Skip to main content
All Case Studies
Healthcare

Full Ransomware Recovery for a Critical Access Hospital During a Blizzard

How NorthStar recovered 140 infected workstations, restored operations, and managed board reporting while the CEO and IT Director were both out with COVID during a winter storm.

The Client

A 100-bed critical access hospital in the upper Midwest. The ransomware attack struck during winter, infecting 140 employee workstations and disrupting all clinical and administrative systems simultaneously.

The Challenge

  • Ransomware encrypted 140 workstations across the entire hospital network
  • Attack occurred during a severe blizzard, preventing the recovery team from reaching the facility
  • Hospital CEO was out with COVID and unable to be on-site
  • IT Director was also out with COVID simultaneously
  • Clinical operations were disrupted with no functioning workstations for patient care or administration
  • Board of directors required immediate status updates and a recovery timeline

What NorthStar Did

  • Initiated remote incident response immediately, beginning containment and assessment before physical access was possible
  • Coordinated recovery operations remotely during the blizzard until the team could reach the facility
  • Systematically restored all 140 workstations to clean, operational state
  • Recovered all critical clinical and administrative systems to full functionality
  • Held daily briefings with the CEO throughout the multi-week recovery process
  • Prepared and delivered board reporting on the hospital's behalf, providing status updates, timeline projections, and remediation plans
  • Implemented post-recovery security controls to prevent recurrence

Results

140

Workstations Recovered

Zero

Data Loss

Daily

CEO Briefings

100%

Systems Restored

The Full Story

Ransomware does not wait for convenient timing. When this 100-bed critical access hospital was hit, the attack could not have come at a worse moment. A blizzard had shut down travel across the region. The CEO was quarantined with COVID. The IT Director was also out with COVID. And 140 workstations across the hospital were encrypted and non-functional.

Clinical staff could not access patient records, pharmacy systems, or lab results. Administrative functions were down. The hospital was operating blind.

NorthStar's incident response team activated immediately. With physical access to the facility impossible due to the storm, we began remote containment: isolating network segments, assessing the scope of the encryption, and identifying which systems and backups were intact. The first 24 hours focused on stopping the spread and understanding exactly what we were dealing with.

As soon as roads were passable, our team was on-site. The recovery was systematic: each of the 140 workstations needed to be wiped, reimaged, reconnected to the domain, and verified. Clinical systems were prioritized. Patient care systems came back first, followed by pharmacy, lab, and administrative functions.

While the technical recovery was underway, NorthStar took on a role that most IT providers would not: executive communication. With the CEO managing the crisis remotely while sick, we held daily briefings to provide status updates, explain what was happening in plain language, and set realistic expectations for recovery milestones. When the board of directors needed reporting, we prepared and delivered it on the hospital's behalf, including timeline projections, root cause analysis, and the remediation roadmap.

Every system was fully restored. No patient data was lost. The hospital returned to full operations. After recovery, we implemented the security controls that should have been in place before the attack: endpoint detection and response, network segmentation, tested backup procedures with offline copies, and a documented incident response plan so the next event, if it ever comes, will be contained before it spreads.

The CEO later told us this engagement changed how the hospital thinks about IT partnerships. They needed more than a vendor. They needed a team that would show up when everything was going wrong and handle not just the technology, but the communication, the governance, and the recovery plan.

About the author

Ken Satkunam, CISM

Ken Satkunam, CISM

President & Founder, NorthStar Technology Group

Ken has spent over 25 years in IT leadership, serving in roles from technical support to CIO for organizations as large as 23,000 employees. He founded NorthStar Technology Group in 2000 to help regulated organizations build secure, compliant, and operationally resilient technology environments. Ken holds the Certified Information Security Manager (CISM) credential from ISACA and is the co-author of the Amazon best-seller "Cyber Attack Prevention." He has been quoted in industry publications including eWeek and DM News, and NorthStar has been recognized on the Inc. 5000 list in both 2024 and 2025.

CISMInc. 5000MSP 500Published Author25+ Years

Facing a Similar Challenge?

Every engagement starts with understanding where you are and building a clear path forward.

View Healthcare Resources