May 2023

byClint latham, doctor of law

The present situation of the veterinary network security

theCareer girlVeterinary continuing education onlinenews,Clint lathamThe present situation of the veterinary network security is discussed.If you are not sure whether your veterinary clinic face extortion attack or the risk of network attack, please watch this blog for more information!

Network security has become a popular term in 2021.Against The Colonial Pipeline, CNA, Kasyea and JBS companies such as high-profile attacks caused The wide attention of a large organization.Veterinary medicine, however, still largely don't care.Common message is "why anyone would want a perspex-walled records" and "we are already provides the guarantee for our IT staff".The statistics tell us, however, more than a third of the small and medium-sized enterprises under the influence of network attack.(1) with the vet is classed as a healthcare sector, so it is difficult to know exactly what affected the practice of quantity every year.However, according to the study of malware byte (1), roughly a third of the small and medium enterprises.Each year about 11000 veterinary clinic under the influence of network attack.It was a week 228 veterinary hospital!

Why don't we have heard of all these attacks?
2020, 135000.00, AVMA online this paper introduces the network security and why it is important to have PLIT network security.AVMA trust department, said at the time of presentation, their average network claim $135000.00.Unfortunately, the $500000.00 ransom demand is not enough to produce news value.In fact, in order to make the federal government intervention, the ransom must be more than $2 a day.(3) the sad truth is that just because we don't have heard of them does not mean that it didn't happen.XNUMX in March, 2021, the White House released an open letter to all enterprises.(XNUMX) they particularly pointed out that "no company can from cyber attacks.Veterinary industry, however, to a great extent, think they are in a safe area.This is mainly due to a lack of understanding of network attack how it works.

Photo byPeter Lin Fu,sincePixabay

Construction of network attack
Contrary to popular belief, cyber criminals will seldom find individual enterprise, unless the enterprise can bring millions of dollars in ransom for them.Therefore, how to design the network attack against smaller firms, more important is to attack the vet?The waterfall method.When the cyber criminals want to hunt small businesses, they will attack like a waterfall.When the river downstream, it will find the path of least resistance.Therefore, cyber criminals will build a media attack, looking for known bugs use, so that they can easily into the hospital.We can through the analysis of Lockhead Heed Martins Cyber Kill Chain (4) of the seven link to understand Cyber criminals use steps.These seven steps are:

1. The reconnaissance
2. The weaponization
3 delivery
Development of 4.
5.The installation
6. Command and control
7. Action and the target

Then, these tools will be looking for weaknesses in area 1 to 3;And then deploy it to the world wide web.The most common attack vectors is E-mail phishing, followed by the corporate E-mail.Some industry examples include resume with false blackmail embedded software to hospital, or access to the email address of the clinic access.Then let them access the practice management system based on cloud, allowing them to create false invoices sent to all of your customers.

5 simple steps to protect the hospital
The good news is that began to protect your hospital from cyber attacks waterfall doesn't have to be expensive or complex.Therefore, we will introduce five actions you can take, these actions will be on your veterinary hospital, the biggest impact on network security.

"Education is the most powerful weapon you can be used to change the world" - nelson mandela

1.passwordA good password manager: first use.Recently launched by ReVil JBS and Kasyea attacks, using the list from the damage to the dark web access password.A good password manager can easily use each account for you to create complex and unique password.They can also easily with Windows and the Google Chrome web browser integration.They are sharing the password so you can easily with people, and notify you when your any password leaked.The best part is, when employees leave, you just need to stop using their password manager access, without having to change the hospital each password.

Photo byPeter Lin Fu,sincePixabay

2. Update, update, update againIs by the way: a simple known vulnerabilities on the network.All technology software company provides security updates on a regular basis.Some of the update is called zero day update.This suggests that these holes are criminals actively use, you need to update now.Therefore, you should regularly update any content related to the Internet.Not only is a computer and they use the software.There are any IOT (Internet of things) equipment.Such as smart phones, tablets, smart thermostats, Amazon or Google Home equipment, circular Alexa camera system, things like that.List goes on.If it hit the Internet. 用于在 2017 年 50,000 月进行迄今为止最大的网络安全事件的永恒之蓝漏洞,仍然是大约 6 台服务器上的漏洞。 (2017) 尽管微软在 XNUMX 年 XNUMX 月发布了一个安全更新来解决这个问题。如果你学到了什么,应该让所有东西都保持最新。

3. Use the free network security tools: a good way to reduce the network security risk is to use the free network security tools.This is we recommend to you the three tools of bookmarks

  • Have I been Pwnd -https://haveibeenpwned.com
    This is to look at whether or not your email account or password has been leaked good tool.It scans web of "base" and find your account details.If you do not use a password manager, you should at least once every quarter run through this website your account.
  • The total number of virus -https://virustotal.com
    This is to scan your resume or any other document sent to you by email the perfect tool.It will focus on more than 50 anti-malware engine scan your uploaded files.Most of the file, even if you download them, before you try to open them.Therefore, before you open them upload them to virus get total can save you hundreds of thousands of dollars in damage to the network crime.You never know where any file or email looks a little bit suspicious.Uploaded to the virus get total first.
  • A black light -https://themarkup.org/blacklight
    Think this site is to track or you may be doing other malicious?Enter the URL in the Blacklight, it will scan the website, tell you what goes on behind the scenes.

4. Staff training:The weakest point in any network security plan is human factors.If we can let our staff know how to find how phishing attacks, confidential information, why the password need complex, how to use the free tools and how to make sure that they were talking with who.Will greatly help to protect our hospital.The most important thing is that, if our employees think they have to be victims of cyber attacks, they need to know how to do it.The sooner we act, the quicker we can reduce the loss.

5. The backup of business continuity: will backup your data to a place that is very kind of you.However, if you can't use it in the event of a disaster, so how useful is the data.Investopidia business continuity is defined as "business continuity plan (BCP) is to create a system for the prevention and recovery process of the company's potential threat.

The plan to ensure that personnel and assets are protected, and can quickly play a role in the event of a disaster."(5) the definition of the second aspect is the most important "able to work quickly in the event of a disaster".We have numerous hospitals think their data is protected before the disaster.Will only leave bad or unable to access the data.Always ensure that test your backup plan.Don't ever believe IT staff only.We often see they think they have backup all of the contents, but it is backup to connect to the server hard drive, the hard disk drive is encrypted.Good business continuity can be network attack from disaster into a minor inconvenience.

The resources
1.https://www.cnet.com/tech/services-and-software/malwarebytes-state-of-ransomware-shutting-down-1-in-5-affected-small-businesses/
2.https://www.justice.gov/criminal-ccips/reporting-computer-internet-related-or-intellectual-property-crime
3.https://sbecouncil.org/wp-content/uploads/2021/06/Memo-What-We-Urge-You-To-Do-To-Protect-Against-The-Threat-of-Ransomware.pdf
4.https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
5.https://www.investopedia.com/terms/b/business-continuity-planning.asp
6.https://gbhackers.com/still-50000-hosts-vulnerable-eternal-blue-exploit/

Only VETgirl members can comment.The loginThe orJoin VETgirlNow!