Industry Coverage icon

Improve Ransomware Resilience for Healthcare

Prevent incursions and defend against ransomware attacks.

Unlock a Free Sample
  • Sophisticated ransomware attacks are on the rise and evolving quickly within the healthcare industry.
  • Emerging strains can exfiltrate sensitive healthcare data, encrypt systems, and destroy backups in only a few hours, which makes recovery a grueling challenge.
  • Healthcare executives want reassurance but aren’t ready to write a blank check. Improvements must be targeted and justified.

Our Advice

Critical Insight

  • Malicious agents design progressive, disruptive attacks to pressure organizations to pay ransom.
  • Organizations misunderstand ransomware risk scenarios, which obscures the likelihood and impact of an attack.
  • Conventional approaches focus on response and recovery, which do nothing to prevent an attack and are often ineffective against sophisticated attacks.

Impact and Result

  • Conduct a thorough assessment of your current state, identify potential gaps, and assess the possible outcomes of an attack.
  • Analyze attack vectors and prioritize controls that prevent ransomware attacks. Implement ransomware protections and detection to reduce your attack surface.
  • Visualize, plan, and practice your response and recovery to reduce the potential impact of an attack.

Improve Ransomware Resilience for Healthcare Research & Tools

1. Improve Ransomware Resilience for Healthcare Deck – A step-by-step guide that will help you assess your ransomware readiness and implement controls to improve your ability to prevent incursions and defend against attacks.

Use this research to conduct a thorough assessment of your current state, identify potential gaps, and assess the possible outcomes of an attack. Visualize, plan, and practice your response and recovery to reduce the potential impact of an attack.

2. Ransomware Resilience Assessment – A tool to assess your current state and establish metrics.

Use these assessment tools to assess existing protection, detection, response, and recovery capabilities and identify potential improvements.

3. Ransomware Threat Preparedness Workbook – A tool to improve your protection and detection capabilities.

Use this threat preparedness workbook to evaluate the threats and tactics in the ransomware kill chain using the MITRE framework and device appropriate countermeasures.

4. Tabletop Planning Exercise and Example Results – An exercise for your internal IT team to improve response and recovery capabilities.

Adapt this tabletop planning session template to plan and practice the response of your internal IT team to a ransomware scenario.

5. Ransomware Response Runbook and Workflow – Templates to document your ransomware response steps and key stakeholders.

Adapt these workflow and runbook templates to coordinate the actions of different stakeholders through each stage of the ransomware incident response process.

6. Extended Tabletop Exercise and Leadership Guide – An exercise to plan and practice the response of your leadership team.

Adapt this tabletop planning session template to plan leadership contributions to the ransomware response workflow. This second tabletop planning session will focus on communication strategy, business continuity plan, and whether the organization should pay ransom.

7. Ransomware Resilience Summary Presentation – A template to create an executive presentation that summarizes status and next steps.

Summarize your current state and present a prioritized project roadmap to improve ransomware resilience over time.

Unlock a Free Sample

Workshop: Improve Ransomware Resilience for Healthcare

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

Module 1: Assess Ransomware Resilience

The Purpose

  • Set workshop goals, review ransomware trends and risk scenarios, and assess the organization’s resilience to ransomware attacks.

Key Benefits Achieved

  • Develop a solid understanding of the likelihood and impact of a ransomware attack on your organization
  • Complete a current state assessment of key security controls in a ransomware context.

Activities

Outputs

1.1

Review incidents, challenges, and project drivers.

  • Workshop goals
1.2

Diagram critical systems and dependencies and build risk scenario.

  • Ransomware risk scenario
1.3

Assess ransomware resilience.

  • Ransomware resilience assessment

Module 2: Protect and Detect

The Purpose

  • Improve your capacity to protect your organization from ransomware and detect attacks along common vectors.

Key Benefits Achieved

  • Identify targeted countermeasures that improve protection and detection capabilities.

Activities

Outputs

2.1

Assess ransomware threat preparedness.

2.2

Determine the impact of ransomware techniques on your environment.

2.3

Identify countermeasures to improve protection and detection capabilities.

  • Targeted ransomware countermeasures to improve protection and detection capabilities

Module 3: Respond and Recover

The Purpose

  • Improve your organization’s capacity to respond to ransomware attacks and recover effectively.

Key Benefits Achieved

  • Build response and recovery capabilities that reduce the potential business disruption of successful ransomware attacks.

Activities

Outputs

3.1

Review the workflow and runbook templates.

3.2

Update/define your threat escalation protocol.

3.3

Define scenarios for a range of incidents.

