While ransomware attacks have slowed down with cybercriminals shifting their focus to cryptojacking (mining virtual currencies), cyberextortion is still widespread.

Here are a few examples of recent cyber extortion attacks:

Systems of Onslow Water and Seer Authority (ONWASA) in Jacksonville, NC, serves a population of more then 100,000 people. Earlier this month it’s computer systems were attacked and infected by a malicious Emotet ransomware. The Ryuk strain of this malware quickly spread across the network, infecting databases and files. ONWASA systems were compromised despite having extensive defenses in place, yet had a weak link computer systems at the main office, where penetration apparently took place. ONWASA refuses to pay the ransom,

Another earlier attack  in Mecklenburg County, NC could’ve resulted in $23,000 ransom losses, but the county officials were confident that resources were available to restore and rebuild the systems from secure backup data.

City of West Haven, CT, was hit with ransomware attack that ran for 27 minutes early morning on October 16, 2018, infecting 23 servers.  Attack was contained within 39 hours, and federal and local police IT authorities conducted an investigation. Not being properly prepared for such attack, West Heaven had made a difficult choice of paying the ransom of $2000, and hired a consulting company to remediate and restore the affected systems.

What to do if you don’t want to be the victim of cyber extortion specialists: plan, backup, restore.

You  can pursue the questionable choice of paying the ransom (with no guarantee of receiving a decryption key and potentially being re-targeted in the future), or face a complicated and very expensive cleanup and restoration process. Cybercriminals evolve their methods on daily and hourly basis: understanding that nobody can guarantee zero penetration, individuals and organizations must be prepared to the safeguard against the attacks to minimize the risk, and recover properly, to minimize the damage, should the malicious attack succeed.

  1. To minimize the risk, properly safeguard against malicious attack
  2. To minimize the damage, have a rapid recovery plan.
The most important thing small businesses can do ensure endpoint security is to let their IT and security professionals proactively implement and protect mission-critical business elements and processes:
  • backup essential systems and data;
  • regularly run backup and practice restore procedures;
  • create a disaster recovery plan;
  • implement programs for timely patch management;
  • procedures;
  • create and practice a disaster recovery
  • implement necessary measures to harden business and user systems;
  • constantly monitor systems security.

Does your SMB need reliable, expert Security, Data Backup and Disaster Recovery Services in New Jersey?

Call us 201-493-1414 x 311 to speak to our IT Security experts or to request a consultation today. Let’s start a conversation to make sure your business continuity is secured.

Intelligent Business Continuity services by powersolution.com, a New Jersey local IT Security consulting and Computer Network Support company for Small Business include all assets of Managed Services.

Copyright © 2018 powersolution.com. All rights reserved.
Share This