Call PCSS @: 720-990-7556 

PCSS provides services that help mitigate the potential to be faced with the dreaded ransomware hijacking notice.  While the primary focus of the ransomware pirates has been healthcare, all organizations are subject to a ransomware attack. If you are unfamiliar with this attack, ransomware  shuts down the ability of an organization to function and forces them to pay a ransom to the hacker controlling the organization's computers.  Paying the ransom is bad enough, but in the case of healthcare they are also subject to a $1.5 million or more HIPAA fine from the Office of Civil Rights (OCR) for not having medical information readily available.  

So what can organizations do to stop hackers from installing ransomware?  Here is a helpful checklist:

Contact PCSS today to learn more about our Ransomware services 720-990-7556.

Contact PCSS today for a free consultation on how to implement your security program.  We will partner with you to find the right solution that meets your needs and budget.  Contact a real person who can help you today by direct phone line: 720-990-7556.  Or email us at:

Use these links to learn more about recent ransomware attacks:

Wannacry --

  1. Assign an IT Security knowledgeable person who is responsible for IT Security and who can implement prudent IT security measures.
  2. Ensure internal IT Support and Contractors have policies and procedures in place for maintaining security of systems.
  3. Ensure that a technical assessment of the organization's systems from the Internet and wireless access points has has been completed, and that vulnerabilities are being patched.
  4. Ensure that incident response procedures are updated and available in hard copy both at the office and home.  Do not rely solely on a soft copy.  Your computer may not be available.
  5. Ensure sensitive data is routinely backed up, and that system backups that are isolated from your network.  If your backups have ransomware they won't be a help in a disaster recovery situation.
  6. Ensure that staff are trained on IT Security relevant to their job role.
  7. ​Have an independent audit performed to document your compliance and preparedness.
  8. ​Develop a prioritized corrective action plan from the audit findings.
  9. ​Plan and budget for annual assessments and program updates.



Information Technology and Infomation Security Consultants

#div2{ background-image:url(; height:180px; width:300px; border: 1px solid red; }