  • Security incident response plan assessment
3.4

Run a tabletop planning exercise with IT.

  • IT tabletop planning session
3.5

Update your ransomware response runbook.

  • Ransomware workflow and runbook

Module 4: Improve Ransomware Resilience

The Purpose

  • Identify prioritized initiatives to improve ransomware resilience.

Key Benefits Achieved

  • Identify the role of leadership in ransomware response and recovery.
  • Communicate workshop outcomes and recommend initiatives to improve ransomware resilience.

Activities

Outputs

4.1

Run a tabletop planning exercise with leadership.

  • Leadership tabletop planning session
4.2

Identify initiatives to close gaps and improve resilience.

4.3

Review broader strategies to improve your overall security program.

4.4

Prioritize initiatives based on factors such as effort, cost, and risk.

4.5

Review the dashboard to fine tune your roadmap.

  • Ransomware resilience roadmap and metrics
4.6

Summarize status and next steps in an executive presentation.

  • Ransomware workflow and runbook

Improve Ransomware Resilience for Healthcare

Prevent incursions and defend against ransomware attacks.

Analyst Perspective

Ransomware presents an opportunity and a challenge.

As I write, the frequency and impact of ransomware attacks continue to increase with no sign of slowing. Most organizations will experience ransomware in the next 24 months, some more than once, and business leaders know it. You will never have a better chance to implement best practice security controls than you do now.

The opportunity comes with important challenges. Hackers require less time in discovery before they deploy attacks, which have become much more effective. You can't afford to rely solely on being able to respond and recover. You need to build a resilient organization that can withstand a ransomware event and recover quickly.

Resilient organizations are not impervious to attack, but they have tools to protect assets, detect incursions, and respond effectively. Resilience is not a trampoline, where you're down one moment and up the next. It's more like climbing a mountain. It takes time, planning, and help from people around you to overcome challenges and work through problems. Eventually, you reach the top and reflect on how far you've come.

 Michel Hébert, Research Director, Security and Privacy

Michel Hébert
Research Director, Security and Privacy
Info-Tech Research Group

Executive Summary

Your Challenge Common Obstacles Info-Tech's Approach
Ransomware is a high-profile threat that demands immediate attention:
  • Sophisticated ransomware attacks are rapidly increasing/evolving within the healthcare industry.
  • Emerging strains can exfiltrate sensitive healthcare data, encrypt systems, and destroy backups in only a few hours, which makes recovery a grueling challenge.
  • Healthcare executives want reassurance but aren't ready to write a blank check. Improvements must be targeted and justified.
Ransomware is more complex than other security threats:
  • Malicious agents design progressive, disruptive attacks to pressure organizations to pay a ransom.
  • Healthcare organizations misunderstand ransomware risk scenarios, which obscures the likelihood and impact of an attack.
  • Conventional approaches focus on response and recovery, which fail to prevent an attack and are often ineffective against sophisticated attacks.
To prevent a ransomware attack:
  • Conduct a thorough assessment of your current state, identify potential gaps, and assess the possible outcomes of an attack.
  • Analyze attack vectors and prioritize controls that prevent ransomware attacks. Implement ransomware protection and detection to reduce your attack surface.
  • Visualize, plan, and practice your response and recovery to reduce the potential impact of an attack.

Info-Tech Insight
Resilience is not a trampoline, where you're down one moment and up the next. It's more like climbing a mountain. It takes time, planning, and help from people around you to work through challenges. Focus on what your organization can control and cultivate strengths that allow you to protect assets, detect incursions, respond effectively, and recover quickly.

Ransomware attacks are on the rise and evolving quickly.

Three factors contribute to the threat:

  • The rise of ransomware-as-a-service, which facilitates attacks.
  • The rise of crypto-currency, which facilitates anonymous payment.
  • State sponsorship of cybercrime.

Elementus maps ransomware payments made through bitcoin. Since 2019, victims made at least US$2 billion in payments.

A handful of criminal organizations, many of whom operate out of cybercrime hotbeds in Russia, are responsible for most of the damage. The numbers capture only the ransom paid, not the cleanup cost or economic fallout over attacks during this period.

Total ransom money collected (2015-2021): US$2,592,889,121

Chart of ransom money collected

The frequency and impact of ransomware attacks are increasing among healthcare institutions

Emerging strains can exfiltrate sensitive data, encrypt systems, and destroy backups in only a few hours, which makes recovery a grueling challenge.

Sophos commissioned a vendor-agnostic study of the real-world experience of 5,600 IT professionals in mid-sized organizations across 31 countries and 15 industries.

The survey was conducted in Jan - Feb 2022 and asked about the experience of respondents over the previous year.

