Alltech IT Solutions Blog

Ransomware Can Just Be Devastating

Ransomware Can Just Be Devastating

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 2013, over 170 government systems at the county, city, or state levels have been attacked.

Keep in mind that these numbers don’t come from the federal government or the Federal Bureau of Investigation, as they don’t track these attacks. As of May 10th, of this year, there have been 22 known attacks on the public sector, and there are likely even more than we don’t know about.

March 2019 Attacks

March saw a few ransomware attacks on municipalities, including the one on the sheriff’s office in Fisher County, Texas, which was infected and couldn’t connect to a state law enforcement database.

Albany, New York announced that it also has become victimized by a Saturday ransomware attack. This was a tactical choice by the hackers, as there was nobody around to actually fight back against the attack on a weekend. The city gave an understated account of the attack’s effect, but the real issues were considerable in nature--much worse than delayed marriage licenses and birth certificates.

Ransomware also hit the Albany Police Department’s systems, resulting in the entirely digitized systems being inaccessible. Officers were unable to access incident reports, crime reports, and schedules.

April 2019 Attacks

In April, Genesee County, Michigan’s tax department was completely shut down by ransomware for more of the month. The infection has been removed since.

May 2019 Attacks

The complete shutdown of Baltimore, Maryland was the highlight (if you can call it that) May attack. Caused by a ransomware called RobinHood, various issues kept the government from working as intended. Emails couldn’t be sent, payments couldn’t be processed, and real estate transactions had to be placed on hold. According to cybersecurity expert Avi Rubin, RobinHood utilized a notoriously powerful algorithm that even the National Security Agency couldn’t break. Furthermore, Baltimore was utilizing outdated hardware and software, which further exacerbated the problem.

Baltimore City Mayor Jack Young has gone on the record stating that the city will not be paying the ransom of 13 Bitcoins (approximately $100,000). The FBI and Secret Service have been called in to investigate, but the city is expecting a lengthy recovery time of at least a few months.

Rubin has provided some insight into why not paying the ransom was the right call, stating that if nobody ever paid these ransoms, then the attacks wouldn’t be as popular as they are in the first place. Unfortunately, companies often pay the ransom due to several factors, one of which is almost certainly the embarrassment factor that comes with falling victim to a threat like this. 45 percent of affected organizations pay the ransom to try to get their data back, while 17 percent of state and local governments pay up.

Alltech IT Solutions has some experience dealing with these attacks, and we agree with the decision made by organizations that refuse to pay the ransom. There’s no guarantee that you will save your data, even by paying the ransom, so why should you do so? After all, you’re only funding future ransomware attacks. It’s no different from investing in the hacking campaign.

We instead recommend implementing preventative measures to keep attacks like this at bay in the first place. To learn more, reach out to us at 954-628-3770.

Microsoft Pulling the Plug on Support for Key OS T...
Company Culture Goes a Long Way
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 21 2020

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Holiday SaaS Software Information Technology Cabling Productivity Voice over Internet Protocol Computer Care Gadget Ransomware Managed Services Provider Data Backup Customer Service Server Management Streaming Media Spyware Gmail DDoS Content Filtering Encryption HaaS File Sharing GDPR Battery Yahoo Training Financial Emergency Excel Health Safety Computer Managed IT Router Cryptocurrency Remote Support Data Malware Staff Employer Employee Relationship Authorization Business Technology Managed IT Services Samsung Multi-Factor Security Entertainment CrashOverride Taskbar Telecommuting Emoji Benchmarks Collaboration Wi-Fi Solid State Drive Time Management Movies BYOD Scam Mobile Office Current Events App Net Neutrality Cortana Dark Web Environment Virus Paste Miscellaneous Windows 10 Save Money Maintenance Efficiency Managed IT Service User Tips disposal Office Facebook Remote Monitoring and Management SSD Data Management Eliminating Downtime Telecommute Microsoft Office 365 IT Management Regulation Windows Server 2008 R2 Risk Management Microsoft Teams Video Games Antivirus Tech Support Sports Botnet Recycling Inventory Twitter eCommerce Virtualization Hardware Telephone Systems IT Services RAM Communications Settings Quick Tips Access Control Scalability Display Data loss Browser eWaste Automobile Google Data Protection Small Business Bring Your Own Device Staffing Troubleshooting Email Work/Life Balance iPhone Mobile Security Files Shortcut HIPAA Synergy Business Blockchain Politics Saving Money Government Ink Digital Cybercrime Medical IT Windows 7 Instagram Plug-In Technology Millennials Wearables Insurance Remote Monitoring Business Management IT Support Internet of Things Error Backup and Disaster Recovery Technology Tips Smartphone Upgrade Cleaning Profitability Apple News Proactive IT Hybrid Cloud Windows XP Processors Holidays Hosted Solutions Managed Service Provider Amazon WannaCry Vulnerabilities Word Website Internet Laptop instant Messaging Licensing Network Security Unified Threat Management VPN Hosted Desktop Security Hackers Security Cameras VoIp Worker Cost Management Reporting Smartphones Wireless Tip of the week Hosted Solution Innovation Applications Connectivity Microsoft Office Password Cloud Apps IT Hacking Virtual Assistant Hacker Remote Control Internet Explorer WhatsApp Best Practices Backup Printing Project Management Cybersecurity Fleet Management Mobile Device Business Computing Privacy Memes Microsoft Webcam Autocorrect e-waste Online Shopping Bitcoin Productivity Conferencing HP Analysis Google Maps Telephony National Security Customer Relationship Management Windows Payment Retail Search Live Streaming Hard Drives Users Avoiding Downtime Chrome Information Money Tech Terms User Security OneNote Paper Office 365 Mobile Devices Office Tips Remote Computing Server Distribution Communication Wireless Charging Artificial Intelligence Television Congratulations Network Attached Storage Network Workers Data Recovery Machine Learning Business Intelligence Managing Stress Hiring/Firing Printer Server Telephone System Tech Term Mobile Device Management G Suite Database Knowledge Humor Gaming Console Smart Technology Co-Managed IT VoIP Paperless Office Bandwidth Alerts Healthcare Tip of the Week Copy Business Continuity Thank You Unified Communications Printers Scheduling Tactics IT Support Patch Management Social Network Vulnerability Travel Dark Data Gadgets Managed IT Services Compliance Employer-Employee Relationship The Internet of Things A.I. Networking Multi-Factor Authentication Updates Alert Computers Batteries Analytics Credit Cards Budget Threats Law Enforcement Android Hard Drive Scams Outsourced IT Leadership Marketing Processor Chrome OS Wireless Internet Outlook User Tip Operating System Social Media Storage Comparison Freedom of Information Spam Biometrics Trends Phone System Voice over IP Personal Information Recovery Vendor Big Data Going Green Help Desk Spam Blocking Access Managed Service BDR Data Breach Value IaaS Document Management Update Physical Security Spotify Video Human Resources PowerPoint Education Windows 10 Dongle Authentication Mobility Websites Touchscreen Workplace Tips Employee-Employer Relationship File Management Two-factor Authentication IT budget E-Commerce Google Drive Payment Cards Downloads Automation Virtual Private Network Passwords Email Management Vendor Management Certification Tablet How To Lead Generation Printer Employees Data Security Company Culture Electronic Health Records Edge Cables Cloud Computing Threat Phishing WiFi Sales Specifications Disaster Recovery Hard Disk Drive