{"id":19599,"date":"2024-06-21T07:28:55","date_gmt":"2024-06-21T07:28:55","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=19599"},"modified":"2026-01-25T04:45:06","modified_gmt":"2026-01-25T04:45:06","slug":"guarding-health-data-lessons-from-the-ascension-cyber-attack","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack","title":{"rendered":"Guarding Health Data: Lessons from the Ascension Cyber Attack"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"19599\" class=\"elementor elementor-19599\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6f20b837 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6f20b837\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-346eb41e\" data-id=\"346eb41e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6dd1e1f5 elementor-widget elementor-widget-text-editor\" data-id=\"6dd1e1f5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p data-pm-slice=\"1 1 []\">In May 2024, a big hack hit Ascension, a major player in the healthcare industry, and compromised electronic health records (EHR) and other systems across multiple states. This is a big reminder that healthcare needs robust cybersecurity, where patient data is the most sensitive.<\/p>\n<h2>The Ascension Ransomware Hack: A Case Study<\/h2>\n<p>In May 2024, Ascension, one of the largest health systems in the US, got hit with a ransomware attack. EHR and other systems were down across multiple states, patient care and operations were impacted, but Ascension\u2019s facilities remain open. Nathan Eddy, a graduate of Northwestern University&#8217;s Medill School, talks cybersecurity in healthcare, bringing his IT security and journalism expertise to the table.<\/p>\n<p>Ascension used downtime procedures to keep patient care going during the outage, such as using paper records for clinical care and downtime procedures to ensure patient safety and protect patients&#8217; sensitive information.<\/p>\n<p>The hack started with an employee downloading a malicious file. That allowed the attackers to get into the network. The ransomware spread quickly, locked down several file servers and potentially patient data. Ascension was hit with operational disruptions, including not being able to process credit card transactions at its pharmacies and delayed prescription refills.<\/p>\n<p>Emergency medical services were diverted as hospitals were experiencing system disruptions and had to prioritize patient safety.<\/p>\n<p>Ascension restored EHR access in many areas and is offering credit monitoring and identity theft protection to those affected. While it wasn\u2019t explicitly confirmed how far laterally the attackers moved in the network, the complexity of the attack suggests they likely did. Ascension is still working to restore systems like MyChart, so there are still operational challenges and recovery needs. They\u2019re committed to getting systems back and managing the aftermath of the hack.<\/p>\n<h2>Electronic Health Record Vulnerabilities<\/h2>\n<p>Health systems\u2019 IT infrastructures are full of holes, making them a target rich environment for hackers. Common weaknesses include outdated software, no encryption, no access controls, and no staff training, all of which put sensitive information at risk. In the Ascension case, the hackers exploited these weaknesses to get in and escalate privileges in the network.<\/p>\n<h4>Outdated Software<\/h4>\n<p>Many health systems run legacy software that\u2019s no longer supported or updated, so they\u2019re vulnerable to known exploits. In the Ascension hack, it\u2019s believed outdated operating systems and applications were a big factor. These systems didn\u2019t have the patches to defend against the latest threats, so the attackers had an easy way in.<\/p>\n<h4>No Encryption of Sensitive Patient Data<\/h4>\n<p>Sensitive patient data on healthcare networks is often not encrypted. Once an attacker gets in, they can easily access and exfiltrate data. In the Ascension case, some of the files accessed were not encrypted so the hackers could read and potentially misuse sensitive data.<\/p>\n<h4>No Access Controls<\/h4>\n<p>Healthcare organizations often have no access controls, which means once an attacker gets in, they can move laterally across the network with ease. In the Ascension breach, the lack of segmentation of network privileges allowed the hackers to escalate their access and compromise more systems. Proper access controls, like limiting user permissions and role-based access, would have mitigated this risk.<\/p>\n<h4>No Staff Training<\/h4>\n<p>Human error is a major vulnerability in cybersecurity. Healthcare staff often don\u2019t have enough training to recognize phishing emails and other social engineering tactics. In the Ascension case, it\u2019s believed phishing emails were used to trick employees into downloading malware. Better training programs focused on cybersecurity awareness would have prevented this breach by reducing the success of phishing attacks.