loader from loading.io

A Bitter Pill - How Ransomware is Crippling Hospitals

Shut The Backdoor

Release Date: 07/22/2025

A Bitter Pill - How Ransomware is Crippling Hospitals show art A Bitter Pill - How Ransomware is Crippling Hospitals

Shut The Backdoor

"Hospitals don’t just store data. They safeguard stories, care plans, and lives. When ransomware hits, it’s not just a system crash, it’s a trust collapse."  Notable Moments 00:01:10 – What ransomware is and how it's evolved 00:04:15 – How the Colonial Pipeline and Vegas attacks sparked Jeffrey’s interest 00:07:10 – Why healthcare is a prime target 00:10:00 – How Jeffrey built a ransomware database of 800+ healthcare entities 00:16:00 – Rise of ransomware-as-a-service (RaaS) and competition between threat actors 00:20:20 – Most targeted entities: hospitals, clinics,...

info_outline
The Healing Network - CISO Relationships in a Ransomware Era show art The Healing Network - CISO Relationships in a Ransomware Era

Shut The Backdoor

"Security isn’t proprietary. Sharing what works makes us all safer." Notable Moments 01:29 – Rise in ransomware and the case for collaboration 03:41 – Why reinvention puts you at risk 05:12 – The danger of building relationships mid-crisis 08:10 – Balancing information sharing and confidentiality 09:26 – How groups like HISAC facilitate secure collaboration 12:24 – Learning from incidents you haven’t experienced 18:06 – Building networks at all levels, not just CISOs 21:46 – Advice for making the first outreach 23:31 – Using your current network to grow your reach With...

info_outline
An AI Agenda - Robots, Rules, and Really Big Questions show art An AI Agenda - Robots, Rules, and Really Big Questions

Shut The Backdoor

“We have to make sure AI doesn’t just automate what we've always done. It should elevate what’s possible.” Notable Moments 00:40 – What’s pushing us to talk about AI now? 04:22 – A call for AI mission statements 08:18 – When tools lead before people: the risk of reactive adoption 11:05 – Defining AI boundaries: what it should never replace 15:33 – ChatGPT, Canva, Magic School: the tools already in use 18:42 – The importance of transparency and human oversight 22:55 – Reframing AI as “instructional support,” not just automation AI isn’t something on the horizon....

info_outline
The Lost and Found Files - Data Loss Prevention show art The Lost and Found Files - Data Loss Prevention

Shut The Backdoor

"DLP is not just a tool that we have. It's also the ongoing education that we have for our employees to further minimize the occurrences of data mismanagement." Having strong Data Loss Protection (DLP) systems stops bad actors while also protecting employees from making accidental mistakes too. Every day, we put trust in the secure flow of health data. However, no matter what safeguards are in place, human error is one of the most common causes of data loss in companies. Security engineer, Zak Cowan, joins to share why data loss protection, or data leak protection, is paramount for a company...

info_outline
A Phishing Trip - The Constant Evolution of Social Engineering Attacks show art A Phishing Trip - The Constant Evolution of Social Engineering Attacks

Shut The Backdoor

"That's when it starts getting really scary. This is no longer just an email trying to get some gift cards. This stuff can lead to the bigger attacks that then can directly impact patient care." Notable Moments 01:02 Phishing: Persistent Cybersecurity Threat 03:27 Cybersecurity’s Evolving Threats 09:15 Phishing Scams: Calls and Video 10:23 Rise of Deepfake Scams and Counterfeit Reality Attacks 15:43 Vulnerability in Healthcare as Cybersecurity Threats Escalate 21:49 MFA and Password Management Trends 24:39 Stopping Phishing with Email Security 28:24 Advanced Phishing Training Strategies...

info_outline
A Hacker's Welcome - Benefiting From the Bug Bounty show art A Hacker's Welcome - Benefiting From the Bug Bounty

