Technology
Ransomware attack’s devastating toll on hospital patients’ health
Data theft and ransomware attacks against health care and critical third-party providers are still happening at an alarmingly high rate in 2024, which is shaping up to be as severe as last year, the worst on record for health care breaches.
You might remember the Ascension ransomware attack from May, one of the most devastating incidents in the health care sector, causing major issues for patients.
A new report from Microsoft highlights that these attacks not only lead to data theft but also put patients’ physical health at risk.
I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Impact of ransomware on health care
Microsoft points out that beyond the financial risk to health care organizations, ransomware attacks can have life-threatening consequences. When health care providers lose access to diagnostic equipment or patient records due to ransomware, patient care is severely disrupted. For example, stroke code activations are nearly double during hospital attacks, with confirmed strokes increasing by 113.6%, and cardiac arrest cases rise by 81% and survival rates drop from 40% to just 4.5%.
Health care facilities near hospitals hit by ransomware attacks also feel the impact, facing a surge in patients needing urgent care that they may not be equipped to handle. As a result, patients often face longer wait times.
What’s more troubling is that these attacks aren’t limited to urban areas. Rural health clinics are also prime targets for cyberattacks. These facilities are particularly vulnerable to ransomware because they often lack the resources to prevent or respond to security incidents. And since these clinics are the only health care option within miles, a successful attack can be devastating for many rural communities.
HEALTH CARE RANSOMWARE ATTACK EXPOSES PERSONAL HEALTH INFORMATION OF OVER 100 MILLION
Why health care is the prime target?
Ransomware attacks on health care have shot up 300% since 2015, making it one of the top 10 most targeted industries in the second quarter of 2024. This rise is mostly because health care organizations store extremely sensitive data, and hackers know there’s big money to be made. With lives on the line, hospitals can’t risk poor patient outcomes if their systems go down or the exposure of patient data if they don’t pay. This reputation for paying ransoms just makes health care an even bigger target.
Some of the blame also falls on health care organizations. They tend to have lower cybersecurity budgets compared to other industries, making it harder to defend against these kinds of attacks. Many facilities don’t have staff dedicated to cybersecurity; some don’t even have a chief information security officer or a security operations center. Instead, cybersecurity often gets lumped in with regular IT duties. Plus, doctors, nurses and other health care staff might not get any cybersecurity training, so they might not even recognize a phishing email when they see one.
CLICK HERE FOR MORE US NEWS
NEARLY 1 MILLION MEDICARE BENEFICIARIES FACE DATA BREACH
7 proactive steps to take in the face of health care cyberattacks
With the rise in cyberattacks on health care providers, it’s wise to take proactive steps to protect your personal information and be prepared for potential disruptions in health care services:
1. Stay informed: Keep up to date with the latest news from your health care providers and reliable sources to stay aware of any disruptions or data breaches affecting systems and services.
2. Maintain personal health records: Keep copies of your health records on your own devices or printed out, including details like medications, allergies, past surgeries and other relevant health information. This can be crucial if electronic health records become temporarily unavailable.
3. Prepare for medical emergencies: Have a backup plan for emergencies, including knowing nearby alternative health care facilities. Research wait times and accessibility to help avoid delays if your primary facility is impacted.
4. Practice cybersecurity best practices: Use strong, unique passwords for online accounts and consider a password manager to help manage them. Enable two-factor authentication where available to add an extra layer of security.
5. Be vigilant against phishing: Cyberattacks often result in a spike in phishing emails and calls as attackers exploit the situation. Protect yourself by using strong antivirus software on all your devices, which can help block malicious links and detect phishing emails. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
6. Confirm appointments: If you have upcoming appointments or procedures, contact your health care provider to confirm or reschedule if a cyberattack disrupts their normal operations.
7. Monitor patient portals: Keep an eye on patient portals like MyChart for updates on your medical records and communication with health care providers, as these can provide critical information during service disruptions.
THE HIDDEN COSTS OF FREE APPS: YOUR PERSONAL INFORMATION
Kurt’s key takeaway
The surge in ransomware attacks on the health care industry is troubling and a harsh reminder that criminals don’t care about the lives at risk. They’re just after money. Health care organizations need to take lessons from the past two years, investing heavily in cybersecurity infrastructure and hiring dedicated staff to protect patient data and systems. With stronger defenses in place, the goal is to prevent these situations from reaching the point where paying a ransom is even considered.
Have you ever experienced delays or issues with health care services due to a cyberattack or system outage? Let us know by writing us at Cyberguy.com/Contact.
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.
Ask Kurt a question or let us know what stories you’d like us to cover.
Follow Kurt on his social channels:
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
The best Cyber Monday robot vacuum deals you can get from iRobot, Roborock, and more
Robot vacuums are on sale all the time. But this holiday shopping weekend, there have been some fairly significant price drops, which are rolling over from Black Friday into Cyber Monday. These include rarely reduced flagship models like Roborock’s S8 MaxV Ultra and iRobot’s Combo 10 Max. If you’ve been holding out on trying the latest and greatest, now is a good time to dive in.
