Contact us today!

FRS Pros Blog

Are You Ready for a Ransomware Resurgence?

Are You Ready for a Ransomware Resurgence?

Ransomware attacks grew less common in both 2018 and thus far in 2019 when compared to 2017. Unfortunately, recent events have made it more likely that this trend will reverse in the near future. Why is that? Simple: some municipalities have set a precedent of paying up.

Let’s explore a hypothetical situation: a mouse asks you for a cookie. If you were to give this mouse a cookie, which do you think would be more likely: he says “Thanks!” and goes on his merry way, or he simply increases his demands of you until they are untenable? The latter is almost certainly going to be the case, and the same goes for cybercriminals.

How Ransomware Has Proven Effective

It is no secret that holding valuable things for ransom has long been a choice tactic of criminals of all kinds, but via ransomware, cybercriminals have taken it into the digital world.

The way ransomware works is that, by infecting a device (frequently via phishing or spam), a cybercriminal is able to leverage encryption to lock down their target’s device and potentially the rest of the network the device is attached to. In order to maximize the efficacy of these attacks, cybercriminals will often leverage spear phishing tactics to minimize any suspicion surrounding the attack.

One of the other reasons that ransomware is taken so seriously is the fact that - despite the number of infections dropping - the FBI’s Internet Crime Complaint Center states that the damages experienced by targets have risen.

This is where the attacks on municipalities come into play.

Why Municipalities Have Been Targeted

In the early summer of 2019, two Florida cities, Lake City and the City of Riviera Beach, were effectively shut down by ransomware attacks. Indiana’s LaPorte county paid a ransom of about $130,000 worth when their domain controllers were infected by a ransomware known as Ryuk.

One of the primary reasons that municipalities and governments have been targeted by ransomware is the fact that insurance coverage is available for such attacks, meaning that there is less of a risk to municipalities in paying the ransom. As a result, these cities, towns, and counties have less to potentially lose, and are more inclined to just pay the ransom.

However, if your business is targeted, this is not a strategy that we can recommend.

Instead, You Have to Be Prepared

To help minimize the risk of your data being lost to a ransomware attack, you need to make sure that you maintain up-to-date backups of your data that are kept isolated from the original copy. It is also crucial that these backups are tested, as the only thing worse than losing your data to a ransomware attack is losing your data to a ransomware attack after your backup failed.

Furthermore, you need to be sure that your employees remain educated on how to spot and avoid attacks like ransomware and phishing. Ideally, your employees won’t have more access to your systems than their roles require.

For more help and assistance in securing your IT, reach out to FRS Pros at 561-795-2000.

Hacking Doesn’t Take a Computer Science Degree
Five Reasons Managed Services Even Work Well for S...

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Network Security Business Computing Productivity Privacy Internet Hackers Google User Tips Software Business Management Cloud Microsoft Hardware Computer Tech Term Innovation Efficiency Data Backup Mobile Devices Data Malware Hosted Solutions Smartphones Office 365 Browser Windows 10 Data Recovery Smartphone Android IT Services Cybersecurity Gadgets Backup Windows Communication Email Upgrade Internet of Things IT Support Outsourced IT Business Small Business Apps Workplace Tips Data Security Cybercrime Communications Disaster Recovery VoIP Network Phishing Business Continuity Mobile Device Management Ransomware Operating System Employer-Employee Relationship OneNote Users Money Artificial Intelligence Alert Saving Money Law Enforcement Cloud Computing Information Vulnerability Server Health Applications Wireless Best Practice Chrome Automation Microsoft Office Managed IT Services Managed IT Services Blockchain Passwords Managed Service Virtualization Spam Miscellaneous Social Media IT Support Collaboration Facebook Networking Router Telephone Systems Tech Support Word Google Drive Password Managed Service Provider Managed IT Holiday Hacking Unsupported Software Windows 10 BYOD Information Technology Save Money Computers App Two-factor Authentication Bring Your Own Device Data Storage WiFi Productivity Cortana Quick Tips Mobile Device Sports Data Loss Windows 7 Settings Conferencing Hosted Solution Application Search Avoiding Downtime Mobility Business Technology Telephony Audit Meetings Google Docs Project Management Data Protection Encryption Patch Management Wireless Charging Hard Drive Display Devices Safety Data Breach Cost Management IT Management Government Gmail Augmented Reality Risk Management Travel Commerce WannaCry Excel Robot Access Control File Sharing Printing Wi-Fi Fraud The Internet of Things Budget Update Mobile Security Shortcut Evernote VPN iPhone SaaS Wireless Technology Politics Proactive IT Google Assistant Data Management User Error BDR Hybrid Cloud Touchscreen Education Sabotage Remote Computing Wireless Internet Saving Time Identities Employee-Employer Relationship Voice over Internet Protocol iOS WIndows Server 2008 Value Wasting Time Samsung Business Intelligence Ciminal Medical IT Windows 10s Access HBO Charger Data Privacy Computer Care Nanotechnology ROI Device Security Amazon Downtime Chromecast Screen Mirroring Data Theft Adobe PC Workers Gamification Keyboard Shortcuts Unified Threat Management Legal Legislation Language Transportation Accessory Antivirus Digital Signage Laptop Software as a Service 5G Internet Exlporer Solid State Drive Private Cloud Root Cause Analysis Windows Ink Windows Server 2008 R2 Virtual Assistant E-Commerce Emails Cast Gifts Computing Battery Licensing Paperless Office Updates Memory Human Resources Upgrades Comparison Testing Uninterrupted Power Supply Computer Fan Outlook Going Green Social Computer Forensics Peripheral Microsoft Excel Firewall IT budget Touchpad Bandwidth YouTube Hard Disk Drive Instant Messaging Hacker Chromebook Co-Managed Services Google Maps Mobile Office Spyware Alexa for Business Payment Cards Marketing Emergency Credit Cards App store Point of Sale Smartwatch Microsoft Word Financial Payroll Specifications Virus Camera Management Files Entertainment Processor Humor Employees DDoS IT Solutions Telephone Disaster Identity Theft Apple Development Employee Recovery Webinar Office Tablets Server Maintenance Maintenance Security Cameras Consultant Sales Proactive Personal Information Projects Sync PowerPoint Admin Remote Monitoring Storage Benchmarks Social Engineering Vendor OneDrive Reputation Hyperlink Vendor Management Micrsosoft Edge Break/Fix IT solutions Administrator FAQ Lithium-ion battery Scam NFL Investment eWaste Data storage Machine Learning Streaming Media Retail Websites History Identity Hiring/Firing Video Games Experience Thank You Work/Life Balance Text Messaging Regulation Virtual Reality Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Benefits Phone System Congratulations Twitter Office tips Save Time Computer Accessories Advertising Smart Technology Flexibility Music End of Support Scalability Analytics HaaS Keyboard es Relocation Cache Black Market Cleaning Training Monitors Automobile Big Data Managing Stress Television CrashOverride PDF Compliance USB Worker Company Culture How To Books Mobile Computing Printers