Cyberattack forces French hospital to suspend operations

hospital-hero

Local news reports say that a hospital in the Paris suburb of Versailles was shut down over the weekend. This meant that all surgeries had to be postponed and some patients had to move.

According to Franceinfo, a cyberattack hit the André-Mignot hospital in Chesnay-Rocquencourt, Yvelines, around 9 p.m. local time on Saturday evening, rendering several computer displays to go dark.

An AFP report says that six patients from the facility’s critical care and newborn departments were moved to other hospitals as staff tried to keep up with treatment and keep outpatient services running.

Francois Braun, the minister of health, said that the attack led to a “complete restructuring” of the hospital. He said that more people are needed in intensive care because many key devices no longer being connected to a network and must be watched more closely.

Media reports suggest that the outage on the 700-bed hospital seemed to be the result of ransomware.

If that’s the case, it comes on the heels of a large ransomware assault on another plant near Paris in September of this year. When the LockBit 3.0 gang asked for a $10 million ransom, the Centre Hospitalier Sud Francilien (CHSF) in Corbeil-Essonnes had to go back to using pen and paper.

The GHT Coeur Grand Est hospital group said earlier this year that a $1.3 million ransom demand forced it to limit internet access at its hospitals in Vitry-le-Francois and Saint-Dizier.

As with the CHSF incident, the hackers kept their word and shared important patient information they had found online.

There is no information yet on whether the hackers that broke into the André-Mignot hospital were successful in taking any data during the attack.

Are you safe?

Many companies are unaware of the vulnerabilities in their systems. They are therefore easy targets to hackers and criminals who can attack their servers with attacks such as phishing, malware, and ransomware.

Cloudica offers a complete security assessment of your system – both on-premise and on the cloud – allowing you to rest assured that your infrastructure and data are safe and protected by some of the best tools in the industry.

Get in touch today to find out how we can help you.

Contact

Ready to meet the only technology partner you'll ever need?

Cloudica needs the information you provide to contact you about our services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy policy.

Dziękujemy!

Kliknij poniżej aby rozpocząć pobieranie ebooka.

Once the above questions have been answered, a disaster recovery and backup readiness index can be calculated based on the following scale: 

  • Level 1: Inadequate – The organization has significant gaps in its disaster recovery and backup posture.  
  • Level 2: Developing – The organization has some disaster recovery and backup processes in place, but significant improvements are needed.  
  • Level 3: Mature – The organization has a mature disaster recovery and backup posture, but there is room for improvement.  
  • Level 4: Robust – The organization has a strong disaster recovery and backup posture and is well-prepared to address potential disruptions.  
  • Level 5: Exceptional – The organization has a comprehensive and mature approach to disaster recovery and backup. 

The disaster recovery and backup readiness index can be calculated by assigning a score of 1-5 to each question based on the level of readiness demonstrated. The scores are then averaged across all questions in each category to determine the readiness level for that category. The overall disaster recovery and backup readiness index is calculated by averaging the readiness levels across all categories. 

Level 1: Basic
You have minimal cybersecurity processes in place and face a high risk of cyberattacks. Immediate attention and significant improvements are necessary to enhance your security posture.

Level 2: Developing
You have some cybersecurity processes in place but require substantial improvements to reach a mature state. You should focus on strengthening your policies, procedures, and security controls.

Level 3: Mature
You have a solid cybersecurity posture, but there is still room for improvement. You should continue enhancing your processes, monitoring capabilities, and incident response practices.

Level 4: Advanced
You have a strong cybersecurity posture and are well-prepared to address potential threats. However, you should remain proactive and stay abreast of emerging threats and technologies to maintain your advanced level of security.

Level 5: Leading
You have a comprehensive and mature approach to cybersecurity. You are a leader in cybersecurity best practices and continually innovate to stay ahead of evolving threats.

Dziękujemy za rejestrację!

Link do webinaru otrzymają Państwo mailowo dzień przed spotkaniem.

23 Marca 2023

10:00 via MS Teams

Tomasz Woźniak

Thank you!

To download our e-book „The best way to Outsource IT Staff” click button below