What You Should Do If Your Ambulatory Surgery Center Is A Victim Of A Cyber-Attack

More often than not, freestanding surgical centers lack the right information technology resources to keep them safe against a range of issues, including but not limited to malware infections, viruses, and cyber-attacks. Up until recently, ambulatory surgical centers have been slow to adopt and implement innovative technologies, such as electronic health records. But nowadays, there’s a major push towards integrating the latest and greatest, such as anesthesia machines with information systems, to provide the care patients need in a much more effective way. This is great, except it introduces entirely new risks that aren’t typically accounted for and safeguarded against.

What Should You Do in the Aftermath of a Cyber-Attack?

Reports show that ransomware and other forms of cybercrime are increasing at an incredible rate, and unfortunately, healthcare is amongst the top targeted industries. Naturally, prevention is vital when it comes to staying safe. You need a multi-layered approach that encompasses firewalls, anti-virus software, intrusion detection software, and other forms of cybersecurity technology to stay safe. But if all fails and a cyber-attack occurs, what do you do? Here’s our recommendations:

  1. Execute Your Response and Mitigation Plans
    Your response and mitigation plans should be executed right away – outlining the steps necessary to fix any technical issues, prevent the further disclosure of protected health information, and recover your systems as soon as possible. This is typically done with your own information technology staff or an outside, third-party company.
  2. Report the Incident to the Relevant Law Enforcement Agencies
    If you don’t already have a list of the relevant law enforcement agencies to report an incident to, make sure you create one. This may include local or state law enforcement or the FBI. If necessary, you may be asked to avoid reporting the breach due to the fact that it could impede with an investigation.
  3. Speak with All Federal and Information-Sharing and Analysis Organizations
    This should include the HHS Assistant Secretary for Preparedness and Response, the Department of Homeland Security, and any other ISAOs necessary. Make sure you do not include any sort of protected health information in your reports or documentation while sending them over.
  4. Report the Incident to the OCR Immediately (Within 60 Days)
    The OCR must be notified of the breach within 60 days after the discovery of the breach affecting 500 or more individuals. You also must notify all affected individuals and the media, except in the event that law enforcement has asked you not to. If less than 500 individuals are affected, they must be notified within 60 days and OCR must be notified within 60 days after the end of the calendar year that the breach was discovered.

Remember, All of Your Efforts Matter When the OCR Investigates. A Proper Response Can Mitigate Any Potential Fines And/Or Lawsuits. Kraft Technology Group Can Help You Minimize the Risk AND Respond Appropriately If Something Happens.

Call (615) 241-9233.

Like this article? Keep reading…

What Differentiates Kraft Technology Group for Nashville IT Services?

Do You Know How To Stay Safe Online? Check Out These 10 Tips For Safe Computing

Kraft Technology Group Helps Businesses Expanding Into Nashville with Local IT Support

Are You Aware Of The Dangers Of Free Cybersecurity Software?

The Dangers Of Free Cybersecurity Software It’s not uncommon for businesses to cut corners here and there. Especially when it…

Learn more

300 Employees Let Go, Hundreds of Thousands of Dollars Lost… All Due to Ransomware

Here Is How Ransomware Can Impact Your Business Arkansas-based telemarketing firm, The Heritage Company, experienced a ransomware attack in October…

Learn more

5 IT Services to Improve Your Bottom Line

IT Services to Cut Costs and Improve Profits Managed IT services now dominate the market. They help companies cut costs,…

Learn more