8 steps for a successful recovery from a data breach
Despite best efforts to protect the organization’s health information, a hacker has breached the walls and now client files are encrypted, ransom demands have been made to restore health records and more malware may have been placed on the network. An article from Innovative Computing Systems, a professional services firm that helps health organizations and other entities define and improve a comprehensive IT strategy, offers eight steps to immediately take after a breach.