Frequency and impact

Meanwhile, organizations continue to put their faith in ineffective ransomware defenses.

Of the respondents whose healthcare organizations were not hit by ransomware in 2021 and don't expect to be hit in the future, 77% cited either backups or cyberinsurance as reasons why they didn't anticipate an attack.

While these elements can help recover from attacks, they don't prevent them.

Sources: "State of Ransomware in Healthcare," Sophos, 2022; "Cost of A Data Breach," IBM, 2022

Critical infrastructure sectors are being targeted by ransomware attacks

There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital that their incapacitation or destruction would have a debilitating effect on a nation's security, economy, public health or safety, or any combination thereof.

In 2021, the FBI's Internet Crime Complaint Center (IC3) received 649 complaints indicating ransomware attacks on organizations worldwide. Although the healthcare sector was not the most targeted for cyberattacks, it was the most victimized industry sector for ransomware attacks.

Global industries most targeted by cyberattacks

The three-step ransomware attack playbook

  1. Get in
  2. Spread
  3. Profit

At each point of the playbook, malicious agents have to achieve something before they can move to the next step.

Resilient organizations look for opportunities to:

  • Learn from incursions
  • Disrupt the playbook
  • Measure effectiveness

The three-step ransomware attack playbook

Ransomware is more complex than other security threats

Ransomware groups thrive through extortion tactics.

  • Traditionally, ransomware attacks focused on encrypting files as an incentive for organizations to pay up.
  • As organizations improved backup and recovery strategies, gangs began targeting, encrypting, and destroying backups.
  • Since 2019, gangs have focused on a double-extortion strategy: exfiltrate sensitive or protected data before encrypting systems and threatening to publish them.

Healthcare organizations misunderstand ransomware risk scenarios, which obscures the potential impact of an attack.

Ransom is only a small part of the equation. Four process-related activities drive ransomware recovery costs:

  • Detection and response - Activities that enable detection, containment, eradication and recovery.
  • Notification - Activities that enable reporting to data subjects, regulators, law enforcement, and third parties.
  • Lost business - Activities that attempt to minimize the loss of customers, business disruption, and revenue.
  • Post-breach response - Redress activities to victims and regulators, and the implementation of additional controls.

Source: "Cost of a Data Breach," IBM, 2022

Organizations in the health care sector are stewards of regulated data, which makes them especially vulnerable to extortion, and ransomware gangs know it.

Disrupt the attack at each stage of the attack workflow.

An effective response with strong, available backups will reduce the operational impact of an attack, but it won't spare you from its reputational and regulatory impact.

Put controls in place to disrupt each stage of the attack workflow to protect the organization from intrusion, enhance detection, respond quickly, and recover effectively.

Shortening dwell time requires better protection and detection

Ransomware dwell times are shrinking, and average encryption rates are dramatically increasing.

Hackers spend less time in your network before they attack, and their attacks are much more effective.

Average times for ransomware

What is dwell time and why does it matter?

Dwell time is the time between when a malicious agent gains access to your environment and when they are detected. In a ransomware attack, most organizations don't detect malicious agents until they deploy ransomware, encrypt their files, and lock them out until the ransom is paid.

Effective time is a measure of the effectiveness of the encryption algorithm. Encryption rates vary by ransomware family. Lockbit has the fastest encryption rate, clocking in at 628 GB/h.

Dwell times are dropping, and encryption rates are increasing.

It's more critical than ever to build ransomware resilience. Most organizations do not detect ransomware incursions in time to prevent serious business disruption.

References: Bleeping Computers, 2022; VentureBeat; Dark Reading; ZDNet, 2021.

Resilience depends in part on response and recovery capabilities

This blueprint will focus on improving your ransomware resilience to:

  • Protect against ransomware
  • Detect incursions
  • Respond and recover effectively

Response and recovery

For in-depth assistance with disaster recovery planning, refer to Info-Tech's Create a Right-Sized Disaster Recovery Plan.

Info-Tech's ransomware resilience framework

Disrupt the playbooks of ransomware gangs. Put controls in place to protect, detect, respond, and recover effectively.

Prioritize protection

Put controls in place to harden your environment, train savvy end users, and prevent incursions.

Support recovery

Build and test a backup strategy that meets business requirements to accelerate recovery and minimize disruption.