<\/p>\n<h2>Privileged Access Management (PAM)<\/h2>\n<p><a href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/pam-for-dummies-what-is-privileged-access-management\" rel=\"noopener noreferrer\">Privileged Access Management<\/a> (PAM) is a key component of any cybersecurity strategy, especially in healthcare. PAM solutions manage and monitor <a href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/what-happens-when-hackers-gain-privileged-account-access\" rel=\"noopener noreferrer\">privileged accounts<\/a> so only authorized people have access to sensitive data and systems. By controlling and auditing access, PAM can prevent unauthorized activity and reduce the risk of breaches. For example, PAM could have stopped the attackers from moving laterally in Ascension\u2019s network and limited the damage.<\/p>\n<h2>Cybersecurity in Healthcare Organizations and Providers<\/h2>\n<p>To protect healthcare data, organizations must do cybersecurity. Best practices include software updates, robust encryption, multi-factor authentication and continuous staff training on cybersecurity awareness. Plus regular security audits and penetration testing to identify and remediate vulnerabilities. Follow the relevant regulatory guidelines to comply and protect patient data during a breach.<\/p>\n<p>Healthcare organizations must also be ready to respond to a breach. That means having an incident response plan in place and communicating with the affected parties in a timely manner. Follow the relevant regulations to maintain operational transparency and protect patient data after a breach.<\/p>\n<h2>Admin By Request: The Whole Solution<\/h2>\n<p><a href=\"https:\/\/www.adminbyrequest.com\/en\" rel=\"noopener noreferrer\">Admin By Request<\/a> offers a layered approach to cybersecurity to protect both SMBs and enterprises from advanced cyber threats. Our PAM solution addresses the vulnerabilities in the Ascension case by providing fine-grained access controls, real-time monitoring, and automated <a href=\"https:\/\/www.adminbyrequest.com\/en\/docs\/ai-approval\" rel=\"noopener noreferrer\">approval<\/a> workflows, while also utilizing downtime procedures to maintain operations during incidents. With Admin By Request, healthcare organizations can strengthen their security, comply with regulations, and protect sensitive patient data.<\/p>\n<h2>Conclusion<\/h2>\n<p>The Ascension breach is a wake-up call to the importance of cybersecurity in healthcare. By knowing the common vulnerabilities and doing something about it, healthcare providers can protect their data and patient trust. Human services play a big role in bolstering cybersecurity measures as ransomware attacks disrupt healthcare operations and put sensitive patient data at risk. Admin By <a href=\"https:\/\/www.adminbyrequest.com\/SupportAssist\" rel=\"noopener noreferrer\">Request is here to support<\/a> these efforts with a PAM solution that secures and reduces the risk of future attacks.<\/p>\n<p>Nathan Eddy is a graduate of Northwestern University\u2019s Medill School. This article was informed by credible IT security reporting.<\/p>\n<p><\/p>\n<p><\/p>\n<p><strong>Sources:<\/strong><\/p>\n<p><\/p>\n<p><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ascension-hacked-after-employee-downloaded-malicious-file\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/ascension-hacked-after-employee-downloaded-malicious-file\/<\/a><a href=\"https:\/\/www.bridgemi.com\/michigan-health-watch\/ascension-owner-15-michigan-hospitals-confirms-cyberattack-was-ransomware\">https:\/\/www.bridgemi.com\/michigan-health-watch\/ascension-owner-15-michigan-hospitals-confirms-cyberattack-was-ransomware<\/a><\/p>\n<p><\/p>\n<p><\/p>\n<p><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In May 2024, Ascension faced a major cyber attack, disrupting electronic health records across multiple states. Learn how healthcare vulnerabilities were exploited, and the critical steps needed to safeguard sensitive data.<\/p>\n","protected":false},"author":2,"featured_media":19600,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[83,90,351,129,148,367,366,81,82,67,174,68,79],"ppma_author":[9],"class_list":["post-19599","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-cyber-attack","tag-cyber-criminal","tag-cyber-defense","tag-cyberattack","tag-cybersecurity","tag-encryption","tag-exploits","tag-healthcare","tag-malware","tag-pam","tag-privileged-access","tag-privileged-access-management","tag-ransomware","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"In May 2024, Ascension faced a major cyber attack, disrupting electronic health records across multiple states. Learn how healthcare vulnerabilities were exploited, and the critical steps needed to safeguard sensitive data.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"cyber attack,cyber criminal,cyber defense,cyberattack,cybersecurity,encryption,exploits,healthcare,malware,pam,privileged access,privileged access management,ransomware\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Guarding Health Data: Lessons from the Ascension Cyber Attack \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"In May 2024, Ascension faced a major cyber attack, disrupting electronic health records across multiple states. Learn how healthcare vulnerabilities were exploited, and the critical steps needed to safeguard sensitive data.