Alltech IT Solutions Blog

Ransomware Can Just Be Devastating

Ransomware Can Just Be Devastating

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 2013, over 170 government systems at the county, city, or state levels have been attacked.

Keep in mind that these numbers don’t come from the federal government or the Federal Bureau of Investigation, as they don’t track these attacks. As of May 10th, of this year, there have been 22 known attacks on the public sector, and there are likely even more than we don’t know about.

March 2019 Attacks

March saw a few ransomware attacks on municipalities, including the one on the sheriff’s office in Fisher County, Texas, which was infected and couldn’t connect to a state law enforcement database.

Albany, New York announced that it also has become victimized by a Saturday ransomware attack. This was a tactical choice by the hackers, as there was nobody around to actually fight back against the attack on a weekend. The city gave an understated account of the attack’s effect, but the real issues were considerable in nature--much worse than delayed marriage licenses and birth certificates.

Ransomware also hit the Albany Police Department’s systems, resulting in the entirely digitized systems being inaccessible. Officers were unable to access incident reports, crime reports, and schedules.

April 2019 Attacks

In April, Genesee County, Michigan’s tax department was completely shut down by ransomware for more of the month. The infection has been removed since.

May 2019 Attacks

The complete shutdown of Baltimore, Maryland was the highlight (if you can call it that) May attack. Caused by a ransomware called RobinHood, various issues kept the government from working as intended. Emails couldn’t be sent, payments couldn’t be processed, and real estate transactions had to be placed on hold. According to cybersecurity expert Avi Rubin, RobinHood utilized a notoriously powerful algorithm that even the National Security Agency couldn’t break. Furthermore, Baltimore was utilizing outdated hardware and software, which further exacerbated the problem.

Baltimore City Mayor Jack Young has gone on the record stating that the city will not be paying the ransom of 13 Bitcoins (approximately $100,000). The FBI and Secret Service have been called in to investigate, but the city is expecting a lengthy recovery time of at least a few months.

Rubin has provided some insight into why not paying the ransom was the right call, stating that if nobody ever paid these ransoms, then the attacks wouldn’t be as popular as they are in the first place. Unfortunately, companies often pay the ransom due to several factors, one of which is almost certainly the embarrassment factor that comes with falling victim to a threat like this. 45 percent of affected organizations pay the ransom to try to get their data back, while 17 percent of state and local governments pay up.

Alltech IT Solutions has some experience dealing with these attacks, and we agree with the decision made by organizations that refuse to pay the ransom. There’s no guarantee that you will save your data, even by paying the ransom, so why should you do so? After all, you’re only funding future ransomware attacks. It’s no different from investing in the hacking campaign.

We instead recommend implementing preventative measures to keep attacks like this at bay in the first place. To learn more, reach out to us at 954-628-3770.

Microsoft Pulling the Plug on Support for Key OS T...
Company Culture Goes a Long Way
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, June 25 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Upgrade Net Neutrality Remote Monitoring and Management Printer Computer Care User Tips Data Backup Staffing Chrome OS WannaCry Gadget Data loss VoIp Remote Monitoring GDPR Office Tips Remote Support Communications Outlook Movies Solid State Drive Hacking Hard Disk Drive App Information Technology Specifications IT Support Smartphone Managed Service Office 365 Leadership Telephone System Security Cameras Congratulations Licensing Authentication Data Management Productivity Technology Laptop Server Management Big Data Error Unified Threat Management Managed Service Provider Search Employees instant Messaging Database Regulation Education Network Alert Cables Business Technology IaaS Knowledge Sports Paste Payment Environment Conferencing Telephony IT Support Tip of the week Reporting Managed IT Analysis Staff Business Continuity Health Files IT Management Processors Hosted Solution Automobile Document Management Voice over Internet Protocol Inventory Telecommute Lead Generation How To DDoS Botnet Scam BDR Workers Live Streaming Internet Software Best Practices Network Attached Storage Threat Email Management Microsoft Mobility Spam Blocking Company Culture Cloud Computing Automation User Tip Spam Help Desk Printer Server eCommerce File Sharing RAM Marketing Hiring/Firing WiFi Websites Medical IT Proactive IT Vulnerability Vulnerabilities Virtual Assistant Small Business Network Security Miscellaneous Information SaaS Millennials Tech Term Employer Employee Relationship Paper Sales Chrome Access Hosted Solutions VPN Telecommuting eWaste Tech Support E-Commerce Ransomware Website Windows Encryption Compliance Remote Computing VoIP Machine Learning Spyware Antivirus Analytics Spotify Save Money A.I. Data Protection Instagram Paperless Office Retail Employee-Employer Relationship Wireless Internet Cortana Blockchain Settings Microsoft Teams OneNote The Internet of Things Healthcare Users Cleaning Managed IT Service Scheduling Digital SSD Downloads Hard Drives Android Edge Communication Law Enforcement CrashOverride Google Drive Computer Maintenance Taskbar Backup and Disaster Recovery Work/Life Balance Quick Tips Browser Windows 10 Windows XP Bring Your Own Device Employer-Employee Relationship Telephone Systems Tactics Malware Operating System PowerPoint IT budget Content Filtering Workplace Tips Innovation Microsoft Office Scalability Hardware Data Security Current Events Ink Autocorrect Biometrics Data Recovery Mobile Device Cost Management Google Maps Electronic Health Records Television Networking Time Management Productivity Holiday Password Internet of Things Server Gmail Storage Managing Stress Thank You HaaS Cybersecurity Excel disposal Twitter Human Resources Authorization User Security Gadgets National Security Apple Travel Privacy Router Freedom of Information Amazon Phone System Online Shopping Data Breach IT Services Virtualization Data Video Games Recovery Two-factor Authentication Government Apps Business Computing Bandwidth Windows 10 Updates Physical Security Entertainment Training Plug-In Phishing Virus Personal Information Multi-Factor Security Video Connectivity Worker Dark Data Internet Explorer Shortcut Gaming Console Access Control Customer Service BYOD Efficiency Avoiding Downtime Comparison Trends Politics Wireless Voice over IP Email Business Intelligence Hackers Dongle Cloud Printers Troubleshooting Wi-Fi Emoji Battery Managed IT Services Dark Web Remote Control Cabling Patch Management Smart Technology Cybercrime Tablet Artificial Intelligence Tip of the Week Cryptocurrency Vendor Management Emergency Hacker Update Saving Money Mobile Devices Backup News Printing Passwords Computers Unified Communications Webcam Mobile Security Budget Streaming Media Yahoo HIPAA Safety Smartphones Collaboration Applications Windows Server 2008 R2 WhatsApp Word Office Hard Drive Wearables Windows 7 Value Certification Hybrid Cloud Profitability Eliminating Downtime Money Facebook Outsourced IT Managed IT Services Business Management Business iPhone G Suite Touchscreen Google e-waste Mobile Device Management Disaster Recovery Social Media Wireless Charging Credit Cards Alerts Synergy Technology Tips Copy Microsoft Office 365 HP Security Tech Terms Samsung