{"id":667,"date":"2017-09-06T15:58:16","date_gmt":"2017-09-06T19:58:16","guid":{"rendered":"http:\/\/www.eclipsepracticemanagementsoftware.com\/blog\/?p=667"},"modified":"2017-09-06T15:58:16","modified_gmt":"2017-09-06T19:58:16","slug":"ransomware-a-real-threat","status":"publish","type":"post","link":"http:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/","title":{"rendered":"Ransomware: A Real Threat"},"content":{"rendered":"<p>Ransomware attacks are making headlines more and more.\u00a0 The 2016 statistics are startling; more than 4,000 ransomware attacks occurred daily.\u00a0 Why is ransomware so popular with cybercriminals?\u00a0 Because it works!\u00a0 Ransomware is now a billion-dollar industry and growing.<\/p>\n<p>How does the ransomware infect a computer system?\u00a0 There are three main ways a computer system is infected by ransomware:<\/p>\n<ol>\n<li>By opening an email and clicking on an attachment.\u00a0 Typically, the attachment looks legitimate, like an invoice or an electronic fax, but instead it contains the malicious ransomware code.<\/li>\n<li>An email might contain a legitimate-looking URL, but once clicked on, one is directed to a website that infects the computer with the malicious software.<\/li>\n<li>The newest and most sophisticated way is to seed legitimate websites with malicious code, taking advantage of unpatched software on the victim\u2019s computer.<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong>It\u2019s that easy! \u00a0Once the infection hits the system, the malware begins encrypting all data that resides on the computer including data within the network (i.e. other computers, backup drives, attached drives).<\/p>\n<p>Typically, the victim isn\u2019t aware of the attack until they can no longer access their files and start receiving computer messages demanding the ransom in exchange for the decryption key. Ransoms can be in the hundreds of thousands of dollars, which is paid in bitcoins to provide anonymity.<\/p>\n<p>Although the FBI doesn\u2019t recommend paying the ransom, many victims pay it in order to get back to business.\u00a0\u00a0 Not only is there the financial pain of having to pay the ransom, but also the burden of downtime costs and loss of productivity.\u00a0 Plus, once the ransom is paid the victim now has the financial burden of insuring their system is upgraded to prevent another attack. \u00a0\u00a0Plus, unfortunately, there are accounts of victims paying the ransom, but never getting the decryption key to unlock their system.<\/p>\n<p>One may never be able to be completely protected against an attack. Below, are some of the key steps to help prevent and prepare.<\/p>\n<ul>\n<li>Implement a training program for your staff on the threat of ransomware and how a system may get infected. Important facts:\n<ul>\n<li>Staff should not open email attachments unless it\u2019s expected or sent from a reliable source. If in doubt, have staff contact sender to confirm.<\/li>\n<li>Stop web browsing by staff to avoid phishing campaigns, suspicious website and other scams.<\/li>\n<\/ul>\n<\/li>\n<li>Be sure your firewalls, antivirus, antimalware and anti-exploit security programs always stay up-to-date. Be sure your antivirus and antimalware are set to conduct regular scans automatically.<\/li>\n<li>Always upgrade your operating system, software and firmware to the latest version. Unpatched programs leave the system open to threats.<\/li>\n<li>Perform daily secure backups of your critical data to a USB drives, an external hard drives and\/or a cloud storage. If using a drive, be sure to disconnect it from the network after backup to prevent that device from being hacked.<\/li>\n<li>Test your backups regularly to ensure you have the data when you need it most.<\/li>\n<\/ul>\n<p>Being prepared and having a plan is your best line of defense. For more information and a detailed list of steps to help prevent ransomware, please review <u>How to Protect Yourself from Ransomware<\/u> created by the FBI \u00a0<a href=\"https:\/\/www.justice.gov\/criminal-ccips\/file\/872771\/download\">https:\/\/www.justice.gov\/criminal-ccips\/file\/872771\/download<\/a><\/p>\n<p>Cloud backup is crucial in fighting ransomware. ECLIPSE has partnered with DataHEALTH, the leading provider of cloud backup to the healthcare industry.\u00a0 DataHEALTH is the ONLY cloud backup provider to be URAC HIPAA Security Business Associate and National Institute Standards and Technology FIPS 140-2 encryption certified.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware attacks are making headlines more and more.\u00a0 The 2016 statistics are startling; more than 4,000 ransomware attacks occurred daily.\u00a0 Why is ransomware so popular with cybercriminals?\u00a0 Because it works!\u00a0 Ransomware is now a billion-dollar industry and growing. How does &hellip; <a href=\"http:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[12,10],"tags":[27],"class_list":["post-667","post","type-post","status-publish","format-standard","hentry","category-general","category-hipaa","tag-hipaa-compliance"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware: A Real Threat - ECLIPSE Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: A Real Threat - ECLIPSE Blog\" \/>\n<meta property=\"og:description\" content=\"Ransomware attacks are making headlines more and more.