Home » News » Currently Reading:

Morning Headlines 2/18/16

February 17, 2016 News 4 Comments

Hollywood hospital pays $17,000 in bitcoins to hackers who took control of computers

Hollywood Presbyterian Medical Center caves to the demands of hackers, paying a $17,000 ransom in bitcoin to restore access to its network. Hackers had initially demanded $3.6 million.

CMS and major commercial health plans, in concert with physician groups and other stakeholders, announce alignment and simplification of quality measures

CMS and insurance lobby group America’s Health Insurance Plans agree on seven sets of  clinical quality measures that will standardize quality reporting across multiple payers.

Cerner Downgraded to Hold at Everccore ISI, Price Target Cut to $52

Cerner stock continues to fall, closing 4.8 percent down at the end of trading Wednesday, after lowering its estimate on projected bookings and being downgraded from ‘buy’ to ‘hold’ by analysts.

The NHS’s future is digital – but not if we simply replicate poor paper processes

The Guardian analyzes the potential impact EHRs will have on NHS care delivery, noting that implementing improved business and clinical workflows within the new systems will ultimately dictate the value derived from the investment.

View/Print Text Only View/Print Text Only

HIStalk Featured Sponsors


Currently there are "4 comments" on this Article:

  1. Wow, Hollywood Presbyterian Medical Center paid? There was no guarantee the key would be sent so that was gutsy, regardless the amount. Also, anyone know what EMR they’re on? They should have a DR site that shadows data and wouldn’t be hit by the encryption to allow them to switch and recover instead of this risky move. Wow, simply wow!

  2. If your database is corrupted, the real-time mirror in the DR site will be corrupted as well. If malware encrypts your data, the real-time copy of your data will be encrypted as well. Your only hope would be to restore from backups prior to the encryption process, then roll the journal files forward over the restored backups.

    If the encryption process ran with elevated permissions, as seems likely in this case, there is no reason to assume it would restrict itself to data files. If your application servers had also been encrypted, then the backup application itself might not be available to perform restores.

    It would be educational if the hospital would be willing to be totally open about the extent of the attack, the methods they attempted to recover, and the process they followed to purchase and apply the decryption key.

Subscribe to Updates



Text Ads

Report News and Rumors

No title

Anonymous online form
Rumor line: 801.HIT.NEWS



Founding Sponsors


Platinum Sponsors






























































Gold Sponsors

















Reader Comments

  • PM_from_haities: Thanks for the reading material and recommendation, Dr. J!...
  • ex epic: At the 55:00 minute mark, he says re: asking for more money to connect community providers ... "We don't anticipate that...
  • Vaporware?: What Cerner sells and what Cerner does are two different things. When (if) Cerner and its CommonWell customers ever ...
  • kevin: Professor Reinhardt deserves the requiem shout out if nothing else but for his most oft quoted paper title, "It's the Pr...
  • ex epic: It's mind boggling that after all the pageantry and chest thumping neither DoD nor VA is going live connected to communi...

RSS Industry Events

  • An error has occurred, which probably means the feed is down. Try again later.

Sponsor Quick Links