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2024-06-21T07:28:55+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T04:45:06+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Guarding Health Data: Lessons from the Ascension Cyber Attack \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"In May 2024, Ascension faced a major cyber attack, disrupting electronic health records across multiple states. Learn how healthcare vulnerabilities were exploited, and the critical steps needed to safeguard sensitive data.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/guarding-health-data-lessons-from-the-ascension-cyber-attack#blogposting\",\"name\":\"Guarding Health Data: Lessons from the Ascension Cyber Attack \\u00bb Admin By Request\",\"headline\":\"Guarding Health Data: Lessons from the Ascension Cyber Attack\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/hacker-touching-light.png\",\"width\":1950,\"height\":1300,\"caption\":\"Graphic of the back of a hacker in a hoodie touching points on a screen\"},\"datePublished\":\"2024-06-21T07:28:55+00:00\",\"dateModified\":\"2026-01-25T04:45:06+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/guarding-health-data-lessons-from-the-ascension-cyber-attack#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/guarding-health-data-lessons-from-the-ascension-cyber-attack#webpage\"},\"articleSection\":\"Blogs, Cyber Attack, Cyber Criminal, Cyber Defense, Cyberattack, Cybersecurity, Encryption, Exploits, Healthcare, Malware, PAM, Privileged Access, Privileged Access Management, Ransomware, S Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/guarding-health-data-lessons-from-the-ascension-cyber-attack#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/guarding-health-data-lessons-from-the-ascension-cyber-attack#listItem\",\"name\":\"Guarding Health Data: Lessons from the Ascension Cyber Attack\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/guarding-health-data-lessons-from-the-ascension-cyber-attack#listItem\",\"position\":3,\"name\":\"Guarding Health Data: Lessons from the Ascension Cyber Attack\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/guarding-health-data-lessons-from-the-ascension-cyber-attack\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/guarding-health-data-lessons-from-the-ascension-cyber-attack\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/guarding-health-data-lessons-from-the-ascension-cyber-attack#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/guarding-health-data-lessons-from-the-ascension-cyber-attack\",\"name\":\"Guarding Health Data: Lessons from the Ascension Cyber Attack \\u00bb Admin By Request\",\"description\":\"In May 2024, Ascension faced a major cyber attack, disrupting electronic health records across multiple states. Learn how healthcare vulnerabilities were exploited, and the critical steps needed to safeguard sensitive data.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/guarding-health-data-lessons-from-the-ascension-cyber-attack#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/hacker-touching-light.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/guarding-health-data-lessons-from-the-ascension-cyber-attack\\\/#mainImage\",\"width\":1950,\"height\":1300,\"caption\":\"Graphic of the back of a hacker in a hoodie touching points on a screen\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/guarding-health-data-lessons-from-the-ascension-cyber-attack#mainImage\"},\"datePublished\":\"2024-06-21T07:28:55+00:00\",\"dateModified\":\"2026-01-25T04:45:06+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Guarding Health Data: Lessons from the Ascension Cyber Attack \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Guarding Health Data: Lessons from the Ascension Cyber Attack \u00bb Admin By Request","description":"In May 2024, Ascension faced a major cyber attack, disrupting electronic health records across multiple states. Learn how healthcare vulnerabilities were exploited, and the critical steps needed to safeguard sensitive data.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"cyber attack,cyber criminal,cyber defense,cyberattack,cybersecurity,encryption,exploits,healthcare,malware,pam,privileged access,privileged access management,ransomware","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack#blogposting","name":"Guarding Health Data: Lessons from the Ascension Cyber Attack \u00bb Admin By Request","headline":"Guarding Health Data: Lessons from the Ascension Cyber Attack","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2024\/06\/hacker-touching-light.png","width":1950,"height":1300,"caption":"Graphic of the back of a hacker in a hoodie touching points on a screen"},"datePublished":"2024-06-21T07:28:55+00:00","dateModified":"2026-01-25T04:45:06+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack#webpage"},"articleSection":"Blogs, Cyber Attack, Cyber Criminal, Cyber Defense, Cyberattack, Cybersecurity, Encryption, Exploits, Healthcare, Malware, PAM, Privileged Access, Privileged Access Management, Ransomware, S Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack#listItem","name":"Guarding Health Data: Lessons from the Ascension Cyber Attack"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack#listItem","position":3,"name":"Guarding Health Data: Lessons from the Ascension Cyber Attack","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack","name":"Guarding Health Data: Lessons from the Ascension Cyber Attack \u00bb Admin By Request","description":"In May 2024, Ascension faced a major cyber attack, disrupting electronic health records across multiple states. Learn how healthcare vulnerabilities were exploited, and the critical steps needed to safeguard sensitive data.