\u00a0 The 2016 statistics are startling; more than 4,000 ransomware attacks occurred daily.\u00a0 Why is ransomware so popular with cybercriminals?\u00a0 Because it works!\u00a0 Ransomware is now a billion-dollar industry and growing. How does &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"ECLIPSE Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-06T19:58:16+00:00\" \/>\n<meta name=\"author\" content=\"Carol Sites\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carol Sites\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/\",\"url\":\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/\",\"name\":\"Ransomware: A Real Threat - ECLIPSE Blog\",\"isPartOf\":{\"@id\":\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/#website\"},\"datePublished\":\"2017-09-06T19:58:16+00:00\",\"author\":{\"@id\":\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/#\/schema\/person\/bd1102f1e74eb1896af2a4dc73c64451\"},\"breadcrumb\":{\"@id\":\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: A Real Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/#website\",\"url\":\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/\",\"name\":\"ECLIPSE Blog\",\"description\":\"Direct from the developers... Mike Norworth &amp; Dr. Karen Walters. D.C.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/#\/schema\/person\/bd1102f1e74eb1896af2a4dc73c64451\",\"name\":\"Carol Sites\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e8dc7af14cf582918aa4613362dfbc6664893c4dff716cf23b9fa393d60024eb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e8dc7af14cf582918aa4613362dfbc6664893c4dff716cf23b9fa393d60024eb?s=96&d=mm&r=g\",\"caption\":\"Carol Sites\"},\"sameAs\":[\"http:\/\/www.datahealth.com\"],\"url\":\"http:\/\/eclipsepracticemanagementsoftware.com\/blog\/author\/csites\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware: A Real Threat - ECLIPSE Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware: A Real Threat - ECLIPSE Blog","og_description":"Ransomware attacks are making headlines more and more.\u00a0 The 2016 statistics are startling; more than 4,000 ransomware attacks occurred daily.\u00a0 Why is ransomware so popular with cybercriminals?\u00a0 Because it works!\u00a0 Ransomware is now a billion-dollar industry and growing. How does &hellip; Continue reading &rarr;","og_url":"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/","og_site_name":"ECLIPSE Blog","article_published_time":"2017-09-06T19:58:16+00:00","author":"Carol Sites","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Carol Sites","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/","url":"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/","name":"Ransomware: A Real Threat - ECLIPSE Blog","isPartOf":{"@id":"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/#website"},"datePublished":"2017-09-06T19:58:16+00:00","author":{"@id":"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/#\/schema\/person\/bd1102f1e74eb1896af2a4dc73c64451"},"breadcrumb":{"@id":"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/2017\/09\/06\/ransomware-a-real-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware: A Real Threat"}]},{"@type":"WebSite","@id":"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/#website","url":"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/","name":"ECLIPSE Blog","description":"Direct from the developers... Mike Norworth &amp; Dr. Karen Walters. D.C.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/#\/schema\/person\/bd1102f1e74eb1896af2a4dc73c64451","name":"Carol Sites","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eclipsepracticemanagementsoftware.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e8dc7af14cf582918aa4613362dfbc6664893c4dff716cf23b9fa393d60024eb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e8dc7af14cf582918aa4613362dfbc6664893c4dff716cf23b9fa393d60024eb?s=96&d=mm&r=g","caption":"Carol Sites"},"sameAs":["http:\/\/www.datahealth.com"],"url":"http:\/\/eclipsepracticemanagementsoftware.com\/blog\/author\/csites\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p1Kj8h-aL","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"http:\/\/eclipsepracticemanagementsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/eclipsepracticemanagementsoftware.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/eclipsepracticemanagementsoftware.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/eclipsepracticemanagementsoftware.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"http:\/\/eclipsepracticemanagementsoftware.com\/blog\/wp-json\/wp\/v2\/comments?post=667"}],"version-history":[{"count":4,"href":"http:\/\/eclipsepracticemanagementsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/667\/revisions"}],"predecessor-version":[{"id":671,"href":"http:\/\/eclipsepracticemanagementsoftware.com\/blog\/wp-json\/wp\/v2\/posts\/667\/revisions\/671"}],"wp:attachment":[{"href":"http:\/\/eclipsepracticemanagementsoftware.com\/blog\/wp-json\/wp\/v2\/media?parent=667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/eclipsepracticemanagementsoftware.com\/blog\/wp-json\/wp\/v2\/categories?post=667"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/eclipsepracticemanagementsoftware.com\/blog\/wp-json\/wp\/v2\/tags?post=667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}