themselves from cyber-attack, and there has been a 300% increase in attacks in the past three years, for those conducting cyber-attacks the healthcare sector is an attractive target for two simple reasons: it is a rich source of valuable data, and it is a soft target.

Protective measures to lessen ransomware threats include:

  • Ensuring anti-virus software is up-to-date.
  • Implementation of data back-up and recovery plan for maintaining copies of sensitive or proprietary data in a secure location.
  • Scrutinizing links in emails, and never opening attachments in unsolicited emails.
  • Downloading free software from trusted sites.
  • Enabling automated patches for operating system and Web browser.

Threats like WannaCry can be reduced by following preventive measures. Once such type of attack occurred, Disaster Recovery teams should come to picture with countermeasure steps. It is difficult to stop a cracker from launching attacks, but exercising defensive measures can prevent attacks. Investment in network security needs to be increased in order to increase network security and losses due to cyber-attacks.

134 total views, 2 views today

Get Free Email Updates..!
Join us for FREE to get instant email updates..! GobsInfo- Everything Unlimited
We hate spam. Your email address will not be sold or shared with anyone else.