Contact us today!

FRS Pros Blog

Are You Ready for a Ransomware Resurgence?

Are You Ready for a Ransomware Resurgence?

Ransomware attacks grew less common in both 2018 and thus far in 2019 when compared to 2017. Unfortunately, recent events have made it more likely that this trend will reverse in the near future. Why is that? Simple: some municipalities have set a precedent of paying up.

Let’s explore a hypothetical situation: a mouse asks you for a cookie. If you were to give this mouse a cookie, which do you think would be more likely: he says “Thanks!” and goes on his merry way, or he simply increases his demands of you until they are untenable? The latter is almost certainly going to be the case, and the same goes for cybercriminals.

How Ransomware Has Proven Effective

It is no secret that holding valuable things for ransom has long been a choice tactic of criminals of all kinds, but via ransomware, cybercriminals have taken it into the digital world.

The way ransomware works is that, by infecting a device (frequently via phishing or spam), a cybercriminal is able to leverage encryption to lock down their target’s device and potentially the rest of the network the device is attached to. In order to maximize the efficacy of these attacks, cybercriminals will often leverage spear phishing tactics to minimize any suspicion surrounding the attack.

One of the other reasons that ransomware is taken so seriously is the fact that - despite the number of infections dropping - the FBI’s Internet Crime Complaint Center states that the damages experienced by targets have risen.

This is where the attacks on municipalities come into play.

Why Municipalities Have Been Targeted

In the early summer of 2019, two Florida cities, Lake City and the City of Riviera Beach, were effectively shut down by ransomware attacks. Indiana’s LaPorte county paid a ransom of about $130,000 worth when their domain controllers were infected by a ransomware known as Ryuk.

One of the primary reasons that municipalities and governments have been targeted by ransomware is the fact that insurance coverage is available for such attacks, meaning that there is less of a risk to municipalities in paying the ransom. As a result, these cities, towns, and counties have less to potentially lose, and are more inclined to just pay the ransom.

However, if your business is targeted, this is not a strategy that we can recommend.

Instead, You Have to Be Prepared

To help minimize the risk of your data being lost to a ransomware attack, you need to make sure that you maintain up-to-date backups of your data that are kept isolated from the original copy. It is also crucial that these backups are tested, as the only thing worse than losing your data to a ransomware attack is losing your data to a ransomware attack after your backup failed.

Furthermore, you need to be sure that your employees remain educated on how to spot and avoid attacks like ransomware and phishing. Ideally, your employees won’t have more access to your systems than their roles require.

For more help and assistance in securing your IT, reach out to FRS Pros at 561-795-2000.

Hacking Doesn’t Take a Computer Science Degree
Five Reasons Managed Services Even Work Well for S...

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Productivity Privacy Business Computing Hackers Internet Software Google Microsoft User Tips Cloud Innovation Business Management Hardware Efficiency Computer Tech Term Email Data Hosted Solutions Cybersecurity Data Backup Windows 10 Communication Smartphones Mobile Devices Malware IT Support IT Services Office 365 Data Recovery Android Smartphone Outsourced IT Upgrade Browser Gadgets Backup Business Internet of Things Windows Small Business Apps VoIP Data Security Workplace Tips Phishing Communications Disaster Recovery Users Cybercrime Business Continuity Saving Money Managed IT Services Information Network Ransomware Automation Facebook Operating System Cloud Computing Mobile Device Management Alert Passwords Law Enforcement Miscellaneous OneNote Social Media Employer-Employee Relationship Two-factor Authentication Money Server Artificial Intelligence Managed Service Vulnerability Best Practice Collaboration Blockchain Health Microsoft Office Managed IT Applications Wireless Holiday Chrome Virtualization Networking Spam Managed IT Services IT Support Patch Management Printing Tech Support Information Technology Project Management Data Storage Bring Your Own Device Password Data Breach Mobile Device Hacking Windows 7 Windows 10 Gmail Router Managed Service Provider Save Money Quick Tips Computers Google Drive Settings Unsupported Software Augmented Reality BYOD Retail Bandwidth App Word Access Control Telephone Systems Sports Wireless Charging Google Docs Mobile Security Robot Devices Touchscreen BDR Vendor WiFi Telephony Google Assistant The Internet of Things VPN iPhone Hybrid Cloud Voice over Internet Protocol Travel Application Audit History Excel Meetings Encryption File Sharing Data Protection Safety Fraud Business Technology Paperless Office Software as a Service Hosted Solution Evernote Cost Management IT Management Hard Drive Display Search User Error Marketing Risk Management Avoiding Downtime Mobility Budget Commerce WannaCry Wireless Technology Cortana Data Loss Wi-Fi Payment Cards Data Management Update Going Green Social Conferencing Politics Productivity Government SaaS Shortcut Proactive IT Holidays Telephone Access IT solutions Micrsosoft Vendor Management Employee Managed IT Service Projects Chromecast Windows Ink Investment Scam Security Cameras Humor Gifts Computing OneDrive Licensing Updates Sabotage Troubleshooting Education PowerPoint Admin Comparison iOS WIndows Server 2008 Myths Break/Fix Outlook Personal Information Copiers Hyperlink Internet Exlporer Microsoft Excel IT budget Windows 10s HBO Business Intelligence Samsung Managed Services Provider Identity Printers Google Maps Spyware Screen Mirroring ROI Machine Learning Credit Cards App store Computer Care Nanotechnology Legal Employee-Employer Relationship Reputation Microsoft Word Unified Threat Management PC CRM Wireless Internet Saving Time Uninterrupted Power Supply Specifications Virus Threats Medical IT Inventory Value Wasting Time Data storage Solid State Drive Digital Signage Antivirus Root Cause Analysis Facebook Privacy Data Privacy Remote Computing Apple Emails Cast Windows Server 2008 R2 Amazon Downtime Tablets Maintenance Upgrades Battery Gamification Keyboard Shortcuts Sales Proactive Computer Fan Scams 5G Files Sync Instant Messaging Hacker Accessory DDoS Storage Social Engineering Hard Disk Drive Firewall eCommerce Emergency Recovery Edge Mobile Office Virtual Assistant E-Commerce Disaster FAQ Testing Transportation NFL eWaste Smartwatch Point of Sale Memory Human Resources Laptop Websites Virtual Private Network YouTube Private Cloud Hosted Desktop Computer Forensics Peripheral Identities IT Solutions Processor Entertainment Charger Fiber Optics Chromebook Co-Managed Services Administrator Ciminal Webinar Development Identity Theft Alexa for Business Remote Workers Camera Streaming Media Device Security Consultant Server Maintenance Office Financial Payroll Lithium-ion battery Touchpad Data Theft Employees Adobe Workers Remote Monitoring Smart Devices Management Legislation Language Benchmarks HaaS Television CrashOverride USB Worker End of Support How To Books Relocation Company Culture Video Games Experience Hiring/Firing Congratulations Virtual Reality Work/Life Balance Compliance Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Phone System Benefits PDF Regulation Mobile Computing es Save Time Computer Accessories Flexibility Music Smart Technology Text Messaging Communitications Twitter Scalability Analytics Office tips Cache Keyboard Advertising Black Market Cleaning Big Data Automobile Training Monitors Managing Stress Thank You