3 Lessons A Healthcare IT Director Wishes He Knew (Before He Got Hacked)

stethoscope and heart graphic

Jamion Aden has never strayed far from Cozad, Nebraska. It鈥檚 where he grew up, where he went to school, where he got his first job out of college (coincidentally, right next door to his college), and today, it鈥檚 where he oversees IT at Cozad Community Health System鈥攈e鈥檚 the IT Director and the Director of Rural Health Clinics.

Jamion has found his career footing in the place he鈥檚 called home for many years. Today, he鈥檚 committed to keeping Cozad Community Health System鈥檚 IT running smoothly and without security breaches. As all IT professionals know, however, getting hacked is never a matter of if; it鈥檚 a matter of when.

This is the story of how a hacker found their way into Cozad Health鈥檚 network, how Jamion tackled the issue, and the important lessons he learned along the way.

Finding his way to Cozad Community Health System

But first, some background on Jamion. After completing his post-secondary education in Information Technology and Electronics Technology, he landed his first job as a network engineer for a telecommunications company where he had completed a work/study program while in school.

After leaving his hometown to work briefly as a systems analyst at a publishing company, and then as a network engineer for a retail company, he found his way back to Cozad after the CEO of Cozad Community Health System reached out to ask if he was interested in a new opportunity.

Now, he鈥檚 been at Cozad Community Health System for almost three years. It鈥檚 a small organization, and together Jamion and his two employees are responsible for everything IT鈥攆rom managing the helpdesk, to keeping patient data safe, to protecting the organization from security breaches. One night, however, that last point was tested.

The attack

It started in the middle of the night: 12:30 am, to be precise. One of Jamion鈥檚 team members called him, saying that he had gotten a phone call from one of Cozad Health鈥檚 ER nurses. The nurse was trying to discharge a patient, but couldn鈥檛 print the form they needed. After logging in to the system, Jamion鈥檚 employee realized something wasn鈥檛 right.

Together, they started investigating and saw that there was a Ryuk attack occurring on one of their servers (for the uninitiated, Ryuk is a form of ransomware that attempts to block system access until a 鈥渞ansom鈥 is paid). While his employee shut down all 50 servers, Jamion got to work blocking all connections to the sub-net. Thankfully, no patient health information (PHI) was affected.

As Jamion describes it, it was a blessing in disguise that printers were affected first. It was an obvious sign that something was wrong, and it happened soon enough after the attack occurred that Jamion and his team could get to work shutting everything down before too many things were affected鈥攁ll told, less than 15 minutes elapsed between the beginning of the attack and Jamion鈥檚 team being notified that something was wrong.

Even so, there was still damage to address. Of the 50 servers, 20 were affected and had to be rebuilt. Of course, being part of a healthcare system, Jamion鈥檚 biggest concern was protecting patient data. Thankfully, the company鈥檚 electronic medical record system is housed offline, outside of the network. Jamion was also concerned about whether other sensitive corporate information that was housed on network servers was affected. In another stroke of luck, those servers were not among any of the ones that were affected.

One of the biggest things that saved Cozad Health against this attack was the fact that the entire sub-net was running on a VMware environment. This allowed Jamion and his team to boot each server up one by one without connecting the network and opening their data up to more vulnerabilities.

Doing damage control

The entire process of taking everything offline, launching an investigation, and assessing the damage done didn鈥檛 take long. Jamion was notified about the security breach at 12:30 am, and by 7:00 am, everything had been shut down and was being combed through. 鈥淲ith Ryuk, you can actually tell where it starts to affect your files,鈥 says Jamion. 鈥淸The ransomware] will go into the program files, so we just had to start looking for modified dates on those files.鈥 Jamion and his team kept an eye out for recently modified files that should not have been touched for a few months鈥攖he tip-off that those files had been affected.

Once everything was accounted for and under control, Jamion鈥檚 team got to work on two important things. The first was switching to a new anti-virus protection provider. 鈥淲e found out that the definitions we were getting from them were not blocking Ryuk,鈥 says Jamion, 鈥淲hich is how we got into this situation.鈥

The second thing was implementing 秋葵视频色 for email filtering, which was especially important as it seemed that Ryuk had gotten in through a phishing email. 鈥淥verall, we wanted to make it fool proof for our end users,鈥 says Jamion. 鈥淲e didn鈥檛 want anyone worrying about what they were clicking on, and we wanted people to feel assured and safe.鈥

Overall, Jamion is proud of how quickly he and his team got to work and were able to save Cozad Community Health System from a major attack. However, as with all security breaches, this crisis came with some hard-won lessons for Jamion.

Lesson #1: Have a mediation plan in place

Again, when it comes to cyber security, it鈥檚 never a question of if an attempted hack will occur, but when. 鈥淵ou should always have a backup plan in place,鈥 says Jamion. 鈥淎nd a backup plan to your backup plan.鈥 This means regularly checking that your backup solutions are working and that you also have offsite backups in place. 鈥淵ou can never have too many,鈥 says Jamion.

Lesson #2: Have a good backup structure in place for business data

As mentioned, although patient data was left untouched due to being kept offline, there was sensitive business data that was affected during this attack. In fact, from just one server, three months鈥 worth of data were rendered unrecoverable. There鈥檚 no substitute for work like that being lost, and having this attack happen drove that point home for Jamion. Now, it鈥檚 more of a priority than ever for Jamion and his team to offer backup solutions to every piece of data housed on network servers.

Lesson #3: Keep your 聽malware definitions up to date

Before this attack occurred, Jamion鈥檚 team was using a different anti-virus software than what they use today. That software鈥檚 virus definitions were not blocking Ryuk attacks, which is how an attack occurred. One of the anti-virus solutions that Jamion鈥檚 team switched to in the wake of the attack is an AI platform that is constantly learning and 聽and has proven to protect against both known and zero-day attacks.

鈥淪ince we鈥檝e implemented that software, we鈥檝e had zero issues,鈥 says Jamion. Though they have the advantage of AI, keeping safe is also a matter of staying informed. 鈥淲e鈥檙e constantly looking for what the next ransomware is going to be,鈥 says Jamion. 鈥淲e also rely on third-party companies to investigate that for us. 秋葵视频色 does a great job of making sure the rules and definitions are up to date, and it catches a ton of stuff that we wouldn鈥檛 have caught on our own.鈥

Overall, keeping an organization safe from hackers is tireless work, and there will always be lessons to learn. Though getting hacked was a stressful situation, it also prompted Jamion and his team to make changes that ended up keeping Cozad Community Health System safer in the long run. In the meantime, Jamion and his team won鈥檛 let their guard down, though. They learned some valuable lessons, and now you can too.