How to
Brianna Gammons
Jun 2016

Ransomware Protection Toolkit for Healthcare Providers

Photo by Source

Ransomware Protection Toolkit for Healthcare Providers

How would your healthcare organization react if you experienced a ransomware attack? The following resources can help you determine how to react and how to avoid ransomware in the first place.

In the spirit of our new guide, Ransomware Protection 101: A Healthcare IT Handbook, we’ve put together a list of resources for IT and security professionals who work at hospitals and other healthcare providers.


The Resources You Need to Recover from, Deal with, and Prevent Ransomware

If you’ve been hit with ransomware...

  1. Focus on identifying and containing the infection. Here are the first five things you should do.
  2. Next, check to see if there is a decryption tool available. If so, you may be able to recover your encrypted files.
  3. Contact your local FBI field office and report the incident to the Bureau’s Internet Crime Complaint Center.

If you want to make sure you're prepared to deal with an attack...

  1. Take the time to develop an IT disaster recovery plan. Save time by downloading a free template from TechTarget.
  2. Don't forget HIPAA compliance. Check out this HIPAA Compliance Checklist to help make it a little easier.

If you want to prevent ransomware...

  1. Install up-to-date security software on your endpoints is key to protecting yourself from ransomware threats. To help you evaluate the endpoint protection landscape, we created an Endpoint Security Buyer’s Guide. Get questions to ask vendors, a checklist of things to do during a trial, plus a restoration cost calculator to figure out how much you’re spending to get machines back up and running after an attack.
  2. Check out your options for free antivirus protection for business use in this post from ComputerWorldUK. If you’re looking for protection to use on top of antivirus, learn more about anti-malware and anti-ransomware protection with Barkly. Our Early Access program is free for 60 days.
  3. Employee security awareness training is part of your front line of defense against ransomware. Explore this set of resources from Sophos, including a series of handouts and presentations to help train your employees.
  4. Identity and access management (IAM) solutions enable you to manage permissions and see what users are accessing at all times. To evaluate your Identity and Access Management solution, try going through this checklist from Arun Mehta of Avancer Corporation. Looking for a IAM tool? Browse this directory of Identity and Access Management vendors, tools and software solutions.
  5. A reliable backup strategy can help take the bite out of a ransomware attack. Here are four things to consider when using backup to recover from ransomware and three tips to make sure you’re ready for an attempted ransomware attack.
  6. Patch management can help keep your users safe from exploit kits, one of the primary delivery channels for ransomware. Learn about how to evaluate a patch management solution in this guide from TechTarget. For a more in depth look at patch management, this whitepaper from the SANS Institute will help develop your own patch management strategy. If you’re looking for a tool, Admin Arsenal offers a free version of PDQ Deploy so that you can silently install applications and patches to computers at your organization.


Next Steps

See if you’re prepared for ransomware with the checklist included in Ransomware Protection 101. It's a quick way to take stock of the current status of your security software, update and patch management strategy, employee awareness and training, backup storage, identity and access management process, and disaster recovery plan to see if they make the cut.

Brianna Gammons

Brianna Gammons

Brianna is helping us grow an active community of security beginners and experts alike. She is exploring topics like security in healthcare and how to keep companies safe from ransomware.


Close the gaps in your security

Stop paying for AV, get the strongest protection instead. See how Barkly blocks attacks that are getting past AV.

See a demo


Stay informed!

Get the latest security news, tips, and trends straight to your inbox.

Stay informed!

Get the latest security news, tips, and trends straight to your inbox.