{"id":7962,"date":"2023-01-30T16:35:47","date_gmt":"2023-01-30T21:35:47","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=7962"},"modified":"2025-04-03T12:02:07","modified_gmt":"2025-04-03T17:02:07","slug":"carahsoft-ransomware-healthcare-utilities-blog-2023","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/","title":{"rendered":"Ransomware in Healthcare and Utilities"},"content":{"rendered":"<h4><strong><em><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-7965 alignright\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_300-02.jpg\" alt=\"Carahsoft Ransomware Cybersecurity Blog Series Blog 2 Embedded Image 2023\" width=\"298\" height=\"298\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_300-02.jpg 298w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_300-02-150x150.jpg 150w\" sizes=\"(max-width: 298px) 100vw, 298px\" \/><\/em><\/strong><\/h4>\n<p>The past two years have seen relentless cyberattacks employed by hostile nations to disrupt American security, public health and the economy. The current U.S. administration has <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/10\/11\/fact-sheet-biden-harris-administration-delivers-on-strengthening-americas-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Top CTA\">announced its emphasis on fighting ransomware<\/a> particularly within these critical infrastructures. New regulations are underway for 4 of the 16 sectors including healthcare and water, which is a part of the utilities sector.<sup>[<\/sup><a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/10\/11\/fact-sheet-biden-harris-administration-delivers-on-strengthening-americas-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 1\"><sup>1<\/sup><\/a><sup>] <\/sup>In anticipation of the coming changes, here is a look into the current state of ransomware in healthcare and utilities, both of which have experienced some of the worst cyberattacks in recent years. By understanding the challenges in these fields, IT administrators can work to\u00a0evaluate their individual organizational cybersecurity status and start to resolve issues before the enforcement of the new regulations begin.<\/p>\n<h2><strong>USE CASE: HEALTHCARE<\/strong><\/h2>\n<p>Unlike ransomware attacks on other sectors, cyberattacks within healthcare are threat-to-life crimes instead of economic crimes because they impede hospital operations and critical patient care. Ransomware attacks by foreign cybercriminals on hospitals are analogous to military strikes against healthcare facilities, which violate international warfare laws. Because of this, it is not only an IT system concern but a healthcare-wide risk that must be addressed with grave importance.<\/p>\n<h4><strong><em>Recent Attacks<\/em><\/strong><\/h4>\n<p>In 2020, Universal Health Services network was hacked by the Ryuk variant of ransomware resulting in all its IT systems shutting down and operations stopping at 250 hospitals. According to a Department of Health and Human Services (HHS) report, the incident ultimately cost $67 million in lost revenue and recovery although $26 million was covered by cyber insurance.<sup>[<\/sup><a href=\"https:\/\/www.fiercehealthcare.com\/health-tech\/healthcare-data-breach-costs-reach-record-high-10m-attack-ibm-report\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 2\"><sup>2<\/sup><\/a><sup>] <\/sup><\/p>\n<p>The devastating ransomware attack against Scripps Health in May 2021 cost the company $112.7 million with over a month of cleanup and extensive revenue loss. <sup>[<\/sup><a href=\"https:\/\/www.fiercehealthcare.com\/health-tech\/healthcare-data-breach-costs-reach-record-high-10m-attack-ibm-report\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 2\"><sup>2<\/sup><\/a><sup>] <\/sup>\u00a0In light of this rise in attacks, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA) and HHS all issued admonitions that hospitals and health systems be on alert and strengthen their ransomware protection and emergency plans.<sup>[<\/sup><a href=\"https:\/\/www.cnet.com\/news\/privacy\/fbi-warns-imminent-wave-of-ransomware-attacks-hitting-hospitals\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 3\"><sup>3<\/sup><\/a><sup>] <\/sup><\/p>\n<h4><strong><em>Impact<\/em><\/strong><\/h4>\n<p>On average, the HHS reported that each healthcare cyberattack cost $10.10 million including the ransom, business loss and remediation costs, ranking it as the most expensive sector for cyberattacks across all industries.<sup>[<\/sup><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/08\/16\/ransomware-101-for-healthcare\/?sh=3bb3ca785b86\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 4\"><sup>4<\/sup><\/a><sup>] <\/sup>This is 41.6% higher than in 2020.