Jackson Thornton Technologies News + Updates

Jackson Thornton Technologies has been serving the Southeast since 1999, providing IT consulting and managed services, technical helpdesk support, cybersecurity assessments, and business continuity and disaster recovery to small and medium-sized businesses.

Common Mistakes in IT Incident Response

jtt-blog

Last year, U.S. healthcare entities were hit on average with 1,410 cyberattacks each week, up 60 percent from the year before, according to Check Point Research. These incidents could be anything from a third-party vendor’s outage to a tornado to a data lockdown. According to Nick Cofield at Jackson Thornton Technologies, most healthcare practices tend to make one or more of five common mistakes in readying for potential cyberattacks.

The first mistake is that many practices don’t have a written, step-by-step response to use when IT fails. “When practices with a plan get hit, there’s a sense of urgency, but their response is structured and efficient,” Cofield says. “When they don’t have a plan, everyone runs around like their hair is on fire. And the practice and patients suffer for that. The HIPAA fine for willful neglect currently costs a practice $12,794 per incident.

“Some practices may have a written plan, but they have relied too heavily on a stock template for the plan. When they get into a significant incident, they find that the plan is not relevant to their practice. Either the incident is not covered in the template or the response may not relate to their equipment, their data handling setup, or their staffing.” 

To offset those errors, Cofield recommends holding brainstorming sessions with your staff to think through scenarios that could affect your ability to see patients. Review the list of details required to restore your operations and how each function would be affected. For example, what are your plans if the building becomes inaccessible? Who can work from home? Can you provide virtual visits? Will you need a temporary office? 

The second mistake lies with the data backup because recovery relies on this. There is no magic wand to recover data if the backup is corrupted or inaccessible. To avoid that scenario, test the access to the backups and the data’s viability at least annually from outside the practice’s system. A test can uncover concerns in how long it takes to recover or realize systems you’re not backing up.

The third common mistake is not ensuring that every staff member memorizes the steps they take for each type of IT incident. Even the best plan won’t work if staff is unaware of their responsibilities in these situations. “The receptionist may not know that she needs to contact the practice manager when she gets a suspicious email,” Cofield says. Hold a monthly, 15-minute meeting on what to do in a specific incident, such as a ransomware attack. Ask someone from each department what they would do.

The fourth error practices make is that many administrators and physicians mistake IT support for data forensics. “There’s a big difference between managing an IT system and managing a cyberattack,” Cofield says. “A well meaning IT provider could make a mistake that exacerbates the situation. I remember an incident where the IT provider company paid the cyberattack ransom on behalf of their client, thinking it would go away and save the client any problems. But they were not authorized to do that, and there was no data forensics done, and it didn’t go away. IT needs to know the limits of their role. They are not the incidence response mechanism.”

The last of the top common errors in planning is stagnation. The practice creates a plan, and then it gets left on the shelf. Even when your practice has a minor incident that you contain, you should evaluate what went well and what didn’t. Evaluation may uncover that everyone was quick to respond, but that someone didn’t identify the suspicious email quick enough. Or a minor incident might reveal a limitation in insurance coverage that needs to be remedied. “Implement additional safeguards,” Cofield says. “Ask how the incident happened, how to prevent it, and if there’s anything to plan to put us in a better position for next time.

“Healthcare entities need to view their IT incident plan as a living document. It’s continuously evolving, because the threats change constantly.”

What We Can All Learn from the VirusTotal Data Lea...
A Proactive Stance on Technology is What SMBs Need
Comment for this post has been locked by admin.
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Sunday, 22 December 2024

Captcha Image

Request a Consultation

Jackson Thornton Technologies strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges.

Contact Us
Contact Us

Learn more about what Jackson Thornton Technologies can do for your business.

200 Commerce Street ,
Montgomery, Alabama 36104

Call us: (877) 226-9091

News & Updates
Jackson Thornton Technologies (JTT) is pleased to announce its expansion to a third office located in Auburn, Alabama. This new office will allow JTT to provide additional services in the East Alabama market including cybersecurity reviews, training ...