SUMMARY

October 30, 2020 6:00PM

  • An alert was issued by the FBI that healthcare systems are being targeted by ransomware assaults
  • Out of an abundance of caution, we are going to shut down operations over the weekend, which includes our internal CP network, phone system, and e-mails from 8:00PM PDT on Friday 10/30 through 4:30AM PST on Monday 11/2
  • Updates will be provided on this webpage and via text through our emergency notification system
  • Please exercise extreme caution when opening your emails per the instructions below

 

IT SYSTEMS OFFLINE THIS WEEKEND

In response to potential coordinated external attacks, we are taking all networked IT systems off-line this weekend. This includes our internal CP network, phone system, and e-mails. NextGen can still be accessed through the RDP (but not through the VPN).
 
The shut-down will begin tonight at 8:00PM PDT and systems will be live again at 4:30AM PST on Monday, November 2nd. This will allow us additional time to test and reinforce our security and disaster recovery systems.
 
If there are any changes to that plan, you will be contacted via text message through our emergency notification system. This page will contain the most up to date information throughout the weekend.
 
Patients will still be able to contact us using their front office phone number, our main line or via the on-call phone number.
 

EMAIL PROTOCOL

Please be extremely vigilant when receiving email, even from senders that appear to be from someone you know – ransomware has gotten very good at ‘pretending’ to be from someone you know and trust, asking you to perform some type of task that can give them unauthorized access to our network. Most often, they’ll ask you to click a link or download an attachment.
 
Follow these steps verify the sender and security of your e-mails:
1. Look at the e-mail sender. It will often appear to be from someone you know, but when you look at the e-mail address, the e-mail address is not from the known individual.
2. Review the content with caution. Is the request from this person unusual? Is there an attachment or link that looks suspicious? Is the writing style consistent with how the sender typically communicates?
3. If it seems at all suspicious:
a. Immediately contact the person you believe the email is from and confirm that they sent it.
b. Never open the file or click the link “just to check”
4. Delete the email if it is not from someone you know and trust.
5. Alert the Help Desk so we can take necessary steps to block the sender.
 

OTHER STEPS WE ARE TAKING TO PROTECT OUR SYSTEMS

We’re taking proactive steps to ensure we bulletproof our infrastructure, however security starts with all of us keeping our eyes open for anything suspicious. Below are the steps we’ve taken today:

  • Updated our email filter solution (ProofPoint) to the latest patch level.
  • Ensured our device protection solution (Trend Micro) is up-to-date and all devises are fully patched with the latest security patches.
  • Updating our firewall / intrusion protection systems to the latest security patch levels.
  • Actively engaged with our Managed Services Provider to implement additional security best practices in response to the latest threat.

 
Additional information about the FBI warning