Alltech IT Solutions Blog

Ransomware Can Just Be Devastating

Ransomware Can Just Be Devastating

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 2013, over 170 government systems at the county, city, or state levels have been attacked.

Keep in mind that these numbers don’t come from the federal government or the Federal Bureau of Investigation, as they don’t track these attacks. As of May 10th, of this year, there have been 22 known attacks on the public sector, and there are likely even more than we don’t know about.

March 2019 Attacks

March saw a few ransomware attacks on municipalities, including the one on the sheriff’s office in Fisher County, Texas, which was infected and couldn’t connect to a state law enforcement database.

Albany, New York announced that it also has become victimized by a Saturday ransomware attack. This was a tactical choice by the hackers, as there was nobody around to actually fight back against the attack on a weekend. The city gave an understated account of the attack’s effect, but the real issues were considerable in nature--much worse than delayed marriage licenses and birth certificates.

Ransomware also hit the Albany Police Department’s systems, resulting in the entirely digitized systems being inaccessible. Officers were unable to access incident reports, crime reports, and schedules.

April 2019 Attacks

In April, Genesee County, Michigan’s tax department was completely shut down by ransomware for more of the month. The infection has been removed since.

May 2019 Attacks

The complete shutdown of Baltimore, Maryland was the highlight (if you can call it that) May attack. Caused by a ransomware called RobinHood, various issues kept the government from working as intended. Emails couldn’t be sent, payments couldn’t be processed, and real estate transactions had to be placed on hold. According to cybersecurity expert Avi Rubin, RobinHood utilized a notoriously powerful algorithm that even the National Security Agency couldn’t break. Furthermore, Baltimore was utilizing outdated hardware and software, which further exacerbated the problem.

Baltimore City Mayor Jack Young has gone on the record stating that the city will not be paying the ransom of 13 Bitcoins (approximately $100,000). The FBI and Secret Service have been called in to investigate, but the city is expecting a lengthy recovery time of at least a few months.

Rubin has provided some insight into why not paying the ransom was the right call, stating that if nobody ever paid these ransoms, then the attacks wouldn’t be as popular as they are in the first place. Unfortunately, companies often pay the ransom due to several factors, one of which is almost certainly the embarrassment factor that comes with falling victim to a threat like this. 45 percent of affected organizations pay the ransom to try to get their data back, while 17 percent of state and local governments pay up.

Alltech IT Solutions has some experience dealing with these attacks, and we agree with the decision made by organizations that refuse to pay the ransom. There’s no guarantee that you will save your data, even by paying the ransom, so why should you do so? After all, you’re only funding future ransomware attacks. It’s no different from investing in the hacking campaign.

We instead recommend implementing preventative measures to keep attacks like this at bay in the first place. To learn more, reach out to us at 954-628-3770.

Microsoft Pulling the Plug on Support for Key OS T...
Company Culture Goes a Long Way
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, August 24 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Multi-Factor Security WhatsApp Bring Your Own Device Analysis eCommerce Windows Server 2008 R2 Office 365 Freedom of Information Specifications Net Neutrality Proactive IT Emoji Company Culture Employee-Employer Relationship OneNote Threat Data Management Current Events SaaS Hiring/Firing Tip of the Week Entertainment Patch Management Knowledge Privacy Outsourced IT Hard Drive User Tip Smartphone Twitter Cybersecurity Employees HP Machine Learning Computer Care Malware Users Employer-Employee Relationship Data Protection Health Managing Stress Email Management Windows 10 Managed Service Mobile Devices Email Remote Monitoring and Management Internet Explorer IT Services Printing Voice over IP Live Streaming Communication Spyware SSD Online Shopping Managed Service Provider Recovery Hacker Wi-Fi Telecommute Copy Gadgets Excel IT budget Google Drive Paste Big Data BDR Yahoo Sports PowerPoint Scheduling WannaCry Software Personal Information Microsoft Office 365 Avoiding Downtime Hosted Solution WiFi Dark Data Edge Downloads Tactics Scam GDPR Communications Electronic Health Records Printers Vulnerability Safety Technology Word Virtualization Shortcut Television Licensing Mobile Device Information Sales Document Management Biometrics Autocorrect Network Security Human Resources Computers Conferencing Retail Gmail Taskbar Networking Data loss App Unified Communications Data Security Laptop Hackers Technology Tips Training DDoS Operating System Financial Automobile VoIp Chrome VPN Employer Employee Relationship Browser Processor User Security Business Intelligence Social Media Cost Management Tablet Digital Access Control Efficiency Batteries Congratulations Trends Router Emergency Display Windows XP RAM Gadget Wearables Ink Google Maps Printer Server Encryption Cables Comparison IT Management Upgrade Going Green IT Support Hardware Politics Information Technology BYOD Government Smart Technology Workplace Tips Save Money Websites Battery Artificial Intelligence Windows 10 IT Support Spam Blocking Android Medical IT Processors Customer Service File Sharing Travel Vendor Management Amazon Vulnerabilities Telecommuting Inventory Business Technology Regulation Access Cleaning Cortana Data Recovery Lead Generation Antivirus Paperless Office Backup Website Miscellaneous Staffing Credit Cards HaaS VoIP Apps Windows Managed IT Services Security Data Worker Alert Samsung Dongle Wireless Hosted Solutions Law Enforcement Content Filtering Network Attached Storage Files National Security Benchmarks Healthcare Remote Monitoring Mobile Security iPhone Managed IT Services Database Wireless Internet Passwords The Internet of Things instant Messaging Computer Gaming Console Voice over Internet Protocol Office Managed IT Small Business Hard Drives Solid State Drive Mobility Education Remote Support Ransomware Touchscreen Certification Security Cameras Dark Web Applications Thank You Millennials Payment Microsoft Teams Virus IaaS Spam Business Computing Profitability Connectivity G Suite Tech Term Analytics News Password Marketing Webcam Reporting Quick Tips Innovation Search Authorization Authentication Workers Server Printer Help Desk Instagram Troubleshooting Smartphones Wireless Charging Paper Collaboration Video Eliminating Downtime Mobile Device Management Tech Terms Compliance Tip of the week Phishing Holiday Streaming Media Blockchain Telephony Time Management Virtual Assistant Cloud Movies Leadership Settings Automation e-waste Physical Security Cabling Internet Backup and Disaster Recovery Server Management Microsoft Office Updates Synergy Apple Saving Money Outlook How To eWaste Recycling A.I. Update Facebook Maintenance Two-factor Authentication Disaster Recovery Business Continuity disposal Unified Threat Management Cloud Computing Tech Support Staff Best Practices Scalability Plug-In Microsoft Office Tips Managed IT Service HIPAA Hybrid Cloud Budget Risk Management Business Management Work/Life Balance Money CrashOverride Hacking User Tips Windows 7 Productivity Productivity Remote Control Botnet Internet of Things Chrome OS Data Backup Remote Computing Telephone System Environment Value Google Telephone Systems E-Commerce Spotify Network Business Video Games Bandwidth Data Breach Phone System Cybercrime Storage Hard Disk Drive Alerts Error Cryptocurrency