An organization can easily have 300,000,000,000 pieces of data.

The story that follows is about one file.

It could be about any of them.

The Operat1on

A Data Lifecycle Story



It was created in a lab.

The health record of cardiac patient D. Johnson came into existence at 9:42am. Mr. Johnson is being wheeled into surgery. Needless to say, this data is rather sensitive.

See Infolock Protocol: Discovery

Within minutes, the file has rapidly proliferated.


Danger Zone

It’s now in hundreds of remote locations.

Moments later and 2,000 miles away, DJOHNSONHLTH_P904824/ is accessed by a new user.

An insurance expo is underway at the Sunnydale Motel. An attendee nicknamed “Stan–O” is logged in doing claim work between meetings. Sunnydale is nice and secure. Its network? Not so much.

See Infolock Protocol: Classification


Bad Guys

Like taking candy from an unsecured IP.

Before he’s even finished breakfast, Stan-O becomes the object of international attention.

She has IP addresses in Brazil, Turkey, the US and Hungary.

Online, she’s known only as “The Romanian.”

And she just let herself into the insurance co’s servers through Stan–O’s laptop.



The romanian has ransom on her mind.

Once inside the insurance co’s walls, she has access to all shared data — including DJOHNSONHLTH_P904824/.

And so she plants a present inside our file: ransomware.

9:55am: Now she waits for a hospital employee to trip the wire.

At 9:59am, DJOHNSONHLTH_P904824/ is opened, instantly triggering a systemwide encryption of the hospital’s database farm, crashing their EMR and cutting off patient care. They have no backup and no options. Until an anonymous offer to help arrives.

See Infolock Protocol: Protection

 $2  million  in  Bitcoin,  and  you nice  boys can have your key now.


Good Times

And it’s au revoir to the CISO.

The CISO’s walking papers were drawn up even before they wired the $2 million. Mr. Johnson was never told why his surgery was suddenly delayed. And as they exited the hospital late that night, one executive was overheard asking, “Is this disaster over yet?”

See Infolock Protocol: Incident response


Gone Girl

Until the government comes calling.

Days later, hospital administrators quietly reported the incident to the Office of Civil Rights. Who is liable? Where is your Security Plan? How will you stop the next attack?

Whether or not their answers satisfied the regulators remains unknown.

As for DJOHNSONHLTH_P904824/, it continues to live on out there.

Now only one last piece remains to this story.

Those other 300 billion files.

See Infolock Protocol: Security Planning

Find out how we can help your organization or take another spin through our data lifecycle tale.


Every engagement begins with basic questions: What data do you have? Is it sensitive? Who has access? How is it used? To protect your data, first we need to find your data. All of it.

Learn about Information Security Assessments
Filename: DJOHNSONHLTH_P904824/
Begin Scroll