Welcome to the Cloudticity Blog

Join in the conversation on healthcare technology, security, compliance, and interoperability.

How to Remove Ransomware and Decrypt Encrypted Files: Ultimate Guide

Ransomware attacks continue to be a major threat for healthcare organizations. Cybercriminals know that providers, insurers, and other healthcare organizations have a wealth of sensitive data and mission-critical systems that are often vulnerable to ... Read more
| Author Josh Ray, tagged in Security

How Can Ransomware Be Delivered? Seven Common Delivery Methods

If cybercriminals have their way, you won’t know your healthcare organization has been attacked with ransomware until it’s too late. By the time they demand a sizable ransom, your highly sensitive patient data will already be encrypted, locking you ... Read more
| Author Kate Wang, tagged in ransomware

WebTPA Faces Healthcare Data Breach

WebTPA is a Texas-based third-party administrator that works in claims adjudication for Prudential-sponsored medical programs. WebTPA works under the Aetna Signature Administrators network. The company describes itself as “one stop for everything ... Read more
| Author Abby Grifno, tagged in


Kaiser Permanente Faces Data Breach and Continued Repercussions

In April, Kaiser Permanente disclosed they had faced a large data breach in 2023. Now, as more details roll in and the lawsuits pile up, Cloudticity takes a look at what happened and what’s next for Kaiser. ... Read more
| Author Abby Grifno, tagged in Security

Ransomware Detection: Strategies for Identification and Response

For healthcare organizations, ransomware continues to be a major threat. Attackers know that if they can hold patient data hostage and disrupt critical services, they might successfully pressure organizations into paying large ransoms. ... Read more
| Author Josh Ray, tagged in ransomware

Ransomware Protection and Defense: A Comprehensive Guide

Ransomware attacks are among the most disruptive and costly cybersecurity incidents experienced by healthcare organizations and other businesses. Attackers see a tremendous opportunity to extract large sums of money by holding data hostage. And by ... Read more
| Author Josh Ray, tagged in Security

Ascension Faces Major Data Breach Due to Ransomware

The nonprofit health system detected a breach on May 8th and is beginning to restore operations. ... Read more
| Author Abby Grifno, tagged in Security

The 5 Most Dangerous Types of Ransomware You Need to Know About

Since the first ransomware incident more than 30 years ago, attackers have continuously modified their techniques. They have devised different ways to access computer systems, prevent users from accessing critical data, and drive organizations to ... Read more
| Author Kate Wang, tagged in ransomware


Subscribe Today

Healthcare technology is moving fast. Don’t miss a thing.

Subscribe Today

New call-to-action