Deep discounts are also available on some of our favorite midrange and budget bots from Shark and Eufy, and iRobot is slashing prices on its entire line. Read on for our rundown on the best deals on robotic floor cleaners this holiday shopping weekend.
Update, December 1st: Adjusted to reflect current pricing/availability for Cyber Monday and added new deals, including the Roborock Q8 Max Plus.
Technology
9 ways scammers can use your phone number to try to trick you
Scammers have various methods when it comes to getting their hands on your phone number. You might think, “Well, what’s the big deal? Isn’t it easy to find someone’s number these days, no matter what?” Yes. And if you’ve already had your fair share of telemarketers call you, maybe you feel like you’ve got it under control.
The problem is that scammers with the right knowledge and the wrong intentions can wreak havoc just by having your phone number in their possession.
Once they do, they can use it to trick you in all sorts of ways.
The good news is that by familiarizing yourself with their tactics, you can be one step closer to preventing yourself from falling victim to them. Here’s what you need to know.
2 DAYS LEFT! I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS (Ends 12/3/24, 12 pm PT)
9 ways you can get scammed if your phone number falls into the wrong hands
In today’s digital age, your phone number is more than just a way for friends and family to reach you. It can be a gateway for scammers to access your personal information and wreak havoc on your life. From phishing attempts to extortion, the risks are numerous and varied. Here are nine ways scammers can exploit your phone number if it falls into the wrong hands:
1. Phishing for other personal information
Scammers can also use your phone number to launch rather easy phishing attacks. They might send text messages or make calls posing as your bank or a popular online service that you subscribe to. The goal is to call you and trick you into providing login credentials, credit card details or other personal information, which they can then use for fraudulent activities. And once they have all your other information, they can do a lot more damage just by having your phone number as that initial segue.
2. Extortion and blackmail
In some cases, scammers use your phone number for extortion or blackmail. They may claim to have compromising information about you and demand payment to keep it private. By contacting you directly, they can apply continuous pressure, making their threats seem more real and immediate.
One unique way they do this to target elderly people is by pretending to be your grandchild or another relative in distress. The scammer often claims that your grandchild is in an emergency situation — such as needing bail money or medical assistance — and urgently requests financial help. With AI voice cloning technology, they may even be able to use your grandchild’s voice. This emotional manipulation usually gets the victim to pay up.
3. Robocalls and spam messages
This one may not be as dramatic, but your phone number can be sold to robocall and spam message services. These automated systems bombard you with unwanted calls and texts, often promoting scams or fraudulent products. While these may seem like minor annoyances, they can lead to bigger scams if you engage with the messages or follow their instructions. Hang up on them.
HOW TO STOP ANNOYING ROBOCALLS
4. Phone number spoofing
Phone number spoofing is a common tactic where scammers disguise their caller ID to appear as a trusted contact by calling from what appears to be a familiar number as it may have the same area code where you live, an area code where your friends or family live or even the actual phone number of someone close which you can recognize.
This makes it more likely that you’ll answer the call, giving them the opportunity to deceive you into revealing personal information or transferring money. This is, of course, the case when phone spoofing is used against you. But in situations where they use YOUR phone number, they can be scamming those close to you without you even knowing!
5. Impersonating government agencies
With these phone spoofing tactics, scammers can use your phone number to impersonate government officials, such as IRS agents or Social Security administrators. They may call you claiming there’s an urgent issue, like unpaid taxes or suspicious activity involving your Social Security number. This ploy often involves threats of legal action or arrest to pressure you into providing sensitive information or making immediate payments.
6. Calling about fake unpaid invoices
Instead of pretending to be from a government agency, another trick is for scammers to try their luck by posing as a representative from a utility company, like an electric or water company. Scammers will claim that you have an overdue invoice and threaten to cut off your service unless you pay immediately. Using your phone number, they can contact you repeatedly, making the scam seem more legitimate (and pressing).
7. SIM swapping/phone rerouting
SIM swapping or a port-out scam is when scammers transfer your phone number to a new SIM card in their possession. By convincing your mobile carrier to reroute your number, they can receive all your calls and messages, including those containing two-factor authentication codes. This allows them to bypass security measures and take over your online accounts.
WHAT IS ARTIFICIAL INTELLIGENCE (AI)?
8. Stealing your sensitive data
With SIM swapping techniques/port-out, scammers can also use your phone number as a key to access sensitive data stored in your online accounts. By initiating password resets and intercepting verification codes sent via SMS, they can gain unauthorized access to your email, social media and banking accounts, leading to significant personal and financial damage.
9. Setting up fake online accounts
Finally, scammers can use all the tactics above to not only access the accounts you already have but also create fake online accounts in your name. These accounts can be used for a variety of malicious purposes, such as spreading malware, launching further scams or conducting identity theft. The presence of your phone number makes these accounts appear more legitimate, increasing the chances of deceiving others.
10 SIMPLE STEPS TO IMPROVE YOUR SMARTPHONE’S SECURITY AND PRIVACY
How to protect yourself from these scams
To protect your phone number from falling into the hands of scammers, here’s what you can do:
1. Be cautious about sharing your phone number publicly: Avoid posting your phone number on public forums, websites or social media platforms where it can be easily accessed by scammers.
