Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Honor Among Hackers? Not for Those Who Hack Hospitals

Honor Among Hackers? Not for Those Who Hack Hospitals

It’s safe to say that hacking is a frowned-upon practice, but that hasn’t stopped cyber criminals from attempting to turn a profit off of it. This practice has led them to target nonconventional organizations, including hospitals and other healthcare facilities. However, just because a hacker can target a hospital, does this mean that they should? This is a topic of some debate amongst hackers, whom, believe it or not, actually do have some sort of ethical standards.

Before we dive in too deep, we want to make the statement that we don’t sympathize with hackers in any way, shape, or form. However, it is fascinating to investigate the inner machinations of a hacker’s mindset, and doing so can help your business better protect itself from future hacking attacks.

Ransomware is a major threat to hospitals due to its ability to cripple systems and lock down important--potentially life-saving--files. While the number of attacks on hospitals is still relatively low, it’s feared that the successes of others will draw more attention to just how lucrative the practice can be. When lives hang in the balance, hospitals are more likely to pay the ransom, though there are always exceptions. For example, some hospitals are prepared for ransomware and they have ways to decrypt their files, or to restore a backed-up copy of their data.

Surprisingly enough, there are hackers who think that hospital hacks are completely inappropriate. ZDNet reports that there’s a certain code of ethics used by hackers in the Russian underground, and it makes sure to label hospitals as off-limits. This verdict extends beyond borders, even into countries that are known to be hacked by Russian cyber criminals. ZDNet cites a forum where hackers discussed the ethics of hacking at length: “Yes, this is pretty sad and a new low. These ransom attacks are bad enough, but if someone were to die or be injured because of this it is just plain wrong.”

Keep in mind that these words came from a hacker. Yes, there are those that do have some semblance of moral standards.

Of course, you can’t rely on hackers to display the same ethical standards as others. While some might hesitate to hack specific targets, there are others that will brutally assault your infrastructure, regardless of what it holds. Unfortunately, you have other matters to handle, like running your business, making network security a secondary priority. Wouldn’t it be nice if you could outsource this responsibility to professional technicians trained specifically on the security of your IT infrastructure?

To protect your systems from hacking attacks, your best chance is to reach out to A PC Geek. We can arm your systems with enterprise-level network security solutions designed to prevent and detect attacks before they cause significant damage. In particular, we can take preventative measures against ransomware. Since it often comes attached to spam, we can prevent these messages from hitting your inbox in the first place. To learn more, call us at (469) 567-0181.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 21 January 2019
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Productivity Microsoft Hackers Malware Software Business Business Computing Google Miscellaneous Workplace Tips Windows 10 Backup Efficiency Innovation Computer Hosted Solutions Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication User Tips IT Support Business Management VoIP Smartphone Server Network Email Data Quick Tips Holiday Virtualization Operating System Social Media Going Green Upgrade Business Continuity Mobile Device Management Office Saving Money Disaster Recovery Apps Alert Save Money Remote Computing Small Business Android Chrome The Internet of Things Application Antivirus Big Data Managed Service Provider Best Practice Microsoft Office Employer-Employee Relationship Social Ransomware Facebook Mobility WiFi Identity Theft Printer Hacking Password Tablet Passwords BYOD Analytics History Search Gmail Browser Current Events Government Saving Time Information Technology Spam Law Enforcement Bandwidth Lithium-ion battery Unified Threat Management Office Tips Router Fraud Apple Wireless Data Management Money Gadgets Smartphones communications Users USB Work/Life Balance Telephone Systems Encryption Humor Remote Monitoring Tech Support Streaming Media Recovery Network Security Education intranet Net Neutrality Automation Firewall iPhone User Error Collaboration Laptop Computers Disaster Avoiding Downtime Phone System Hard Drives Maintenance Personal Information Budget Business Intelligence Transportation IT Solutions Shortcut Managed IT Services Internet Exlporer Biometrics Social Engineering Telephony VPN Customer Service Outlook Printer Server Wi-Fi Virtual Reality Google Drive DDoS Flexibility App Marketing Benefits Administration IT Consultant Fax Server Content Filtering Data Loss Cybercrime Point of Sale Risk Management PowerPoint Office 365 Cost Management Wearable Technology Managing Stress Retail Private Cloud Proactive IT BDR Wireless Technology Entertainment Update Online Currency Mobile Office Teamwork Best Available Miscelllaneous Reputation Battery Presentation Access Emergency Meetings HIPAA Travel Hosted Solution Automobile Science RAM Regulations Cleaning Website ISP Running Cable Ebay Phishing End of Support Worker Commute 3D Printing Blogging CPU Robot Save Time Amazon Networking Video Games Advertising Near Field Communication Slow Cameras Data storage Hacker Smart Phones Human Resources Legal Data Theft PDF Uninterrupted Power Supply Windows 8 Keyboard Text Messaging Computer Accessories CloudSync Internet of Things Politics Bloatware Vendor Management IT consulting Applications Hiring/Firing Artificial Intelligence Programming Distributed Denial of Service Scalability Mouse Compliance Sports Experience Branding Touchpad Computing eWaste How To Network Congestion Inbound Marketing Emails Audit Music WIndows 7 Operating Sysytem Prodcuctivity OneNote Television Storage Twitter Online Backup Files Books Two-factor Authentication Bluetooth OneDrive Trending Black Market Bring Your Own Device Chromecast Electronic Medical Records Customer Relationship Management SharePoint HaaS Display User Paperless Office Workplace Instant Messaging Excel Administrator Safety

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code