Reliable Technology ServicesReliable Technology ServicesReliable Technology ServicesReliable Technology Services
Menu
  • Home
  • About Us
  • Services
    • Managed IT Services
      • Remote Monitoring & Maintenance
      • Onsite and Remote Support
      • Managed Security Services
    • Cloud Services
      • Cloud Email Solutions
      • Managed Backup Services
      • Cloud Data Storage Solutions
    • IT Consulting
      • Disaster Recovery & Business Continuity
      • IT Vendor Management Services
      • Network Infrastructure Planning, Design & Implementation
    • Cybersecurity
      • Employee Cybersecurity Training
      • Cybersecurity Services
      • Cybersecurity & IT Compliance Services for Ontario Businesses
  • FAQ’s
  • Blog
  • Contact

What Happens in the Downtime During a Data Breach

  • Home
  • Blog
  • What Happens In The Downtime During A...

What Happens in the Downtime During a Data Breach

CategoriesMake Me Cyber Safe
Rick Ornato

Rick Ornato

November 22, 2024

0 0

Share this post

Introduction

Cyber-threats cause long-term costs and repairs to your reputation…but you might face immediate consequences while the breach is happening too.

When cybercriminals target critical infrastructure in our society, they are actually going after everybody with information stored in their database. Critical infrastructure encompasses those vital services we need for a modern, globally-connected lifestyle like communications, travel and healthcare.

Let’s take a look at a real-life example of a recent cyberattack that affected a major organization. How did the ensuing chaos affect the day-to-day worklife for individuals who work there, and what happens when clients and customers are affected too? What long-term effects can we see?

Attack on Change Healthcare

In February 2024, a ransomware attack went after a medical technology company that connects patients, providers and payers within the United States.

Change Healthcare platforms and services affect about 1 in 3 patients in the U.S. and they employ 15K employees. Therefore, the ransomware incident had a strong ripple effect through the healthcare community.

Change Healthcare processes a significant volume of billing and insurance transactions, meaning that when their systems went down, it caused widespread disruptions in billing systems and insurance claims processing across hospitals, pharmacies, and medical practices. This meant that healthcare providers could not efficiently manage patient billing or process insurance claims, which is critical for both revenue and patient care!

It wasn’t just the workers who couldn’t get their jobs done. With systems down, healthcare providers faced delays in accessing patient records and processing prescriptions. If your local doctor’s office or hospital used Change Healthcare systems or its platform, then you may have found yourself mired in postponed treatments and inability to fill your prescriptions.

What affect would that have on your most recent medical treatment? Probably nothing good!

What Downtime Does for Critical Infrastructure

This one particular attack used ransomware to target this particular third-party vendor, but incidents like this are just one microcosmic epitome of the larger cyber-threat landscape.

Think about how busy your average day of work is. When you’re already under pressure, the last straw you need is the chaos of a system outage. You might have to revert to manual processes, which are typically much slower and more prone to mistakes.

Think about the finances that go into recovering from a breach too. The implications for Change Healthcare and its partners, for example, were significant. The company reported over $1.5 billion in direct costs related to the breach, including ransom payments and recovery efforts. This financial strain can trickle down to employees, potentially affecting job security and resources available for patient care.

Remember, never pay the ransom! In fact, less than half of organizations affected by ransomware actually get their files back after paying the fee. Most likely, the threat actor will take both the data and the money. If they do give you back the data, threat actors still typically threaten to publish the private information they found unless you pay a second fee; this is known as double extortion.

Conclusion

The attack on Change Healthcare in February 2024 highlights a troubling trend where cybercriminals target critical infrastructure, knowing that the consequences of downtime can be severe. This not only affects the organizations, but also the people who rely on timely and effective healthcare, transportation, utilities, financial, and agricultural services!

Related Post

FEBRUARY 20, 2026

What is Piggybacking?  

Introduction Not all security breaches involve malware, phishing emails, or hacked...

00

FEBRUARY 17, 2026

Malvertising: When Online Ads...

Introduction Most people think of online ads as annoying, but not dangerous. A banner...

00

FEBRUARY 13, 2026

How AI Helps Threat Actors...

Introduction For years, cyber-crime has been framed as a problem for large enterprises,...

00

FEBRUARY 10, 2026

The Dangers of Texting PHI...

Introduction Text messaging has become one of the fastest and most familiar ways to...

00

FEBRUARY 6, 2026

What Makes Public Wi-Fi a...

Introduction Public Wi-Fi is everywhere. Airports, hotels, coffee shops, and libraries...

00

FEBRUARY 3, 2026

What the CISA Incident...

Introduction You may have heard about the recent, surprising story that emerged from the...

00

Managed IT Services

  • Managed IT Services
    • Onsite and Remote Support
    • Remote Monitoring & Maintenance
    • Managed Security Services
Get a free IT Consultation
Contact Us

© 2018 Reliable Technology Services, All Rights Reserved.