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2024\/06\/hacker-touching-light.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack\/#mainImage","width":1950,"height":1300,"caption":"Graphic of the back of a hacker in a hoodie touching points on a screen"},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack#mainImage"},"datePublished":"2024-06-21T07:28:55+00:00","dateModified":"2026-01-25T04:45:06+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Guarding Health Data: Lessons from the Ascension Cyber Attack \u00bb Admin By Request","og:description":"In May 2024, Ascension faced a major cyber attack, disrupting electronic health records across multiple states. Learn how healthcare vulnerabilities were exploited, and the critical steps needed to safeguard sensitive data.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2024-06-21T07:28:55+00:00","article:modified_time":"2026-01-25T04:45:06+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Guarding Health Data: Lessons from the Ascension Cyber Attack \u00bb Admin By Request","twitter:description":"In May 2024, Ascension faced a major cyber attack, disrupting electronic health records across multiple states. Learn how healthcare vulnerabilities were exploited, and the critical steps needed to safeguard sensitive data.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"19599","title":"#post_title #separator_sa #site_title","description":"#post_excerpt","keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-25 05:03:11","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2024-06-21 07:28:55","updated":"2026-01-25 05:03:11"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tGuarding Health Data: Lessons from the Ascension Cyber Attack\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Guarding Health Data: Lessons from the Ascension Cyber Attack","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/guarding-health-data-lessons-from-the-ascension-cyber-attack"}],"authors":[{"term_id":9,"user_id":2,"is_guest":0,"slug":"sophie-admin","display_name":"S Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/Avatars-Dark-02.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"S","job_title":"","description":"With a solid background in computer science and graphic design, my career kicked off writing tech manuals for various companies in both the software and hardware realms. I then side-stepped into marketing and found my passion in cybersecurity.\r\n\r\nI fuse my tech know-how with design skills to craft engaging blogs that spotlight cybersecurity for businesses. My main focus now is championing the marketing efforts of Admin By Request Zero Trust Platform, where my creative take on cybersecurity helps me create content that's enlightening, entertaining, and impactful.\r\n\r\nMy articles have graced the pages of InfoSec Magazine and top-tier security websites like OPSWAT. I'm on a mission to stress the significance of cybersecurity and to showcase how Admin By Request is shaking things up by making enterprise solutions simple, intuitive, accessible, and affordable to organizations of all sizes, in any industry.\r\n\r\nMy goal is to craft content that informs, intrigues, and motivates action, helping businesses understand the pivotal role of cybersecurity in the digital age we're now living in. Through my work, I aim to close the gap between technology and its real-world applications, keeping our audience well-informed, interested, and ready for the ever-evolving cybersecurity landscape.\r\n\r\nI bring a blend of extensive experience, deep expertise, recognized authority, and unwavering commitment to trustworthiness in cybersecurity. My goal? To make complex topics relatable and actionable for businesses of all sizes - just like Admin By Request strives to do."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/19599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=19599"}],"version-history":[{"count":2,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/19599\/revisions"}],"predecessor-version":[{"id":20428,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/19599\/revisions\/20428"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/19600"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=19599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=19599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=19599"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=19599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}