<sup>[<\/sup><a href=\"https:\/\/www.fiercehealthcare.com\/health-tech\/healthcare-data-breach-costs-reach-record-high-10m-attack-ibm-report\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 2\"><sup>2<\/sup><\/a><sup>] <\/sup>\u00a0Often, criminals target the healthcare sector because of the quantity and sensitivity of data available. Hospitals are also particularly susceptible due to the complexity of the IT infrastructure, 24\/7 operations and the strong repercussions to the reputation of the organization, making them more likely to pay the ransom if an attack happens. Many healthcare organizations also employ a lot of legacy equipment and software as well as perform extensive amounts of file-sharing with many vulnerable endpoints. These areas are a security concern but some of these older systems are also imperative for regular operations and certain medical software to run.<sup>[<\/sup><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/08\/16\/ransomware-101-for-healthcare\/?sh=3bb3ca785b86\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 4\"><sup>4<\/sup><\/a><sup>]<\/sup><\/p>\n<p>In addition to the immediate disturbance of operations, all of these hacks expose millions of patient records. For the general population, these healthcare breaches have tripled in their impact between 2018 and 2021, with 14 million people affected to now over 45 million. According to the HHS, healthcare institutions faced 373 ransomware attacks from January to July 2022.<sup>[<\/sup><a href=\"https:\/\/www.fiercehealthcare.com\/health-tech\/healthcare-data-breach-costs-reach-record-high-10m-attack-ibm-report\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 2\"><sup>2<\/sup><\/a><sup>] <\/sup>\u00a0Cyber disruptions\u2019 impact through delayed care in areas with poorer healthcare is magnified even more. Northwell Health\u2019s Senior Vice President and Chief Quality Officer Mark Jarrett says: \u201cClinicians in general tend to think of this as an information technology issue, and it really isn\u2019t. It\u2019s a patient safety issue.\u201d<sup>[<\/sup><a href=\"https:\/\/www.theverge.com\/2021\/8\/19\/22632378\/pandemic-ransomware-health-risks\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 5\"><sup>5<\/sup><\/a><sup>]<\/sup><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7967\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-2-v4.jpg\" alt=\"Carahsoft Ransomware Cybersecurity Blog Series Blog 2 Infographic Image 2023\" width=\"2500\" height=\"2835\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-2-v4.jpg 2500w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-2-v4-265x300.jpg 265w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-2-v4-768x871.jpg 768w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-2-v4-1786x2025.jpg 1786w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-2-v4-640x726.jpg 640w\" sizes=\"(max-width: 2500px) 100vw, 2500px\" \/><\/p>\n<h4><strong><em>Post-Attack Measures<\/em><\/strong><\/h4>\n<p>Because of the unfortunate success of ransomware within healthcare, many institutions are seeking cyber insurance to offset the cost. The high number of incidents, however, has made it more difficult to obtain coverage until substantial cyber security defenses are in place.<sup>[<\/sup><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/06\/01\/the-state-of-ransomware-in-healthcare-2022\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 6\"><sup>6<\/sup><\/a><sup>] <\/sup>While 79% of healthcare organizations possess cyber insurance, nearly all of them have had to improve their cybersecurity strategies to maintain coverage including incorporating new technologies, more employee training and other system process changes.<sup>[<\/sup><a href=\"https:\/\/news.sophos.com\/en-us\/2022\/06\/01\/the-state-of-ransomware-in-healthcare-2022\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 6\"><sup>6<\/sup><\/a><sup>] <\/sup><\/p>\n<p>The Censinet and the Ponemon Institute report, \u201c<a href=\"https:\/\/assets-global.website-files.com\/63bc855e7cb1897eeb806ea7\/6532d7b6718a3de763b9cbd1_Ponemon%20Research%20Report%20-%20The%20Impact%20of%20Ransomware%20on%20Healthcare%20During%20COVID-19%20and%20Beyond.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Report\">The Impact of Ransomware on Healthcare During COVID-19 and Beyond<\/a>,\u201d noted that most healthcare institutions budget 3-4% of IT spending towards cybersecurity while financial firms spend an average of 6-14% to combat cybercrimes.<sup>[<\/sup><a href=\"https:\/\/services.global.ntt\/en-us\/insights\/blog\/ransomware-in-healthcare\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 7\"><sup>7<\/sup><\/a><sup>]<\/sup> When healthcare systems invest in more cyber defenses, the overall impact of ransomware is dramatically lessened. For institutions with fully deployed cyber security measures, an IMB Security\u2019s annual breach report discovered a 65.2% reduction in average breach cost and 74-day shorter detection and containment cycle versus companies without. This decreased the cost from $6.20 million to $3.15 million for those with security and a breach lifecycle of 323 days down to 249.