We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

 I accept

Blog

Your Trusted ICT Solution Partner > Blog
2021-03-26

Enterprise Information Security: Ransomware Threatening Global Medical Institutions

It reflects that the medical institutions are facing growing security threats. Besides, the average ransom paid by the victims has tripled from US$84,000 in the fourth quarter of 2019 to US$234,000 in the first quarter of 2020, causing tremendous losses to institutions or individuals. These statistics are alerting all of us to deal with this situation cautiously.

An IT service provider of hospitals in the United States was attacked by ransomware in September last year. Access to certain computer systems was blocked, and certain servers and workstations in the domain have been maliciously encrypted by ransomware. The hackers even downloaded confidential data, including the patient's personal information. This reveals that if an organization is negligent in information security, it will be vulnerable to cyberattacks. Facing the ever-increasing cyberattacks, organizations must take action to improve their network security.

How to Defend against Ransomware?

Solutions to ransomware attacks can be divided into 3 levels: detection, interception and response:

Unified Threat Management (UTM) and Sandbox: Being the frontline to defend against malicious attacks, UTM can assist organizations in preventing emerging unintentional internal threats from intruding internal systems; sandbox can detect unknown threats and send suspicious files to the cloud sandbox for detection.

Incident Response (IR): In addition to interception, security incident response team can swiftly investigate information security incidents, figure out remedial methods, and reduce the impact of malicious attacks.

Endpoint Detection and Response (EDR): EDR can collect information based on the operation of the endpoint, so that the organization can take corresponding counter measures in a timely manner when an abnormality is detected. EDR combines different anti-virus engines, system repairing engines, active defending technologies, etc., to effectively detect and remove known and unknown viruses.

The above information security solutions can effectively protect the network security of organizations from ransomware threats. If an organization lacks a security management team, Managed Security Services (MSS) will be your best choice. The professional team of a Managed Security Service Provider (MSSP) can offer organizations real-time monitoring to identify and analyse vulnerabilities and improve overall network security.

CITIC Telecom CPC is a strong ICT-enabler to support the digital transformation of various industries. One of the flagship solutions, TrustCSI™ 2.0 information security solution, utilizes data-analysis-based SIEM 2.0 technology and has comprehensively upgraded its managed information security service portfolio. Combining the use of Incident Response (IR) services and Security Orchestration and Automated Response (SOAR) services, enterprises can achieve faster threat detection and response to cope with advanced cyberattacks. Our professional security expert team and top-notch Security Operation Centres (SOCs) provide enterprises with 24 x 7 network security monitoring, as well as managed services with high availability and disaster recovery.

As your trusted partner for information technology, we have always been committed to providing you with innovative and professional ICT services. Please contact our professional teams in offices around the world for professional security advice.

Hot Articles

Equipped as a Digitally Resilient Enterprises for Post-pandemic Era

Digital Retail in 5G Era: Intelligent SD-WAN as the basis

Prioritizing Network Optimization in the Age of Artificial Intelligence

Prioritizing Network Optimization in the Age of Artificial Intelligence

Secure Expanding SD-WAN Edge for Distributed Enterprises with SASE

Secure Expanding SD-WAN Edge for Distributed Enterprises with SASE

5G+ Smart Industries - The Transportation and Logistics Accelerator

5G+ Smart Industries - The Transportation and Logistics Accelerator

Share this post
Select Tags

ALL AI Big Data Business Insights Cloud Connectivity Customer Experience Data Centers Data Privacy EdTech Featured Greater Bay Area Information Security Innovation New Normal OBOR SD-WAN Transformation
Related Products

If you would like to learn more about the topic, please leave us your information and we will contact you shortly.

Contact Us

Products & Services
Private Network Information Security Cloud Solutions Cloud Data Center Internet Services Managed Services Europe & CIS Solutions
Solutions
Architecture, Engineering & Construction Automobile Banking & Finance e-Commerce Logistics and Transportation Manufacturing Professional Services Retail Trading Others
Customer Service
Customer Login Services Hotline Service Center Customer Charter
Resources Center
Product Leaflets New Offering Videos White Paper Success Stories
About Us
Our Company Our Partners News Center Accreditation & Awards Success Stories Videos Contact Us Careers Blog COVID-19
Contact Us

Contact Us

General Enquiry 852 2170 7101

Sales Hotline 852 2170 7401

Contact Us

Follow Us

Sitemap | Disclaimer | Net Abuse Policy | Privacy Policy | Cookie Policy | Terms & Conditions

中信集團品牌認證 | 中信雲賦能
Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Follow Us

Welcome to CITIC Telecom CPC

You are about to visit our website

Please choose a location:

South Africa

South America

US & Canada

China Entercom

Asia Pacific
Europe & CIS
South Africa
South America
US & Canada
Need help? Chat with CPC Chatbot
Supported browsers: Latest versions of IE11, Firefox, Chrome and Safari.
Terms & Conditions
Welcome to CITIC Telecom International CPC Limited. Your conversation with CPC Chatbot may be recorded for training, quality control and dispute handling purposes. By clicking “Continue” and using CPC Chatbot, you accept and agree to be bound by our Privacy Policy and give your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
Continue