{"id":4068,"date":"2023-03-02T18:50:26","date_gmt":"2023-03-02T23:50:26","guid":{"rendered":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/?p=4068"},"modified":"2023-03-02T18:50:26","modified_gmt":"2023-03-02T23:50:26","slug":"where-else-can-ransomware-hit-4b","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/2023\/03\/02\/where-else-can-ransomware-hit-4b\/","title":{"rendered":"Where else can Ransomware hit? 4b"},"content":{"rendered":"<p>Ransomware is malware that essentially locks a computer to prevent data from being accessed. The only way to gain access to the system again is to pay the ransom. Why are hospitals the perfect target for these attacks? Well the answer is relatively simple. These organizations provide critical care to patients and rely heavily on the data within the systems to track medication dosage, symptoms, surgical information, etc. Without access to this information a patient\u2019s life can be in danger very quickly. Therefore, the hospital is likely to pay the ransom rather than delay in an attempt to get back into the system without it. This delay could result in a much larger payout for the hospital in lawsuits. Furthermore, hospital workers are extremely well trained in patient care, but are not as highly trained as it pertains to security. Therefore, in a rush to gather information or complete a chart, the individual may not notice a security breach. While ransomware is certainly an extreme example, it emphasizes the need to protect yourself online. There are a few ways that you can do this. The first and most obvious way is to create complex passwords that are changed often and not shared with others. This helps to prevent your accounts from being hacked. Within my organization, a security practice we have in place is notifying our IT team of any suspicious emails prior to clicking on them to ensure that they are not putting our computer or database at risk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware is malware that essentially locks a computer to prevent data from being accessed. The only way to gain access to the system again is to pay the ransom. Why are hospitals the perfect target for these attacks? Well the answer is relatively simple. These organizations provide critical care to patients and rely heavily on [&hellip;]<\/p>\n","protected":false},"author":29445,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[10531],"tags":[83759,555709,845068,845153,230155,722310,75042,669510],"class_list":{"0":"post-4068","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-student-post","7":"tag-customer","8":"tag-cybersecurity","9":"tag-digital-footprint","10":"tag-hospitals","11":"tag-malware","12":"tag-ransomware","13":"tag-safety","14":"tag-system","15":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts\/4068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/users\/29445"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/comments?post=4068"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts\/4068\/revisions"}],"predecessor-version":[{"id":4069,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/posts\/4068\/revisions\/4069"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/media?parent=4068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/categories?post=4068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis2101sec730spring2023\/wp-json\/wp\/v2\/tags?post=4068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}