<sup>[<\/sup><a href=\"https:\/\/www.fiercehealthcare.com\/health-tech\/healthcare-data-breach-costs-reach-record-high-10m-attack-ibm-report\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 2\"><sup>2<\/sup><\/a><sup>] <\/sup>These results speak to the importance of implementing comprehensive cybersecurity protection and remediation tools in the healthcare sector.<\/p>\n<h2><strong>USE CASE: UTILITIES<\/strong><\/h2>\n<p>Similar to healthcare, ransomware attacks to the utilities sector are not just costly and inconvenient, they also impede critical infrastructure and have a wide impact radius to public health, safety and the companies\u2019 bottom line. Utilities also underscore every aspect of daily life through electricity, oil, water and natural gas.<\/p>\n<h4><strong><em>Recent Attacks<\/em><\/strong><\/h4>\n<p>In May 2021, the Colonial Pipeline attack brought ransomware in utilities to the forefront of the public eye. The incident affected 45% of the fuel supply used on the U.S. East Coast, which generated a steep price increase and public panic.<sup>[<\/sup><a href=\"https:\/\/ransomware.org\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 8\"><sup>8<\/sup><\/a><sup>]<\/sup> Within two hours of access, the cyber criminals immobilized 100GB of critical data. As a result, the 5,500-mile pipeline system was closed for six days until the company paid $4.4 million in cryptocurrency as ransom. Reuters lists this cyber event as the most disruptive ransomware attack on record.<sup>[<\/sup><a href=\"https:\/\/www.cdw.com\/content\/cdw\/en\/articles\/security\/ransomware-attacks-energy-industry.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 9\"><sup>9<\/sup><\/a><sup>] <\/sup><\/p>\n<p>Following the Colonial Pipeline hack, Congress issued a strong cybersecurity measure requiring critical infrastructure organizations to report an attack in three days and any payment of the ransom within one day. The goal is to increase information sharing and better equip the government to assist in these situations.<sup>[<\/sup><a href=\"https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/looking-back-at-the-colonial-pipeline-ransomware-incident\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 10\"><sup>10<\/sup><\/a><sup>]<\/sup><\/p>\n<p>Another large cyberattack in 2021 occurred in Florida when cybercriminals infiltrated the water treatment facility\u2019s network through dormant software and spiked the sodium hydroxide level to 100 times its usual amount. Although the attack was detected and neutralized, the event unveiled a huge vulnerability in U.S. water systems due to minimal IT budgets, staffing shortages causing maintenance delays, outdated cybersecurity systems and other factors, making it easier for cybercriminals to breach the system unnoticed. Shortly after the news of the Florida water hack, three additional water treatment plant attacks across the country that had not been reported came to the surface.<sup>[<\/sup><a href=\"https:\/\/spycloud.com\/protect-critical-infrastructure-utilities-ransomware-ato\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 11\"><sup>11<\/sup><\/a><sup>] <\/sup>Research indicates that this situation represents a consistent trend. Although large attacks on well-known businesses are often featured more in the news, small businesses experience more ransomware attacks but they commonly go unreported.<sup>[<\/sup><a href=\"https:\/\/energycentral.com\/c\/pip\/how-utilities-can-reduce-risk-ransomware-attacks\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 12\"><sup>12<\/sup><\/a><sup>]<\/sup> The limited resources available often make smaller local government and enterprises a preferred target for ransomware because it is more difficult for them to recover from an attack, thus making them more likely to pay the ransom quickly.<sup>[<\/sup><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/ransomware-hits-u-s-electric-utility\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 13\"><sup>13<\/sup><\/a><sup>]<\/sup><\/p>\n<h4><strong><em>Impact<\/em><\/strong><\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7968\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-3-v4.jpg\" alt=\"Carahsoft Ransomware Cybersecurity Blog Series Blog 2-2 Infographic Image 2023\" width=\"2500\" height=\"3031\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-3-v4.jpg 2500w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-3-v4-247x300.jpg 247w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-3-v4-768x931.jpg 768w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-3-v4-1670x2025.jpg 1670w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Infographic-3-v4-640x776.jpg 640w\" sizes=\"(max-width: 2500px) 