Info-Tech's ransomware resilience framework

Build Resilience Against Ransomware Attacks

Info-Tech's ransomware resilience methodology

Assess resilience Protect and detect Respond and recover Improve resilience
Phase steps
  1. Build ransomware risk scenario
  2. Conduct resilience assessment
  1. Assess attack vectors
  2. Identify countermeasures
  1. Review security incident management plan
  2. Run tabletop test (IT)
  3. Document workflow and runbook
  1. Run tabletop test (Leadership)
  2. Prioritize resilience initiatives
Phase outcomes
  • Ransomware Resilience Assessment
  • Risk Scenario
  • Targeted ransomware countermeasures to improve protection and detection capabilities
  • Security Incident Response Plan Assessment
  • Tabletop test (IT)
  • Ransomware Workflow and Runbook
  • Tabletop test (Leadership)
  • Ransomware Resilience Roadmap & Metrics

Insight Summary

Shift to a ransomware resilience model
Resilience is not a trampoline, where you're down one moment and up the next. It's more like climbing a mountain. It takes time, planning, and help from people around you to work through challenges.

Focus on what your organization can control and cultivate strengths that allow you to protect assets, detect incursions, and respond and recover quickly.

Visualize challenges
Build risk scenarios that describe how a ransomware attack would impact organizational goals.

Understand possible outcomes to motivate initiatives, protect your organization, plan your response, and practice recovery.

Prioritize protection
Dwell times and effective times are dropping dramatically. Malicious agents spend less time in your network before they deploy an attack, and their attacks are much more effective. You can't afford to rely on your ability to respond and recover alone.

Seize the moment
The frequency and impact of ransomware attacks continue to increase, and business leaders know it. You will never have a better chance to implement best practice security controls than you do now.

Measure ransomware resilience
The anatomy of a ransomware attack is relatively simple: malicious agents get in, spread, and profit. Deploy ransomware protection metrics to measure ransomware resilience at each stage.

Project deliverables

Info-Tech supports project and workshop activities with deliverables to help you accomplish your goals and accelerate your success.

Ransomware Resilience Assessment
Measure ransomware resilience, identify gaps, and draft initiatives.

Ransomware Threat Preparedness Workbook
Analyze common ransomware techniques and develop countermeasures.

Ransomware Response Workflow & Runbook
Capture key process steps for ransomware response and recovery.

Ransomware Tabletop Tests
Run tabletops for your IT team and your leadership team to gather lessons learned.

Ransomware Resilience Roadmap
Create a roadmap that displays ownership, start dates, and durations for initiatives (produced by tab 6 of the Ransomware Resilience Assessment).

Key deliverable

Ransomware Readiness Summary Presentation Template

The resilience roadmap captures the key insights your work will generate, including:

  • An assessment of your current state and a list of initiatives to improve your ransomware resilience.
  • The lessons learned from building and testing the ransomware response workflow and runbook.
  • The controls you need to implement to measure and improve your ransomware resilience over time.

Plan now or pay later

In 2021, organizations worldwide spent on average US$4.62 million to rectify a ransomware attack. These costs include escalation, notification, lost business, and response costs, but not the ransom amount. Malicious ransomware attacks that destroyed data in destructive wiper-style attacks cost an average of US$4.69 million.

Building better now is less expensive than incurring the same costs plus the cleanup and regulatory and business disruption costs associated with successful ransomware attacks.

Source: "Cost of a Data Breach," IBM, 2022

After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research and advisory services helped them achieve.

See what members have to say about the Ransomware Resilience Blueprint:

  • Overall impact: 9.8/10
  • Average $ saved: $98,796
  • Average days saved: 17

"Best parts were the fact that we were able to have a facilitated discussion with our MSP about security and create a much-needed tool - the runbook out of that meeting."
- Anonymous CIO, Healthcare Institution

Blueprint benefits

IT benefits Business benefits
  • Provide a structured approach for your organization to identify gaps, quantify the risk, and communicate status to drive executive buy-in.
  • Create a practical ransomware incident response plan that combines a high-level workflow with a detailed runbook to coordinate response and recovery.
  • Present an executive-friendly project roadmap with resilience metrics that summarizes your plan to address gaps and improve your security posture.
  • Enable leadership to make risk-based, informed decisions on resourcing and investments to improve ransomware readiness.
  • Quantify the potential impact of a ransomware attack on your organization to drive risk awareness.
  • Identify existing gaps so they can be addressed, whether by policy, response plans, technology, or a combination of these.

Info-Tech offers various levels of support to best suit your needs

DIY Toolkit Guided Implementation Workshop Consulting
"Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

Diagnostics and consistent frameworks are used throughout all four options.

Executive brief case study

SOURCE
UVM Health Network Ransomware Attack

Organizations who build back better after a ransomware attack often wish they had used relevant controls sooner.

