<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2975524&amp;fmt=gif">

Visibility Solutions

Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.


Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.


The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners


Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.


Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.


Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!

What Happens When a Healthcare Computer Network Goes Down?

I hear it in the news every couple days or so, another major organization was hacked and one of two things likely happened; their network went down, or customer information was stolen. At this point we’ve all become so used to hearing about hacks, we think, no big deal, right?  Well what if the organization hacked was your local healthcare provider; hospitals, doctors’ offices, and insurance companies. Now what?

Hacking the Healthcare Industry

The healthcare industry is particularly vulnerable to hacking because of the sensitive information that it stores. According to the 2018 Impact of Cyber Insecurity on Health Organizations survey, 62% of healthcare executives polled said they experienced a cyber attack in the past year.  This is due to the fact that patient data, while being highly confidential, is also even more critical for these organizations to access in order to deliver life saving medical treatments.

The majority of hacks targeting the healthcare industry fall into the Ransomware category. It begins with the attacker compromising an individual computer, likely through a phishing attack. Once the attacker has access to your computer, they can launch the ransomware onto the network, encrypting and locking down files. Then a ransom is presented to the victims to pay in order to obtain the decryption key.


>> Download Now: IT Security Whitepaper


Hackers choose ransomware attacks to use on hospitals and other healthcare networks because these organizations need to restore their computer systems quickly to help their patients, making them more likely to pay the ransom than organizations in other industries.


What does this mean for a hospital?

When a hospital’s computer network is attacked by ransomware and essentially shut down, daily activities at a hospital grind to a halt. Email goes down, so different departments or campuses can’t communicate about patient tests and records; phone systems are affected so doctors can’t call up the ER to check on activity or see if there is a bed available in a different unit; patient medical records can’t be accessed via the EMR system; the list goes on and on.

While non-essential activities can be rescheduled for a different day, or shifted to a non-affected hospital, emergency surgeries will still proceed and patients already admitted need to be cared for, so it’s back to pen and paper during the system failures. And it can take upwards of 6 weeks for a hospital’s network to be back at normal operating conditions.


Securing the Network

As a result of these continued cyber attacks, hospitals and healthcare systems are starting to take action. Globally, healthcare spending on cyber security will exceed $65 billion cumulatively from 2017 to 2021.  This spending will touch all areas of the network from simple computer updates to installing additional security and monitoring tools like Next-Gen Firewalls and Intrusion Detection Systems to hiring larger IT staffs to manage these new systems and applications.

Here at Garland Technology, we believe that network security must start with a foundation of visibility. If you don’t know what’s going on in your network, you can’t protect against it. That’s why we ensure complete network visibility with our development of the industry’s most reliable network test access point solutions.

Looking to add inline or out-of-band security monitoring solutions, but not sure where to start? Join us for a brief network Design-IT consultation or demo. No obligation - it’s what we love to do.

IT security garland Technology tool deployment

Written by Chris Bihary

Chris Bihary, CEO and Co-founder of Garland Technology, has been in the network performance industry for over 20 years. Bihary has established collaborative partnerships with technology companies to complement product performance and security through the integration of network TAP visibility.



Sign Up for Blog Updates