100vw, 2500px\" \/><\/p>\n<p>These major attacks in 2021 followed an already heightened evaluation of utilities\u2019 security due to Executive Order 13636, which initiated the National Institute of Standards and Technology (NIST) Cyber Security Framework of 2014,<sup>[<\/sup><a href=\"https:\/\/www.nist.gov\/news-events\/news\/2014\/02\/nist-releases-cybersecurity-framework-version-10#:~:text=In%20February%202013%2C%20President%20Obama,help%20organizations%20manage%20cyber%20risks\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 14a\"><sup>14a<\/sup><\/a><sup>]<\/sup> and the America\u2019s Water Infrastructure Act of 2018,<sup>[<\/sup><a href=\"https:\/\/www.cmtengr.com\/2019\/08\/20\/americans-water-infrastructure-act\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 14b\"><sup>14b<\/sup><\/a><sup>]<\/sup> which required water systems threat risk and resilience assessments to be completed between March 2020 and June 2021.<\/p>\n<h4><strong><em>Post-Attack Measures<\/em><\/strong><\/h4>\n<p>Utilities companies often rely on a data backup strategy that replicates the system to a second data center if the primary server fails. This setup works well for natural disasters, but companies must be aware that the infection can also be duplicated on non-segmented backup copies which hackers prioritize attacking as well.<\/p>\n<p>Within the electric power sector, operational technology (OT) is widely spread across data centers\u2019 locations and connected through dedicated cables which allows additional control over networking. This however, increases the attack surface and restricts the network\u2019s ability to adapt and reroute traffic to another safe location in the event of a cyberattack, because the system is hardwired to be isolated.<sup>[<\/sup><a href=\"https:\/\/aws.amazon.com\/blogs\/industries\/how-energy-and-utility-companies-can-recover-from-ransomware-and-other-disasters-using-iac-on-aws\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 15\"><sup>15<\/sup><\/a><sup>]<\/sup> Companies must be careful not to assume the direct lines would be inherently secure and should continue to conduct system monitoring especially as these networks start connecting to other systems. In addition to geographical and system complexities, many utility organizations also have decentralized cybersecurity leadership, which can contribute to post-attack confusion and a lack of clarity on the recovery plan.<sup>[<\/sup><a href=\"https:\/\/cybersecurity.att.com\/blogs\/security-essentials\/ransomware-and-energy-and-utilities\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 16\"><sup>16<\/sup><\/a><sup>]<\/sup><\/p>\n<p>While demonstrating the return on investment (ROI) of cybersecurity strategies can be a challenge until an attack has occurred, experts highlight the value of these measures by pointing out the impact that a compromised system can have on a company and the general public.<sup>[<\/sup><a href=\"https:\/\/www.cdw.com\/content\/cdw\/en\/articles\/security\/ransomware-attacks-energy-industry.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 9\"><sup>9<\/sup><\/a><sup>] <\/sup>\u00a0With cybersecurity, success is ultimately demonstrated by the absence of cyber incidents. In the past, this led to a reluctance to invest in necessary cyber measures; however, this awareness is shifting as more companies are joining the initiative to secure their systems and networks.<\/p>\n<p>In July 2022, national security advisors announced additional cybersecurity requirements will be instituted soon by the Environmental Protection Agency (EPA) to defend national water systems from hackers.<sup>[<\/sup><a href=\"https:\/\/www.nextgov.com\/cybersecurity\/2022\/07\/epa-issue-cybersecurity-rule-water-facilities-white-house-official\/375098\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 17\"><sup>17<\/sup><\/a><sup>]<\/sup> To prepare for these new guidelines, companies within the utilities sector must evaluate their systems and work to improve their defenses and recovery plans now in the face of ransomware attacks.<\/p>\n<h2><strong>LOOKING AHEAD<\/strong><\/h2>\n<p>Critical infrastructure across the country has been overwhelmed by the influx of ransomware and data breaches. Looking at the data projections for the coming years reveals that these intrusions will continue to grow at an alarming rate. While legislation develops to address the current cybersecurity gaps, sectors like healthcare and utilities must actively take initiative to address system weaknesses and make it more difficult for cybercriminals to infiltrate. Investing in the necessary changes and updates is crucial for U.S. critical infrastructure organizations before their individual institutions become the next target. Now more than ever is the time to modernize infrastructure, get ahead of cyber requirements and build resilience against the threat landscape.