Congratulations to tw-Security—2024 Best in KLAS® Security & Privacy Services!

We're #1! Thank you to all our partners and customers!

Texas Hospital Still Struggling Through Ransomware Attack

Attackers Demand ‘Tens of Millions Dollars’ as Entity Is ‘Walled Off From World’

…”Phone systems typically have back-end server infrastructure that can be susceptible to ransomware attack. Incident response plans must call out contingencies for communication system failures such as voice and email systems,” says Keith Fricke, principle consultant at privacy and security consultancy tw-Security.

Organizations typically focus on protecting the most likely ransomware targets, such as file servers, electronic medical records and other critical clinical and business applications, Fricke says.

As such, incident response plans often revolve around those systems and applications, sometimes forgetting about the “utility” systems such as email and voice systems, he says.

“Organizations sometime assume email and phones will always be available, just as we expect power to be available at an outlet when we plug an appliance into it.”


For more information or to schedule a FREE initial consultation – contact tw-Security.
Read More