{"id":3436,"date":"2022-05-30T09:18:27","date_gmt":"2022-05-30T08:18:27","guid":{"rendered":"https:\/\/www.dpscomputing.com\/blog\/?p=3436"},"modified":"2022-05-30T09:18:28","modified_gmt":"2022-05-30T08:18:28","slug":"hospital-cybersecurity-disaster-averted","status":"publish","type":"post","link":"https:\/\/www.dpscomputing.com\/blog\/2022\/05\/30\/hospital-cybersecurity-disaster-averted\/","title":{"rendered":"Hospital Cybersecurity Disaster AVERTED!"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" data-attachment-id=\"3437\" data-permalink=\"https:\/\/www.dpscomputing.com\/blog\/2022\/05\/30\/hospital-cybersecurity-disaster-averted\/hospital-cyberattack-averted\/\" data-orig-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Hospital-Cyberattack-Averted.jpg\" data-orig-size=\"1280,720\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Devastating Hospital Cyberattack Averted!\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Hospital-Cyberattack-Averted-300x169.jpg\" data-large-file=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Hospital-Cyberattack-Averted-1024x576.jpg\" tabindex=\"0\" role=\"button\" src=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Hospital-Cyberattack-Averted-1024x576.jpg\" alt=\"\" class=\"wp-image-3437\" srcset=\"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Hospital-Cyberattack-Averted-1024x576.jpg 1024w, https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Hospital-Cyberattack-Averted-300x169.jpg 300w, https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Hospital-Cyberattack-Averted-150x84.jpg 150w, https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Hospital-Cyberattack-Averted-768x432.jpg 768w, https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Hospital-Cyberattack-Averted.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n<p>Following on from <a href=\"https:\/\/www.dpscomputing.com\/blog\/2022\/05\/29\/devestating-cyberattack-leaves-hospital-destroyed\/\" target=\"_blank\" rel=\"noreferrer noopener\">our disastrous attempt yesterday<\/a>, hospital cybersecurity disaster was averted!  We successfully explain how a hospital averted a devastating cybersecurity disaster from a double-pronged cyberattack involving the leaking of confidential patient information and a WannaCry-esque cyberattack similar to the one that <a rel=\"noreferrer noopener\" href=\"https:\/\/www.nationalhealthexecutive.com\/articles\/wannacry-cyber-attack-cost-nhs-ps92m-after-19000-appointments-were-cancelled\" target=\"_blank\">hit the NHS a few years ago<\/a>.  <\/p>\n\n\n\n<p>Follow through out &#8216;talkthrough&#8217; of the key decisions made to ensure that the hospital systems remained operational during a major incident and how the importance of rapidly acting upon lax security can save an organisation from complete disaster!<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"video-container\"><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/BxoGLAJLHhA?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-GB&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span><\/div>\n<\/div><\/figure>\n\n\n\n<p>How did you do on <a href=\"http:\/\/datacenterattacks.trendmicro.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Data Center Attack: The Game<\/a>?  Let us know in the comments below!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Following on from our disastrous attempt yesterday, hospital cybersecurity disaster was averted! We successfully explain how a hospital averted a devastating cybersecurity disaster from a double-pronged cyberattack involving the leaking of confidential patient information&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":3437,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Following on from our disastrous attempt yesterday, today we have AVERTED the #hospital #cyberattack\n\nTake a look at how a cyberattack unfolds and our talkthrough of the key decisions to prevent an #NHS style #WannaCry attack and #PatientData leak!","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[12],"tags":[46,1035,3085,3057,3095,3096,3104,3105,3097,3106,3086],"class_list":["post-3436","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-games","tag-cyber-attack","tag-cyber-security","tag-cyberattack","tag-cybersecurity","tag-data-center-attack","tag-data-center-attack-the-game","tag-data-centre-attack","tag-data-centre-attack-the-game","tag-hospital-cyberattack","tag-hospital-cybersecurity","tag-trend-micro"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/www.dpscomputing.com\/blog\/wp-content\/uploads\/2022\/05\/Hospital-Cyberattack-Averted.jpg","jetpack_shortlink":"https:\/\/wp.me\/p3nsfA-Tq","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/3436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/comments?post=3436"}],"version-history":[{"count":1,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/3436\/revisions"}],"predecessor-version":[{"id":3438,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/posts\/3436\/revisions\/3438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/media\/3437"}],"wp:attachment":[{"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/media?parent=3436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/categories?post=3436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dpscomputing.com\/blog\/wp-json\/wp\/v2\/tags?post=3436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}