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><em>Learn about steps to address these cybersecurity concerns whether in healthcare and utilities or across all sectors in our Ransomware Security Strategies Blog. Find our <\/em><\/strong><a href=\"https:\/\/www.carahsoft.com\/community\/tag\/ransomware\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Bottom CTA\"><strong><em>full Ransomware Series here<\/em><\/strong><\/a><strong><em>.<\/em><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><em><strong>Resources<\/strong><\/em><\/p>\n<p>[1] \u201cFACT SHEET: Biden-\u2060Harris Administration Delivers on Strengthening America\u2019s Cybersecurity,\u201d The White House, <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/10\/11\/fact-sheet-biden-harris-administration-delivers-on-strengthening-americas-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 1\">https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2022\/10\/11\/fact-sheet-biden-harris-administration-delivers-on-strengthening-americas-cybersecurity\/<\/a><\/p>\n<p>[2] \u201cHealthcare data breach costs reach record high at $10M per attack: IBM report,\u201d Fierce Healthcare, <a href=\"https:\/\/www.fiercehealthcare.com\/health-tech\/healthcare-data-breach-costs-reach-record-high-10m-attack-ibm-report\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 2\">https:\/\/www.fiercehealthcare.com\/health-tech\/healthcare-data-breach-costs-reach-record-high-10m-attack-ibm-report<\/a><\/p>\n<p>[3] \u201cRansomware attacks on hospitals could soon surge, FBI warns,\u201d CNET, <a href=\"https:\/\/www.cnet.com\/news\/privacy\/fbi-warns-imminent-wave-of-ransomware-attacks-hitting-hospitals\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 3\">https:\/\/www.cnet.com\/news\/privacy\/fbi-warns-imminent-wave-of-ransomware-attacks-hitting-hospitals\/<\/a><\/p>\n<p>[4] \u201cRansomware 101 For Healthcare,\u201d Forbes, <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/08\/16\/ransomware-101-for-healthcare\/?sh=3bb3ca785b86\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 4\">https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/08\/16\/ransomware-101-for-healthcare\/?sh=3bb3ca785b86<\/a><\/p>\n<p>[5] \u201cThe pandemic revealed the health risks of hospital ransomware attacks,\u201d The Verge, <a href=\"https:\/\/www.theverge.com\/2021\/8\/19\/22632378\/pandemic-ransomware-health-risks\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 5\">https:\/\/www.theverge.com\/2021\/8\/19\/22632378\/pandemic-ransomware-health-risks<\/a><\/p>\n<p>[7] \u201cRansomware in healthcare: it\u2019s a matter of life and death,\u201d NTT, <a href=\"https:\/\/services.global.ntt\/en-us\/insights\/blog\/ransomware-in-healthcare\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 7\">https:\/\/services.global.ntt\/en-us\/insights\/blog\/ransomware-in-healthcare<\/a><\/p>\n<p>[8] \u201cEverything You Need to Know About Ransomware,\u201d Ransomware.org, <a href=\"https:\/\/ransomware.org\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 8\">https:\/\/ransomware.org\/<\/a><\/p>\n<p>[9] \u201cRansomware Attacks in the Energy Industry,\u201d CDW, <a href=\"https:\/\/www.cdw.com\/content\/cdw\/en\/articles\/security\/ransomware-attacks-energy-industry.html\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 9\">https:\/\/www.cdw.com\/content\/cdw\/en\/articles\/security\/ransomware-attacks-energy-industry.html<\/a><\/p>\n<p>[11] \u201cThe Critical Need to Protect Critical Infrastructure: Spotlight on Utilities,\u201d Spy Cloud, <a href=\"https:\/\/spycloud.com\/protect-critical-infrastructure-utilities-ransomware-ato\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 11\">https:\/\/spycloud.com\/protect-critical-infrastructure-utilities-ransomware-ato\/<\/a><\/p>\n<p>[12] \u201cHow Utilities Can Reduce the Risk of Ransomware Attacks,\u201d Energy Central, <a href=\"https:\/\/energycentral.com\/c\/pip\/how-utilities-can-reduce-risk-ransomware-attacks\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 12\">https:\/\/energycentral.com\/c\/pip\/how-utilities-can-reduce-risk-ransomware-attacks<\/a><\/p>\n<p>[13] \u201cRansomware Hits U.S. Electric Utility,\u201d Trend Micro, <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/ransomware-hits-u-s-electric-utility\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 13\">https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/ransomware-hits-u-s-electric-utility<\/a><\/p>\n<p>[14a] &#8220;NIST Releases Cybersecurity Framework Version 1.0,&#8221; NIST, <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2014\/02\/nist-releases-cybersecurity-framework-version-10#:~:text=In%20February%202013%2C%20President%20Obama,help%20organizations%20manage%20cyber%20risks\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 14a\">https:\/\/www.nist.gov\/news-events\/news\/2014\/02\/nist-releases-cybersecurity-framework-version-10#:~:text=In%20February%202013%2C%20President%20Obama,help%20organizations%20manage%20cyber%20risks<\/a><\/p>\n<p>[14b] &#8220;What Does the New American\u2019s Water Infrastructure Act (AWAI) of 2018 Mean to You?