Filter Results:
(19)
Show Results For
- All HBS Web (19)
- Faculty Publications (4)
Show Results For
- All HBS Web (19)
- Faculty Publications (4)
Page 1 of 19
Results
- February 2023
- Case
Ransomware Attack at Springhill Medical Center
By: Suraj Srinivasan and Li-Kuan (Jason) Ni
In July, 2019, Springhill Medical Center (“SMC”) in Mobile, Alabama, fell prey to a malicious ransomware attack that crippled the hospital’s internal network systems and public-facing web page. While the hospital rushed to securely restore the network, medical... View Details
Keywords: Disruption; Communication; Communication Strategy; Decision Making; Decision Choices and Conditions; Judgments; Corporate Accountability; Corporate Disclosure; Corporate Governance; Governance Controls; Policy; Employees; News; Cybersecurity; Digital Strategy; Information Infrastructure; Information Management; Internet and the Web; Crisis Management; Resource Allocation; Risk Management; Negotiation Tactics; Failure; Business and Stakeholder Relations; Attitudes; Behavior; Perception; Reputation; Trust; Public Opinion; Social Issues; Health Industry; United States; Alabama
Srinivasan, Suraj, and Li-Kuan (Jason) Ni. "Ransomware Attack at Springhill Medical Center." Harvard Business School Case 123-065, February 2023.
- March 2023 (Revised June 2023)
- Teaching Note
Ransomware Attack at Springhill Medical Center
By: Suraj Srinivasan and Li-Kuan (Jason) Ni
Teaching Note for HBS Case No. 123-065. In July, 2019, Springhill Medical Center (“SMC”) in Mobile, Alabama fell prey to a malicious ransomware attack that crippled the hospital’s internal network systems and public-facing web page. While the hospital rushed to... View Details
Keywords: Disruption; Communication; Communication Strategy; Decision Making; Decision Choices and Conditions; Judgments; Corporate Accountability; Corporate Disclosure; Corporate Governance; Governance Controls; Policy; Employees; News; Cybersecurity; Digital Strategy; Information Infrastructure; Information Management; Internet and the Web; Crisis Management; Business or Company Management; Resource Allocation; Risk Management; Negotiation Tactics; Failure; Business and Stakeholder Relations; Attitudes; Behavior; Perception; Reputation; Trust; Public Opinion; Social Issues; Health Industry; Alabama; United States
- March 2023
- Case
Ransomware Attack at Colonial Pipeline Company
By: Suraj Srinivasan and Li-Kuan Ni
On the morning of May 7, 2021, Colonial Pipeline Company became aware that the company had been the victim of a malicious ransomware attack that had stolen and locked up company data. The extortionists demanded 75 bitcoins (worth about $4.4 million at the time) in... View Details
Keywords: Disruption; Communication; Communication Strategy; Decision Making; Decision Choices and Conditions; Judgments; Corporate Accountability; Corporate Disclosure; Corporate Governance; Governance Controls; Policy; Employees; News; Cybersecurity; Digital Strategy; Information Infrastructure; Information Management; Internet and the Web; Crisis Management; Business or Company Management; Resource Allocation; Risk Management; Negotiation Tactics; Failure; Business and Stakeholder Relations; Attitudes; Behavior; Perception; Reputation; Trust; Public Opinion; Social Issues; Infrastructure; Distribution Industry; United States; Alabama
Srinivasan, Suraj, and Li-Kuan Ni. "Ransomware Attack at Colonial Pipeline Company." Harvard Business School Case 123-069, March 2023.
