this post was submitted on 14 Nov 2023
235 points (98.0% liked)
Technology
59282 readers
4375 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Not that the audit logs would help anyone except listing "these files were copied by [user account used by hacker] on [date the office was hacked]".
The real issue is that most medical offices still rely on Windows, Active Directory, and Exchange, and most of them are far, far away from up-to-date, patched versions (which actually don't prevent hacks, but make them a bit more difficult).
I was more referencing the application that they, hopefully, use to store their documents. I really hope they are not just stored in a directory, but I guess who knows... some of the applications I have used reference everything in audit logs from when it was uploaded, to who and when it is viewed, any changes, and more. Without the application the data is encrypted at rest so the files are useless without using the application to open them. We have others that are stored within an encrypted database or use blob storage thats encrypted. Anything, but never plain old windows for storage!