&#8221; Crawford, Murphy &amp; Tilly, Inc., <a href=\"https:\/\/www.cmtengr.com\/2019\/08\/20\/americans-water-infrastructure-act\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 14b\">https:\/\/www.cmtengr.com\/2019\/08\/20\/americans-water-infrastructure-act\/<\/a><\/p>\n<p>[15] \u201cHow energy and utility companies can recover from ransomware and other disasters using infrastructure as code on AWS,\u201d AWS, <a href=\"https:\/\/aws.amazon.com\/blogs\/industries\/how-energy-and-utility-companies-can-recover-from-ransomware-and-other-disasters-using-iac-on-aws\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 15\">https:\/\/aws.amazon.com\/blogs\/industries\/how-energy-and-utility-companies-can-recover-from-ransomware-and-other-disasters-using-iac-on-aws\/<\/a><\/p>\n<p>[16] \u201cRansomware and Energy and Utilities,\u201d AT&amp;T Business <a href=\"https:\/\/cybersecurity.att.com\/blogs\/security-essentials\/ransomware-and-energy-and-utilities\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 16\">https:\/\/cybersecurity.att.com\/blogs\/security-essentials\/ransomware-and-energy-and-utilities<\/a><\/p>\n<p>[17] \u201cWhite House Official: EPA to Issue Cybersecurity Rule for Water Facilities,\u201d Nextgov, <a href=\"https:\/\/www.nextgov.com\/cybersecurity\/2022\/07\/epa-issue-cybersecurity-rule-water-facilities-white-house-official\/375098\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 17\">https:\/\/www.nextgov.com\/cybersecurity\/2022\/07\/epa-issue-cybersecurity-rule-water-facilities-white-house-official\/375098\/<\/a><\/p>\n<p><strong>Infographic Resources:<\/strong><\/p>\n<p>[6] \u201cThe State of Ransomware in Healthcare 2022,\u201d Sophos, <a href=\"https:\/\/news.sophos.com\/en-us\/2022\/06\/01\/the-state-of-ransomware-in-healthcare-2022\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 6\">https:\/\/news.sophos.com\/en-us\/2022\/06\/01\/the-state-of-ransomware-in-healthcare-2022\/<\/a><\/p>\n<p>[10] \u201cLooking Back at the Colonial Pipeline Ransomware Incident,\u201d Government Technology, <a href=\"https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/looking-back-at-the-colonial-pipeline-ransomware-incident\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Resource 10\">https:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/looking-back-at-the-colonial-pipeline-ransomware-incident<\/a><\/p>\n<p>\u201cThe 2021 Ransomware Risk Pulse: Energy Sector,\u201d Black Kite, <a href=\"https:\/\/blackkite.com\/wp-content\/uploads\/2021\/09\/The-2021-Ransomware-Risk-Pulse-_-Energy-Sector.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" data-track=\"Carahsoft - Ransomware in Utilities and Healthcare Series Blog - 2023 - Black Kite\">https:\/\/blackkite.com\/wp-content\/uploads\/2021\/09\/The-2021-Ransomware-Risk-Pulse-_-Energy-Sector.pdf<\/a><head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/community\/carahsoft-ransomware-healthcare-utilities-blog-2023\"><\/head><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The past two years have seen relentless cyberattacks employed by hostile nations to disrupt American security, public health and the economy. The current U.S. administration has announced its emphasis on fighting ransomware particularly within these critical infrastructures. New regulations are &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":7966,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,265],"tags":[545,1383,1443,1135,376],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware in Healthcare and Utilities | Carahsoft<\/title>\n<meta name=\"description\" content=\"Ransomware attacks have targeted U.S. critical infrastructure including the healthcare and utilities sectors. Find out more about the recent data vulnerabilities discovered.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware in Healthcare and Utilities | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Ransomware attacks have targeted U.S. critical infrastructure including the healthcare and utilities sectors. Find out more about the recent data vulnerabilities discovered.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-30T21:35:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T17:02:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-02.