• For Enquiry
  • 847-868-9253
  • 847-868-9208
  • Home
  • Why Choose CIO Landing?
    • Our Team
    • Success Stories
    • ‘8 Things’ We Do Better
    • Partners & Certifications
    • Our Services
  • Industry Expertise
    • Manufacturing
    • Medical
    • Education
    • Financial Services
    • Non-Profit
    • Law Firms
  • IT Solutions
    • Co-Managed Service
    • Managed IT Services
    • IT Support
      • On Demand Services
      • Office Moves & Wiring
      • Security
    • Server Management
    • Backup & Disaster Recovery
    • Cloud Services
    • CIO & IT Consulting
    • Cybersecurity Services
    • VoIP
    • Managed Firewall
    • Microsoft 365
      • Microsoft 365 Plans
        • Small Business
        • Enterprise
        • Education
    • Hardware & Software Sales
    • Email & Spam Protection
  • Resources
    • Free Copy Of New Book
    • Blog
    • Newsletter
    • Video Tips
      • Video Tips Archive
    • Free Cloud Report
    • IT Buyers Guide
    • Cybersecurity Crisis Report
    • Network Audit
    • COVID 19 Resources
    • In The NEWS
    • Online Training
  • About Us
    • Our Mission
    • Leadership
    • Teams
    • Referral Program
    • Press Releases
      • CIO Landing: More Than Just an IT
      • Small businesses can have an IT department too
      • CIO Landing, Inc. has joined forces with Banc Certified Merchant Services (BCMS).
    • Affiliations
    • Careers
      • Job Descriptions
    • FAQs
    • Causes We Support
    • Privacy Policy
    • Terms & Conditions
  • Locations
    • Northfield, IL
    • Northbrook, IL
    • Chicago, IL
    • Miami, FL
  • Support
✕
Coolest Consumer Products at CES 2024
May 21, 2024
Smart Tips for Building a Smart Home on a Budget
May 28, 2024

The Silent Danger: A Powerful Lesson For Every Business From This $1.6 Billion Ransomware Attack

May 24, 2024

In recent months, the alarming cybersecurity breach at Change Healthcare, the healthcare payment-processing company under the healthcare giant UnitedHealth Group, has thrown a spotlight on a chilling reality: cyberthreats can lurk undetected within our networks, ready to unleash chaos at a moment’s notice. The breach, executed by the notorious ALPHV/BlackCat hacker group, involved the group lying dormant within the company’s environment for nine days before activating a crippling ransomware attack.

This incident, which severely impacted the US healthcare system, a network with a large budget for cybersecurity, underscores an urgent message for all business leaders: a robust cybersecurity system and recovery plan are not optional but a fundamental necessity for every business out there.

The Attack Details

The attack began with hackers using leaked credentials to access a key application that was shockingly left without the safeguard of multifactor authentication.

Once inside, the hackers stole data locked it down, and then demanded a hefty ransom.

This action stalled nationwide healthcare payment-processing systems, for thousands of pharmacies and hospitals causing them to grind to a halt!

Then things got even worse!

The personal health information and personal information of potentially millions of Americans were also stolen. The hackers set up an exit scam, demanding a second ransom to not release this information.

This breach required a temporary shutdown, disconnecting entire systems from the Internet, a massive overhaul of the IT infrastructure, and significant financial losses estimated to potentially reach $1.6 billion by year’s end. Replacing laptops, rotating credentials, and rebuilding the data center network were only a few of the actions the UnitedHealth Group had to take. More than financial, the cost was deeply human – impacting health care services and risking personal data.

Resources for Protecting Your Personally Identifiable Information (PII)

If you think your personally identifiable information (PII) might have been involved in this breach, it’s crucial to take immediate steps to protect yourself and mitigate any potential damage. Here are some recommended actions and resources to help you navigate this challenging situation:

Actions to Take

  1. Change Your Passwords: Immediately update passwords for your online accounts, especially those linked to sensitive information such as banking and email accounts. Use strong, unique passwords for each account.
  2. Enable Multifactor Authentication (MFA): Where possible, enable MFA to add an extra layer of security to your accounts.
  3. Monitor Your Financial Accounts: Regularly check your bank accounts, credit card statements, and other financial accounts for any suspicious activity.
  4. Freeze Your Credit: Consider freezing your credit with major credit bureaus to prevent new accounts from being opened in your name.
  5. Report Identity Theft: If you suspect your identity has been stolen, report it to the Federal Trade Commission (FTC) and follow their recommended steps.