2. Limit exposure of your phone number on social media and other online platforms: Use privacy settings to restrict who can see your contact information. Most social media platforms and online services offer privacy settings that allow you to control who can view your personal information. Make sure to review and adjust these settings regularly. Only share your phone number with trusted contacts.
3. Consider using a secondary number for online registrations and transactions: Services like Google Voice can provide you with a secondary number that you can use for online activities, keeping your primary number private.
4. Monitor your accounts regularly for unusual activity: Check your bank accounts, email and other online accounts for any signs of unauthorized access or suspicious activity.
5. Have strong antivirus software: The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.
6. Use two-factor authentication apps instead of SMS-based verification where possible: Two-factor authentication (2FA) provides an extra layer of security that is more difficult for scammers to bypass compared to SMS-based verification.
7. Use an identity theft protection service: Identity theft companies can monitor personal information like your Social Security number, phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.
One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.
8. Remove your personal information from the internet: While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with the information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.
If scammers already have your phone number
If you suspect that scammers already have your phone number, take the following steps:
Contact your mobile carrier to alert them of the scam calls, especially if they come from the same number. Your carrier may be able to block the number or provide additional security measures.
Consider changing your phone number if the issue persists: If scam calls continue despite your efforts, changing your phone number may be the best solution.
Report any suspicious activity to the appropriate authorities: Contact your local law enforcement or consumer protection agency to report scams and seek advice on further actions.
Consider placing fraud alerts on your accounts: Fraud alerts can help protect your credit and financial accounts from unauthorized access.
Monitor your phone for unusual calls or messages: Keep an eye out for any unexpected calls or messages, and do not respond to them.
Check your phone bill for unauthorized charges: Regularly review your phone bill to ensure there are no unexpected charges, which could indicate that your number has been used fraudulently.
By following these steps, you can significantly reduce the risk of falling victim to phone number scams and protect your personal information.
RECLAIM YOUR PRIVACY BY DISABLING YOUR CELL PHONE CARRIER’S DATA TRACKING
Kurt’s key takeaways
Scams have become much more sophisticated these days, especially with artificial intelligence, making it easier for scammers to target more people and get away with it. Always be wary of a scam. If you think something seems strange, it’s probably best to go with your gut.
Have you ever experienced a scam involving your phone number? If so, how did you handle it? Let us know by writing us at Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter
Ask Kurt a question or let us know what stories you’d like us to cover
Follow Kurt on his social channels
Answers to the most asked CyberGuy questions:
New from Kurt:
Copyright 2024 CyberGuy.com. All rights reserved.
Technology
Elon Musk targets OpenAI’s for-profit transition in a new filing
In a new motion filed late Friday in his lawsuit against OpenAI, Elon Musk’s attorneys have asked for a preliminary injunction to stop OpenAI from transitioning to a for-profit enterprise, reports TechCrunch. They also asked the judge to forbid the company from continuing alleged practices that they say violate US antitrust laws.
Musk’s lawyers claim that because of CEO Sam Altman’s alleged self-dealing, OpenAI “will likely lack sufficient funds to pay damages” if Musk wins the suit. The motion follows reports of OpenAI’s intent to become a for-profit business and that it recently began early talks with regulators to move its structural change forward.
As for antitrust claims, Musk’s lawyers allege that OpenAI and Microsoft “told investors not to fund their mutual competitors,” which they say violates the Sherman Act. And they claim that Musk “verified that at least one major investor” that had previously contributed to an xAI funding round has since “declined to invest in xAI.”
They also allege that OpenAI benefits from “wrongfully obtained competitively sensitive information” gained through Microsoft connections they insist are effectively prohibited under the Clayton Act. The lawyers claim that “the very reason Microsoft obtained its board seat” — referring to Microsoft VP Dee Templeton’s time as a non-voting board member at OpenAI — “was to coordinate business decisions with OpenAI.”
OpenAI spokeswoman Hannah Wong said in a statement emailed to The Verge:
Elon’s fourth attempt, which again recycles the same baseless complaints, continues to be utterly without merit.
Update November 30th: Added statement from OpenAI spokeswoman Hannah Wong.
-
Science5 days ago
Despite warnings from bird flu experts, it's business as usual in California dairy country
-
Health1 week ago
Holiday gatherings can lead to stress eating: Try these 5 tips to control it
-
Health6 days ago
CheekyMD Offers Needle-Free GLP-1s | Woman's World
-
Technology5 days ago
Lost access? Here’s how to reclaim your Facebook account
-
Entertainment4 days ago
Review: A tense household becomes a metaphor for Iran's divisions in 'The Seed of the Sacred Fig'
-
Technology3 days ago
US agriculture industry tests artificial intelligence: 'A lot of potential'
-
Technology1 week ago
Microsoft pauses Windows 11 updates for PCs with some Ubisoft games installed
-
Sports1 day ago
One Black Friday 2024 free-agent deal for every MLB team