This content is viewable by Everyone

News

Ransomware: The Worst Kind of Pop Quiz for Healthcare and Education

The IT Security Awareness Quiz link is at the article's end. Complete the quiz for an entry in a drawing for one of five $50 Amazon gift cards.

Ransomware isn’t slowing down—it’s ramping up. According to Verizon’s 2025 Data Breach Investigations Report, ransomware continues to climb as a leading cause of breaches, with the average cost per attack now soaring to an eye-popping $5.5 to $6 million. Healthcare remains a prime target, with CNN revealing earlier this year that the health sector reported over 440 ransomware attacks and data breaches to the FBI in just the past year, the highest among all critical infrastructure industries. The stakes couldn’t be higher, making awareness and prevention more crucial than ever.

Ransomware targets home users and businesses of all types. It’s no longer just about locking up data, but also the ability to breach it as well. Cybercriminals threaten to divulge sensitive and confidential information, and recently, they have targeted software manufacturers to create supply chain infections that can, in turn, impact the users of those software products and services.

Even if an organization has adequate systems and data backup measures in place where data can be recovered, the effort of data recovery, extra costs in terms of time, labor, reputation, and loss of system availability can be enormous. 

Although detecting and responding to these attacks is important, prevention is the key. It starts with user awareness, primarily in the area of phishing.

What is ransomware?

Ransomware is malicious software (a.k.a. malware) that locks the victim out of their computer or files – often by encrypting them – until a ransom is paid. The ransomware typically displays a message letting the victim know they have been locked out, along with instructions for how and how much to pay. 

Ransomware is often spread by using stolen credentials, malicious links, and harmful attachments in email; however, this is not the only mechanism. Other sources include malicious applications and files, exploitation of zero-day vulnerabilities, and adware/spyware. 

To pay or not to pay? 

It is important to note that these are criminals. There are no guarantees that if you pay the ransom, you’ll get access back to your computer or files, or the criminals will delete copies of your files they might still have. The FBI and law enforcement advise never paying the ransom because it encourages the criminals to continue committing crimes. However, if the impact of losing the files could have catastrophic consequences, and the criminal group that locked them has a track record of unlocking them if paid, paying the ransom may be a legitimate option to consider.   

What to do if you receive a ransom note 

Work-related device 

If you receive a ransomware pop-up or message on your device alerting you to an infection, takethe following steps immediately to avoid any additional infections or data loss: 

  1. Disconnectfrom the internet (turn off wi-fi andunplug any wired internet connection).
  2. Disconnectany external drives.
  3. Immediately reportthe incident to theIT Service Desk(415-514-4100).
  4. Followthereporting instructions atHow to Report a Security Incident

Personal device (not used for work)  

  1. Contact yourlocal FBI field officeto request assistance orsubmit a tiponline.
  2. File a report with the FBI’sInternet Crime Complaint Center (IC3).  

What to do to minimize the risk of ransomware 

To prevent a ransomware attack and mitigate the impact if one occurs, perform the following on an ongoing basis: 

  1. Exercise caution when opening your messages. Most ransomware attacks begin with some sort of phishing message. Pay attention to emails you get and be on the lookout for phishing attempts. Use the UCSFPhish Alarmtool to report phishing messages. Be on the lookout for external warning banners in your email to denote risky or external senders.
  2. Use anti-virus software and firewalls. It's essential to obtain and use anti-virus software and firewalls from reputable companies and continually maintain your anti-virus software and firewalls through automatic updates. UCSF IT provides security software (anti-virus and firewall in one) freeof charge to UCSF faculty, staff, learners,and researchers at Software.ucsf.edu.
  3. Keep your devices and software up to date. Install updates when available or as soon as it is validated by UCSF for all your operating systems and applications.
  4. Enable pop-up blockers.Pop-ups are regularly used by criminals to spread malicious software. To avoid accidental clicks on or within pop-ups, it's best to prevent them from appearing in the first place. Get more help:
  1. Always back up your computercontent. Ransomware scams will have a limited impact if you back up, verify,and maintain offline copies of your personal and UCSF data. If you are targeted, you can wipe your system clean and reload your files instead of worrying about paying a ransom to get your data back. A backup service, CrashPlan Pro, is offered, at no additional charge, to all ITFS-supported desktops and laptops, as part of the ITFS Basic Support, and to UCSF Medical Center supported devices.
  2. Don’t be Admin all the time. Use administrative-level privileges ONLY when needed, switching back to the regular user level at all other timesIf your computer lets you have separate user accounts, keep the administrative account separate from the one you use to do regular things on your computer. Accidents happen, and if they happen in an admin account that provides for elevated privileges, the impact and likelihood of harm are much greater. The security concept of “least privilege,” where operating at a level only as high as needed to do the task, should be the default approach.   
  3. Enroll in a Password Manager. A password manager is an essential tool for enhancing online security and simplifying digital life. It securely stores and encrypts all your passwords in one place, allowing you to create strong, unique passwords for each account without needing to remember them all. Automating password generation and management reduces the risk of reuse, a common vulnerability exploited by hackers. UCSF provides a free password manager.

Take the quiz onprotecting UCSF and yourself from ransomware. The prize for passing the quiz is one entry in a drawing for one of six $50 Amazon gift cards. 

UCSF Information 

UCSF: How Do I Protect My Computer from Ransomware 

Additional Information 

CISA: Stop Ransomware 

FBI: Scams and Safety Ransomware 

HHS: Fact Sheet: Ransomware and HIPAA 

NPR: Cyberattack led to harrowing lapses at Ascension hospitals, clinicians say

Chief Healthcare Executive: These are the biggest health data breaches in the first half of 2025

The HIPAA Journal:  Covenant Health: 7,864 Individuals Affected by May 2025 Ransomware Attack