Blog
home
  • Register

Data Net Blog

By accepting you will be accessing a service provided by a third-party external to https://www.4datanet.com/

Ransomware Can Just Be Devastating

Ransomware Can Just Be Devastating

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 2013, over 170 government systems at the county, city, or state levels have been attacked.

Keep in mind that these numbers don’t come from the federal government or the Federal Bureau of Investigation, as they don’t track these attacks. As of May 10th, of this year, there have been 22 known attacks on the public sector, and there are likely even more than we don’t know about.

March 2019 Attacks

March saw a few ransomware attacks on municipalities, including the one on the sheriff’s office in Fisher County, Texas, which was infected and couldn’t connect to a state law enforcement database.

Albany, New York announced that it also has become victimized by a Saturday ransomware attack. This was a tactical choice by the hackers, as there was nobody around to actually fight back against the attack on a weekend. The city gave an understated account of the attack’s effect, but the real issues were considerable in nature--much worse than delayed marriage licenses and birth certificates.

Ransomware also hit the Albany Police Department’s systems, resulting in the entirely digitized systems being inaccessible. Officers were unable to access incident reports, crime reports, and schedules.

April 2019 Attacks

In April, Genesee County, Michigan’s tax department was completely shut down by ransomware for more of the month. The infection has been removed since.

May 2019 Attacks

The complete shutdown of Baltimore, Maryland was the highlight (if you can call it that) May attack. Caused by a ransomware called RobinHood, various issues kept the government from working as intended. Emails couldn’t be sent, payments couldn’t be processed, and real estate transactions had to be placed on hold. According to cybersecurity expert Avi Rubin, RobinHood utilized a notoriously powerful algorithm that even the National Security Agency couldn’t break. Furthermore, Baltimore was utilizing outdated hardware and software, which further exacerbated the problem.

Baltimore City Mayor Jack Young has gone on the record stating that the city will not be paying the ransom of 13 Bitcoins (approximately $100,000). The FBI and Secret Service have been called in to investigate, but the city is expecting a lengthy recovery time of at least a few months.

Rubin has provided some insight into why not paying the ransom was the right call, stating that if nobody ever paid these ransoms, then the attacks wouldn’t be as popular as they are in the first place. Unfortunately, companies often pay the ransom due to several factors, one of which is almost certainly the embarrassment factor that comes with falling victim to a threat like this. 45 percent of affected organizations pay the ransom to try to get their data back, while 17 percent of state and local governments pay up.

Data Net has some experience dealing with these attacks, and we agree with the decision made by organizations that refuse to pay the ransom. There’s no guarantee that you will save your data, even by paying the ransom, so why should you do so? After all, you’re only funding future ransomware attacks. It’s no different from investing in the hacking campaign.

We instead recommend implementing preventative measures to keep attacks like this at bay in the first place. To learn more, reach out to us at (760) 466-1200.

Microsoft Pulling the Plug on Support for Key OS T...
Company Culture Goes a Long Way
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, May 28, 2020

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Data Efficiency Privacy Malware Hackers IT Support Innovation Smartphones Communication Small Business User Tips Google Hardware Email VoIp Microsoft Software Computer Communications Workplace Tips Managed IT Services Cloud Tech Term Users Business Management Internet Mobile Device Cybersecurity Android Collaboration Mobile Devices Business Outsourced IT Windows 10 Ransomware Hosted Solutions Backup Miscellaneous Cloud Computing Passwords IT Services Social Media Upgrade Apps Data Backup Network Information Wi-Fi Data recovery Saving Money Phishing Browser Managed Service Applications Networking Microsoft Office Bandwidth Gadgets Holiday Smartphone Internet of Things Windows Facebook Employer-Employee Relationship Access Control Gmail Chrome Marketing Wireless VPN BDR Managed IT services Blockchain Patch Management Automation Compliance Going Green Apple Save Money Laptop Mobile Office Word Router Value Quick Tips Managed IT Service Business Intelligence Health Social Network Data Protection Excel Voice over Internet Protocol Settings Telephony Artificial Intelligence Scam Data Breach Healthcare Net Neutrality Processor Password G Suite Business Technology Data Security iPhone Mobility Paperless Office Bring Your Own Device Cortana RAM Education Remote Monitoring and Management Remote Monitoring Batteries Conferencing Employee-Employer Relationship Government Remote Computing Wireless Charging Windows 7 Virus Data Management Medical IT How To Office Virtual Assistant Retail Telephone System Virtualization Business Continuity Tech Terms Connectivity Cost Management Physical Security Company Culture Disaster Recovery Office 365 Computers Payment Cards Virtual Reality Movies Database Touchscreen Alert Vulnerability Big Data Technology Tips Cleaning Wearables Server Chrome OS File Management Edge Eliminating Downtime Updates Tablet Shadow IT Network Attached Storage Environment GDPR instant Messaging Threats WannaCry HP Spam Managing Stress OneNote User Security Memes IT budget Ink Twitter Remote Cybercrime Microsoft Office 365 Employees Distribution Workers Virtual Private Network Maintenance Plug-In Comparison e-waste Storage Current Events Tip of the week Dongle BYOD Certification Computer Repair Streaming Media Vulnerabilities Scams HIPAA Document Management Antivirus Troubleshooting Congratulations Windows Server 2008 R2 Voice over IP IT PowerPoint Inventory Remote Workers Machine Learning Unified Communications Tactics Authentication Travel Solid State Drive Fleet Management File Sharing Millennials Customer Relationship Management Internet Explorer Backup and Disaster Recovery Proactive IT Botnet Recycling Specifications Downloads disposal Dark Web Human Resources Wireless Internet Display Knowledge Battery IT Service Cryptocurrency Project Management Hard Drive Staff Update WhatsApp Taskbar Hosted Desktop IT Management Sports Mobile Security Reporting Website Lead Generation Covid-19 Authorization Hard Disk Drive Multi-Factor Authentication Managed Service Provider Threat Hard Drives Personal Information Server Management Trends Error Licensing Managed Services Provider Analytics Amazon News Training Benchmarks Mobile Search Processors Digital Websites Hybrid Cloud Outlook Help Desk National Security eCommerce Firewall Operating System Telecommute Microsoft Teams Live Streaming Video Mobile Device Management Co-Managed IT Printing SSD E-Commerce Bitcoin A.I. Tech Support Electronic Health Records Vendor Law Enforcement Telecommuting Security Cameras Risk Management Recovery Time Management Insurance User Tip Spyware Safety Cables Profitability Sales Online Shopping Profiles SaaS Content Filtering Data loss Customer Service Holidays Humor Paper Remote Support Payment Financial Printers Thank You Regulation Analysis WiFi

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123