The official French health sector cybersecurity body (ACSS) and the digital health agency (ANS) issued an alert in mid March warning that the coronavirus is being exploited by cyberattackers.
The ACSS received alerts concerning pseudo Covid-19 information messages which are in reality computer viruses. "Cybercriminals are trying on a global level to exploit fear linked to the pandemic to infiltrate computer networks for companies and individuals alike". Typically threats emanate from "false e-mails from health authorities, fake internal company messages or fake delivery delay messages".
The ANS strongly encourages its members in healthcare to supervise any IT abnormalities, to ensure the smooth running of the backups and spread awareness of the risks currently faced. Almost half of all malicious incidents originate from an email or cryptovirus.
The ACSS receives on average 27 reported incidents per month. 88% of these are from public or private hospitals or clinics. 46% of all incidents have forced the establishment to run a degraded IT system for managing patient care.
Even more worrying, 5 incidents have even caused potentially life threatening issues for the patient. The current Covid-19 crisis is putting health sector IT systems at increased risk because any system under extreme tension is obviously more fragile.
***
Here are the 3 principal strategies - prevention, resistance, assurance- that you must not neglect when it comes to cyberattacks:
Prevent – detect and stop intrusions
Resist - prevent propagation
Ensure continued activity – get your data back
***
Atempo solutions are proud to bear the labels: "France Cybersecurity" and "Used by French Armed Forces". They are solutions that are called upon as a final rampart against a cyberattack. They allow you to restore user data, servers and workstations that are no longer functioning or accessible after a ransomware or crytpo-lockdown.
In the very sensitive domain of healthcare and medecine, Atempo has many references from satisfied customers who have been able to count on our know-how and our software to ensure business continuity following a cyberattack.
***