Shut The Backdoor

"Putting this effort into the bug bounty helps us identify any sort of gaps that we might be missing, plug holes as fast as we can, and reward the researchers for all the efforts that they spend with us." Being asked to embrace hackers may sound counterintuitive. However, in today's fast-paced world of healthcare security it's a strategy worth exploring. Brent Ufkes is a staff security engineer at Redox, joins for a conversation about bug bounty programs. He shares how these programs can become a game-changer for organizations like ours.  This episode explores: Understanding Bug Bounty...

info_outline
The Final Logoff - Streamlining Secure Departures show art The Final Logoff - Streamlining Secure Departures

Shut The Backdoor

"Everyone who's part of a health care organization or health care tech has access to really private information. And getting that access removed from somebody who's leaving the organization is key." Key Moments 02:23 Streamlining Through Automation 05:55 Streamlining Tool Access and Security 08:54 Centralize Identity with Single Sign-On 11:41 Automated Offboarding: Quick and Secure 13:25 Automating Environment-Specific Challenges 17:10  Streamline Access to Protect Data 19:51 Streamlined Process vs. Disorganization Streamlining secure departures is not just an operational necessity;...

info_outline
A Trojan Horse - Hiring Malicious Actors show art A Trojan Horse - Hiring Malicious Actors

Shut The Backdoor

"Everybody in the hiring pipeline should really be looking out for this. Every person that touches a candidate has a chance to pick this up before someone gets hired." Key Moments 00:42 Insider Threats for Financial Gain 06:10 High-Profile Cybersecurity Incident Reporting 09:16 Healthcare Data Extortion Risks 10:40 Spotting Red Flags in Hiring 14:14 Security and HR Collaboration in Hiring 17:23 Identifying Security Red Flags 19:51 Verifying Candidate Authenticity Steps 23:34 On-Camera Hiring Best Practices There is a new security concern that is catching many off guard: hiring malicious...

info_outline
Introduction to Shut The Backdoor show art Introduction to Shut The Backdoor

Shut The Backdoor

Welcome to the debut episode of Shut the Back Door, a healthcare security podcast by Redox, hosted by Jody Mayberry alongside Redox’s own Matt Mock, CISO, and Meghan McLeod, Security Engineer. This podcast is dedicated to protecting healthcare data one episode at a time. In this introduction, Meghan and Matt explain Redox's mission as a leader in healthcare interoperability, enabling providers, payers, and health tech organizations to power better care through accelerated, real-time data solutions.  The podcast aims to bring Redox’s behind-the-scenes data security expertise to the...

info_outline
 
More Episodes

"Hospitals don’t just store data. They safeguard stories, care plans, and lives. When ransomware hits, it’s not just a system crash, it’s a trust collapse." 

Notable Moments

  • 00:01:10 – What ransomware is and how it's evolved
  • 00:04:15 – How the Colonial Pipeline and Vegas attacks sparked Jeffrey’s interest
  • 00:07:10 – Why healthcare is a prime target
  • 00:10:00 – How Jeffrey built a ransomware database of 800+ healthcare entities
  • 00:16:00 – Rise of ransomware-as-a-service (RaaS) and competition between threat actors
  • 00:20:20 – Most targeted entities: hospitals, clinics, specialized care
  • 00:24:20 – Real-life consequences: delays in patient care, increased mortality risk
  • 00:28:00 – The looming threat of AI-trained malicious models

In this episode, Jody, Meghan, and Matt are joined by security researcher Jeffrey Bell to discuss the ways ransomware is increasingly crippling hospitals. They explore how healthcare has become one of the most targeted industries, why ransomware is shifting from encryption to data exfiltration, and how threat actors now operate like businesses complete with affiliate models, revenue sharing, and even training. Jeffrey shares how he built a comprehensive subcategorized database of healthcare-related ransomware attacks and offers insight into why specialized care and hospitals are becoming prime targets. The group discusses real-world consequences, from system shutdowns to patient deaths, and emphasizes the need for proactive community defense and cross-sector collaboration.

Resources

 www.redoxengine.com

Past Podcast Episodes 

https://redoxengine.com/solutions/platform-security

Have feedback or a topic suggestion? Submit it using this linked form.

Matt Mock  [email protected] 

Meghan McLeod [email protected]