{"id":3423,"date":"2022-05-29T11:59:06","date_gmt":"2022-05-29T10:59:06","guid":{"rendered":"https:\/\/www.dpscomputing.com\/blog\/?p=3423"},"modified":"2022-05-29T11:59:08","modified_gmt":"2022-05-29T10:59:08","slug":"devestating-cyberattack-leaves-hospital-destroyed","status":"publish","type":"post","link":"https:\/\/www.dpscomputing.com\/blog\/2022\/05\/29\/devestating-cyberattack-leaves-hospital-destroyed\/","title":{"rendered":"DEVESTATING Cyberattack Leaves Hospital DESTROYED!"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" data-attachment-id=\"3424\" data-permalink=\"https:\/\/www.dpscomputing.com\/blog\/2022\/05\/29\/devestating-cyberattack-leaves-hospital-destroyed\/devastating-cyberattack-leave-hospital-destroyed\/\" data-orig-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/DEVASTATING-Cyberattack-leave-hospital-DESTROYED.jpg\" data-orig-size=\"1280,720\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Devastating Hospital Cyberattack\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/DEVASTATING-Cyberattack-leave-hospital-DESTROYED-300x169.jpg\" data-large-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/DEVASTATING-Cyberattack-leave-hospital-DESTROYED-1024x576.jpg\" tabindex=\"0\" role=\"button\" src=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/DEVASTATING-Cyberattack-leave-hospital-DESTROYED-1024x576.jpg\" alt=\"\" class=\"wp-image-3424\" srcset=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/DEVASTATING-Cyberattack-leave-hospital-DESTROYED-1024x576.jpg 1024w, https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/DEVASTATING-Cyberattack-leave-hospital-DESTROYED-300x169.jpg 300w, https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/DEVASTATING-Cyberattack-leave-hospital-DESTROYED-150x84.jpg 150w, https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/DEVASTATING-Cyberattack-leave-hospital-DESTROYED-768x432.jpg 768w, https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/DEVASTATING-Cyberattack-leave-hospital-DESTROYED.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p>A devastating cyberattack leaves a hospital destroyed after it failed to stop both a massive data breach of confidential patient information in addition to suffering a Wannacry-esque ransomware attack.  <\/p>\n\n\n\n<p>Could this all have been prevented?  Could we have made better decisions?<\/p>\n\n\n\n<p>Let us know in the comments what decisions you would make.  <\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"video-container\"><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/8nzBRwT_vLU?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-GB&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span><\/div>\n<\/div><\/figure>\n\n\n\n<p>Think you can do better?  Put your skills to the test in <a href=\"http:\/\/datacenterattacks.trendmicro.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Data Center Attack: The Game<\/a> and let us know how you get on in the comments!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A devastating cyberattack leaves a hospital destroyed after it failed to stop both a massive data breach of confidential patient information in addition to suffering a Wannacry-esque ransomware attack. Could this all have been&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":3424,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"A DEVESTATING cyberattack leaves a hospital destroyed.  \n\nPatient information leaked and ransomware crippled the hospitals systems.  \n\nCould this all have been prevented?  Could we have made better decisions.  \n\nWATCH the video now and find out!\n\n#Cyber","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[12],"tags":[46,1035,3085,3057,3087,3088,3095,3096,3097,3086,3094],"class_list":["post-3423","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-games","tag-cyber-attack","tag-cyber-security","tag-cyberattack","tag-cybersecurity","tag-cybersecurity-games","tag-cybersecurity-simulator","tag-data-center-attack","tag-data-center-attack-the-game","tag-hospital-cyberattack","tag-trend-micro","tag-trend-micro-deep-security"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/DEVASTATING-Cyberattack-leave-hospital-DESTROYED.jpg","jetpack_shortlink":"https:\/\/wp.me\/p3nsfA-Td","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/3423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/comments?post=3423"}],"version-history":[{"count":1,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/3423\/revisions"}],"predecessor-version":[{"id":3425,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/3423\/revisions\/3425"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/media\/3424"}],"wp:attachment":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/media?parent=3423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/categories?post=3423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/tags?post=3423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}