Six steps to beat computer viruses
Briefings on Accreditation and Quality, February 1, 2018
This is an excerpt from a member only article. To read the article in its entirety, please login or subscribe to Briefings on Accreditation and Quality.
Keeping your hospital computers (and your facility) up and running
In the last week of June 2017, foreign-born computer malware attacked the systems of several U.S. companies—including Princeton Community Hospital in Princeton, West Virginia, and Heritage Valley Health System in Beaver, Pennsylvania.
However, unlike other types of malware, “NotPetya” didn’t hold their data hostage. Instead, it completely wiped their files, erasing any patient data that hadn’t been backed up beforehand.
This “NotPetya” malware is named after the 2016 Petya ransomware that it superficially resembles, according to Steven J. Hausman of Hausman Technology Presentations in Gaithersburg, Maryland. But it’s not really ransomware, and despite its so-far limited reach, that’s what makes it so frightening.
Health IT professionals will remember how in the course of just one weekend in May 2017, more than 300,000 computers in 150 countries were held hostage by a ransomware virus called “WannaCry,” including two multistate systems in the U.S. that successfully defended against the initial May 12 attack but found the malware lurking on isolated computers.
That attack came less than six months after CMS issued a warning to hospitals and other providers to tighten up cybersecurity and issued instructions to surveyors to discuss health IT during state agency survey visits.
This is an excerpt from a member only article. To read the article in its entirety, please login or subscribe to Briefings on Accreditation and Quality.
Related Products
Most Popular
- Articles
-
- CMS puts hospital surveys on limited hold as surge continues
- Don't forget the three checks in medication administration
- Practice the six rights of medication administration
- Note similarities and differences between HCPCS, CPT® codes
- Q&A: Primary, principal, and secondary diagnoses
- The consequences of an incomplete medical record
- Nursing responsibilities for managing pain
- Skills of effective case managers
- ICD-10-CM coma, stroke codes require more specific documentation
- OB services: Coding inside and outside of the package
- E-mailed
-
- CMS puts hospital surveys on limited hold as surge continues
- Charge and bill Medicare all pre-operative diagnostic tests
- How to create a safety protocol for emergency department psychiatric patients
- Know guidelines and subtle differences in code descriptions for laceration repairs
- Q&A: Mechanical room storage, risk assessments, patient rooms
- Modifier -25: Is that E/M service really above and beyond the norm?
- Long-Term Care Training Solutions
- Injections and infusions continue to confuse coders
- Get the facts on emergency department FAST exams
- Capturing start and stop times for infusions
- Searched