Home » News » Currently Reading:

Morning Headlines 2/18/16

February 17, 2016 News 4 Comments

Hollywood hospital pays $17,000 in bitcoins to hackers who took control of computers

Hollywood Presbyterian Medical Center caves to the demands of hackers, paying a $17,000 ransom in bitcoin to restore access to its network. Hackers had initially demanded $3.6 million.

CMS and major commercial health plans, in concert with physician groups and other stakeholders, announce alignment and simplification of quality measures

CMS and insurance lobby group America’s Health Insurance Plans agree on seven sets of  clinical quality measures that will standardize quality reporting across multiple payers.

Cerner Downgraded to Hold at Everccore ISI, Price Target Cut to $52

Cerner stock continues to fall, closing 4.8 percent down at the end of trading Wednesday, after lowering its estimate on projected bookings and being downgraded from ‘buy’ to ‘hold’ by analysts.

The NHS’s future is digital – but not if we simply replicate poor paper processes

The Guardian analyzes the potential impact EHRs will have on NHS care delivery, noting that implementing improved business and clinical workflows within the new systems will ultimately dictate the value derived from the investment.

View/Print Text Only View/Print Text Only


HIStalk Featured Sponsors

     

Currently there are "4 comments" on this Article:

  1. Wow, Hollywood Presbyterian Medical Center paid? There was no guarantee the key would be sent so that was gutsy, regardless the amount. Also, anyone know what EMR they’re on? They should have a DR site that shadows data and wouldn’t be hit by the encryption to allow them to switch and recover instead of this risky move. Wow, simply wow!

  2. If your database is corrupted, the real-time mirror in the DR site will be corrupted as well. If malware encrypts your data, the real-time copy of your data will be encrypted as well. Your only hope would be to restore from backups prior to the encryption process, then roll the journal files forward over the restored backups.

    If the encryption process ran with elevated permissions, as seems likely in this case, there is no reason to assume it would restrict itself to data files. If your application servers had also been encrypted, then the backup application itself might not be available to perform restores.

    It would be educational if the hospital would be willing to be totally open about the extent of the attack, the methods they attempted to recover, and the process they followed to purchase and apply the decryption key.







Subscribe to Updates

Search


Loading

Text Ads


Report News and Rumors

No title

Anonymous online form
E-mail
Rumor line: 801.HIT.NEWS

Tweets

Archives

Founding Sponsors


 

Platinum Sponsors


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Gold Sponsors


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Reader Comments

  • Brian Too: One more thing. If you can ever convert a clinical skeptic into a supporter, often those people become your best and st...
  • Brian Too: To use colorful 'political' language, I'm beginning to think that the Republicans couldn't lose their virginity in a who...
  • Time Will Tell: Given the political hot potato the VA unfortunately is you have to think at some point Cerner's name fair or not will be...
  • Big Hat, No Cattle?: Another Re: your HIT index: I’m a clinician who has worked in HIT for 17 years. Your rating scale made me wonder abo...
  • Sam Lawrence: Integrity is out the window these days. No one has held Waltman accountable. No one is complaing to Cerner and they su...

Sponsor Quick Links