Challenge Complication Resolution
In October 2020, University of Vermont Health Network experienced significant disruptions and application issues. Upon further investigation, they suspected a data breach and took their network offline. A text file left on a computer by cybercriminals indicated that they had compromised the health network's system and encrypted the organization's data. No ransom was demanded, but they urged the health network to contact them. The organization instead contacted the FBI, who with their assistance identified the attack's source and resolved the incident. No sensitive data was exposed, and the organization regained access to their backup copies. While the organization didn't pay any ransom and no sensitive data (e.g. protected health information [PHI]) was stolen or exposed, the attack still carried deep implications. The full shutdown of network systems during the attack caused the organization to incur significant recovery expenses. This included the recovery cost of the health network's servers, applications, and computers, which totaled an estimate of over US$63 million. Furthermore, the attack impacted patient care as many patients faced delayed test results and some medical procedures had to be rescheduled. The lengthy incident recovery time damaged the reputation of the health network. The organization was scrutinized for its lack of policies, which motivated the organization to put more protections in place, including:
  • Policies to restrict employee access to personal emails on all workplace devices
  • Advanced security software
  • A cyber incident response plan to reduce the lengthy data recovery process and establishing protocols to mitigate losses
  • A policy to contact law enforcement during the early stages of an incident instead of complying with cybercriminals' demands

Guided implementation

What kind of analyst experiences do clients have when working through this blueprint?

Scoping Call Phase 1 Phase 2 Phase 3 Phase 4
Call #1:

Discuss context, identify challenges, and scope project requirements.

Identify ransomware resilience metrics.

Call #2:

Build ransomware risk scenario.

Call #3:

Assess ransomware resilience.

Call #4:

Review common ransomware attack vectors.

Identify and assess mitigation controls.

Call #5:

Document ransomware workflow and runbook.

Call #6:

Run tabletop test with IT.

Call #7:

Run tabletop test with Leadership.

Call #8:

Build ransomware roadmap.

Measure ransomware resilience metrics.

A guided implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

A typical GI involves six to eight calls over the course of four to six months.

Prevent incursions and defend against ransomware attacks.

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Need Extra Help?
Speak With An Analyst

Get the help you need in this 5-phase advisory process. You'll receive 8 touchpoints with our researchers, all included in your membership.

Guided Implementation 1: Schedule a scoping call
  • Call 1: Discuss context, identify challenges, and scope project requirements. Identify ransomware resilience metrics.

Guided Implementation 2: Assess ransomware resilience
  • Call 1: Build ransomware risk scenario.
  • Call 2: Assess ransomware resilience.

Guided Implementation 3: Improve protection and detection capabilities
  • Call 1: Review common ransomware attack vectors. Identify and assess mitigation controls.

Guided Implementation 4: Improve response and recovery capabilities
  • Call 1: Document ransomware workflow and runbook.
  • Call 2: Run tabletop test with IT.

Guided Implementation 5: Improve ransomware resilience
  • Call 1: Run tabletop test with leadership.
  • Call 2: Build ransomware roadmap. Measure ransomware resilience metrics.

Authors

Michel Hebert

Ahmad Jowhar

Contributors

  • Jimmy Tom, AVP of Information Technology and Infrastructure, Financial Horizons
  • Ali Dehghantanha, Canada Research Chair in Cybersecurity and Threat Intelligence, University of Guelph
  • Dan Reisig, Vice President of Technology, UV&S
  • Gary Rietz, CIO, Blommer Chocolate Company
  • Samuel Sutton, Computer Scientist, FBI
  • Mark Roman, CIO, Simon Fraser University
  • Derrick Whalen, Director, IT Services, Halifax Port Authority
  • Deuce Sapp, VP of IT, ISCO Industries
  • Stuart Gaslonde, Director of IT & Digital Services, Falmouth Exeter Plus
  • Trevor Ward, IT Manager, Falmouth Exeter Plus
  • Deborah Curtis, CISO, Placer County
  • Brian Murphy, IT Manager, Placer County
  • Arturo Montalvo, CISO, Texas General Land Office and Veterans Land Board
  • Linda Barratt, Director of Enterprise Architecture, IT Security, Data & Analytics, Toronto Community Housing Corporation
  • Mduduzi Dlamini, IT Systems Manager, Eswatini Railway
  • Josh Lazar, CIO, 18th Circuit Florida Courts
  • Mike Hare, System Administrator, 18th Circuit Florida Courts
  • Douglas Williamson, Director of IT, Jamaica Civil Aviation Authority
  • Jacopo Fumagalli, CISO, Omya
  • Matthew Parker, Information Security Manager, Utah Transit Authority
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019