Queensland Health has blocked staff from accessing personal email accounts for fear of high-risk hacking. Four days ago, the Australian Cyber Security Center issued a warning that EMOTET malware targeted businesses and individuals by sending e-mail attachments or website links.
When you click or open it, the malware allows hackers to take over computers or access devices. A Queensland Health spokesman said the department's priority was "patient safety and privacy and our cybersecurity teams are unaware of any Queensland Health incidents".
"There are precautionary measures and the recommended protocols are followed and will remain until the threat is reduced," the spokesman said. "Queensland Health's government security teams continue to monitor our systems for any potential impacts related to this incident."
The ACSC issued a warning on Thursday recommending government agencies alert staff to virus software, maintaining firewalls and developing a "contingency plan".
Following is a ransomware attack on a group of regional hospitals this month that forced surgical delays and raised concerns about safety the patients.
Barwon Health hospital staff had to disconnect information systems from the virus quarantine, and doctors were unable to access patients' clinical records, forcing them to discontinue surgery.
AAP said the attack came from a phishing email sent to an employee, according to government.
Queensland Health's IT department, eHealth Queensland, emailed on Thursday that it warned staff that it would not be able to access personal and non-corporate email accounts such as HotmailThe gmail or the Yahoo, while the threat of hacking was high.
"EHealth Queensland has implemented a temporary block on all personal and non-corporate email accounts as a precautionary measure," said e-mail from eHealth Queensland CEO Damian Green.
“This will help protect Queensland Health's network and systems from malicious threats. This block will remain in place until the threat is reduced. "
The email stated that neither the department nor the hospital and health services had been affected by the malware and the department was "ready to respond should this situation change".
Reminded staff not to open suspicious emails or attachments, not to attempt to contact the sender with Email or by other means and report any suspicion of attempted "phishing".
How useful was this post?
Average rating 5 / 5. Vote count: 1