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"482\" \/>\n\t<meta property=\"og:image:height\" content=\"224\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Carahsoft Team\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Carahsoft Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/\"},\"author\":{\"name\":\"The Carahsoft Team\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\"},\"headline\":\"Ransomware in Healthcare and Utilities\",\"datePublished\":\"2023-01-30T21:35:47+00:00\",\"dateModified\":\"2025-04-03T17:02:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/\"},\"wordCount\":1997,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-02.jpg\",\"keywords\":[\"Cybersecurity\",\"EPA\",\"Healthcare Technology\",\"Operational Technology\",\"Ransomware\"],\"articleSection\":[\"Cybersecurity\",\"Healthcare\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/\",\"name\":\"Ransomware in Healthcare and Utilities | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-02.jpg\",\"datePublished\":\"2023-01-30T21:35:47+00:00\",\"dateModified\":\"2025-04-03T17:02:07+00:00\",\"description\":\"Ransomware attacks have targeted U.S. critical infrastructure including the healthcare and utilities sectors. Find out more about the recent data vulnerabilities discovered.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-02.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-02.jpg\",\"width\":482,\"height\":224,\"caption\":\"Carahsoft Ransomware Cybersecurity Blog Series Blog 2 Preview Image 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware in Healthcare and Utilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\",\"name\":\"The Carahsoft Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"caption\":\"The Carahsoft Team\"},\"description\":\"The Digital Media team at Carahsoft.\",\"sameAs\":[\"https:\/\/www.carahsoft.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware in Healthcare and Utilities | Carahsoft","description":"Ransomware attacks have targeted U.S. critical infrastructure including the healthcare and utilities sectors. Find out more about the recent data vulnerabilities discovered.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware in Healthcare and Utilities | Carahsoft","og_description":"Ransomware attacks have targeted U.S. critical infrastructure including the healthcare and utilities sectors. Find out more about the recent data vulnerabilities discovered.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/","og_site_name":"| Carahsoft","article_published_time":"2023-01-30T21:35:47+00:00","article_modified_time":"2025-04-03T17:02:07+00:00","og_image":[{"width":482,"height":224,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-02.jpg","type":"image\/jpeg"}],"author":"The Carahsoft Team","twitter_misc":{"Written by":"The Carahsoft Team","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/"},"author":{"name":"The Carahsoft Team","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083"},"headline":"Ransomware in Healthcare and Utilities","datePublished":"2023-01-30T21:35:47+00:00","dateModified":"2025-04-03T17:02:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/"},"wordCount":1997,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-02.jpg","keywords":["Cybersecurity","EPA","Healthcare Technology","Operational Technology","Ransomware"],"articleSection":["Cybersecurity","Healthcare"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/","url":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/","name":"Ransomware in Healthcare and Utilities | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-02.jpg","datePublished":"2023-01-30T21:35:47+00:00","dateModified":"2025-04-03T17:02:07+00:00","description":"Ransomware attacks have targeted U.S. critical infrastructure including the healthcare and utilities sectors. Find out more about the recent data vulnerabilities discovered.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-02.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/01\/Ransomware-Blog-Series-Concepts-Edit_482x224-02.jpg","width":482,"height":224,"caption":"Carahsoft Ransomware Cybersecurity Blog Series Blog 2 Preview Image 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/carahsoft-ransomware-healthcare-utilities-blog-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Ransomware in Healthcare and Utilities"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083","name":"The Carahsoft Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","caption":"The Carahsoft Team"},"description":"The Digital Media team at Carahsoft.","sameAs":["https:\/\/www.carahsoft.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/7962"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=7962"}],"version-history":[{"count":11,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/7962\/revisions"}],"predecessor-version":[{"id":8736,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/7962\/revisions\/8736"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/7966"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=7962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=7962"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=7962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}