{"id":90971,"date":"2020-04-28T09:00:49","date_gmt":"2020-04-28T16:00:49","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90971"},"modified":"2023-08-10T14:15:35","modified_gmt":"2023-08-10T21:15:35","slug":"ransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/28\/ransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk\/","title":{"rendered":"Ransomware groups continue to target healthcare, critical services; here\u2019s how to reduce risk"},"content":{"rendered":"
At a time when remote work is becoming universal and the strain on SecOps, especially in healthcare and critical industries, has never been higher, ransomware actors are unrelenting, continuing their normal operations. Multiple ransomware groups that have been accumulating access and maintaining persistence on target networks for several months activated dozens of ransomware deployments in the first two weeks of April 2020.<\/p>\n