Resources

  • Identity Theft Recovery Plan: Federal Trade Commission (FTC)
  • Credit Freeze Information: Equifax, Experian, TransUnion
  • Free Credit Report: AnnualCreditReport.com
  • Cybersecurity Tips: Cybersecurity & Infrastructure Security Agency (CISA)

What to Monitor

  • Bank Accounts: Look for unauthorized transactions and report them immediately.
  • Credit Reports: Regularly check your credit reports from the three major bureaus (Equifax, Experian, TransUnion) for any new accounts or errors.
  • Email Accounts: Watch for phishing attempts and unsolicited emails asking for personal information.
  • Social Media Accounts: Ensure there are no unauthorized logins or posts from your accounts.
  • Healthcare Accounts: If applicable, monitor your health insurance statements for unusual activity.

 

While devastating, it’s a powerful reminder that threats can dwell in silence within our networks, waiting for an opportune moment to strike.

It is not enough to react; proactive measures are essential.

Ensuring systems are secured, implementing multifactor authentication, regularly updating and patching software, and having a recovery plan in place in the event of an attack are steps that can no longer be overlooked and are basic requirements for doing business in today’s world.

Incident Response Plan Checklist

Creating a robust incident response plan is essential for mitigating the impact of a cybersecurity breach. Here is a checklist of important elements to consider when developing your plan:

  1. Preparation
    • Incident response policy and procedures
    • Incident response team roles and responsibilities
    • Regular training and awareness programs
  1. Identification
    • Monitoring systems and tools
    • Incident detection and analysis protocols
    • Reporting mechanisms for suspected incidents
  1. Containment
    • Short-term containment strategies
    • Long-term containment strategies
    • Secure communication channels
  1. Eradication
    • Identifying the root cause
    • Removing malicious code and artifacts
    • System and data restoration procedures
  1. Recovery
    • System validation and testing
    • Returning systems to normal operation
    • Continuous monitoring for signs of recurrence
  1. Lessons Learned
    • Post-incident analysis and reporting
    • Updating incident response plans and procedures
    • Incorporating lessons learned into training and awareness programs

By following these guidelines and utilizing the resources provided, you can better protect your personal information and ensure a comprehensive response to any cybersecurity incident.

Lessons for Business Leaders

The idea that “We’re too small to be a target” is false. Just because you’re not big enough to make national news, doesn’t mean you’re too small to be attacked!

Cybersecurity isn’t just an IT issue; it’s a cornerstone of modern business strategy. It requires investment, training and a culture of security awareness throughout the organization.

The fallout from a breach reaches far beyond the immediately affected systems. It can erode customer trust, disrupt services and lead to severe financial and reputational damage, and your business will be the one blamed.

As we consider the lessons from the Change Healthcare incident, it’s your duty to make cybersecurity a top priority. Investing in comprehensive cybersecurity measures isn’t just a precaution – it’s a fundamental responsibility to our customers, our stakeholders and our future.

Remember, in the realm of cyber threats, what you can’t see can hurt you – and preparation is your most powerful defense.

Is Your Organization Secure?

If you’re not a client of CIO Landing and you’re unsure if your network is secure, we can help. Our experts are ready to provide you with a FREE Security Consultation to address your concerns. We’ll assess your current security measures, identify any vulnerabilities, and offer actionable solutions to safeguard your business. Don’t wait until it’s too late – schedule your Security Consultation today and ensure your organization is protected against potential threats.

 

Share
7
CIO Landing
CIO Landing

Related posts

March 10, 2025

The Hidden Threat: How Gift Card Scams Are Targeting Businesses Like Yours


Read more
February 11, 2025

CIO Landing Named to CRN’s MSP 500 List for 2025—For the Third Year in a Row!


Read more
December 4, 2024

Unlocking the Power of Windows 11: Tips for Maximum Productivity


Read more
© 2025 All Rights Reserved | Powered by CIO Landing