- March 2023
- Teaching Note
Ransomware Attack at Colonial Pipeline Company
By: Suraj Srinivasan and Li-Kuan Ni
Teaching Note for HBS Case No. 123-069. On the morning of May 7, 2021, Colonial Pipeline Company became aware that the company had been the victim of a malicious ransomware attack that had stolen and locked up company data. The extortionists demanded 75 bitcoins (worth... View Details
Keywords: Disruption; Communication; Communication Strategy; Decision Making; Decision Choices and Conditions; Judgments; Corporate Accountability; Corporate Disclosure; Corporate Governance; Governance Controls; Policy; Employees; News; Cybersecurity; Digital Strategy; Information Infrastructure; Information Management; Internet and the Web; Crisis Management; Business or Company Management; Resource Allocation; Risk Management; Negotiation Tactics; Failure; Business and Stakeholder Relations; Attitudes; Behavior; Perception; Reputation; Trust; Public Opinion; Social Issues; Infrastructure; Distribution Industry; United States; Alabama
- 24 Mar 2015
- News
See Your Company Through the Eyes of a Hacker
- 07 Sep 2012
- News
Global Innovation through Risk Resilience
- 08 Feb 2010
- HBS Case
Looking Behind Google’s Stand in China
shocking turn of events on January 12 when Google announced it would pull up stakes in China unless the country agreed to stop censoring search. The precipitating event: an unsuccessful cyber attack from... View Details
- 01 Jun 2003
- News
Up Against The Firewall
companies, he says, “It’s amazing how large a percentage of cyber attacks are completely preventable by maintaining good systems and simple practices such as password rotation and installing patches for... View Details
- 01 Jun 2022
- News
Vision: Into the Breach
Cyberattacks are surging: Accenture reports that cyber intrusions jumped by 125 percent, globally, in the first half of 2021 over the same period in 2020. And while all those data breaches and ransomware View Details
Keywords: Alexander Gelfand
- 13 Feb 2019
- News
We’re All Going to Get Hacked
evolving cyber threats. Rothrock lays out his solutions in his latest book, Digital Resilience: Is Your Company Ready for the Next Cyber Threat?, and we talk to him here about what that looks like in real... View Details
- Web
Best Practices | Information Technology
juggle the need to have unique complex passwords at every site. Why would someone attack me? It’s easy to think that you might be safe because an attacker has nothing to gain by coming after you... View Details
- 06 Jan 2011
- What Do You Think?
How Should Management Deal With “Anonymous”?
view," but to ask how, if at all, organizations can or should be defended against the response from Anonymous? Its actions, triggered by the attacks on Wikileaks, hinted at a future of everything from Internet mischief (a la... View Details
Keywords: by James L. Heskett
- Web
Letter from Dean Srikant Datar to the HBS Community on Ukraine | About
professor from the U.S. Naval War College, as well as a Q&A with the director of the Cyber Project at HKS about Russia’s cyberwarfare activities and with Kenneth Rogoff about the economic toll . HBS Professor Rawi Abdelal and his Davis... View Details
- 01 Jun 2016
- News
How Do We Win the Cyberwar?
refrigerators, powerful-and-cheap computing, and $20 hacking kits, there is an infinite number of attack points and shrinking barriers to entry for the bad guys. So how do we win? We talked to four HBS alumni whose cybersecurity... View Details
Keywords: Dan Morrell; illustrations by Victo Ngai
- 21 Dec 2022
- News
HBS Community Comes Together in Wake of Ukraine Invasion
Happens Next in Ukraine?” As attack unfolds, escalation, nuclear standoff among Harvard experts’ worst fears Harvard Gazette Wide range of possible targets for Russian cyber strikes, from infrastructure to... View Details
- 15 Jun 2020
- News
Alumni and Faculty Books for June 2020
misuse of social media, and cyber attacks are just a few of the threats to continuing prosperity that we see dominating the headlines every day. How can capitalism be sustained? And who should spearhead the... View Details
- 01 Jun 2018
- News
June 2018 Alumni and Faculty Books
Next Cyber Threat? by Ray Rothrock (MBA 1988) Amacom Rothrock lays bare tactics used by hackers, vulnerabilities lurking in networks, and strategies not just for surviving attacks but also for thriving even... View Details
- 01 Dec 2016
- News
Alumni Books of 2016
authors call for a greater sense of urgency from corporate boards, policymakers, and risk practitioners to resolve the many challenges facing today’s private and public sector organizations. They offer insights into specific risk domains that are shaping our world,... View Details