Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons From a Company that Successfully Beat Ransomware

Lessons From a Company that Successfully Beat Ransomware

Ransomware is a dangerous malware that all businesses fear. Although, if the right precautions are taken, a ransomware attack can be completely thwarted. A recent hack attack of the San Francisco Municipal Transportation Agency provides us with a real-world example of this, which helps make ransomware appear a lot less formidable.

Characteristic of ransomware, the attack locked transportation agency employees out of their workstations and disabled other systems. As a result of such widespread system failure, the agency was unable to collect payments for fares at their many ticketing kiosks, seeing as each kiosk could only display the message “you hacked. ALL data encrypted.” However, the agency still managed to operate by accepting cash payments for fares or not charging for rides while the system was down.

The hacker or group of hackers responsible went by the username Andy Saolis. In exchange for the decryption key, the hackers asked the agency to fork over approximately $73,000 worth of Bitcoins. In an odd twist as to why the hackers targeted the public transportation agency, an email revealed misplaced Robin Hood-like motives, “They give Your Money and everyday Rich more! But they don’t Pay for IT Security and using very old system’s !” However, an investigation by the FBI into the Andy Saolis account reveals a less-than-noble history of hacking several private companies.

Instead of bowing to the hackers’ demands, officials elected to restore their system from a backup copy. Essentially, they called the hackers’ bluff and came out on top. Upon enlisting the help of hackers of their own to assist with stopping the attack, the agency discovered that the hackers had only gained access to 25 percent of the agency’s network and made off with no data. This stands in contrast to the hacker’s online claim that they stole financial information from the payment kiosks, as well as 30 gigabytes of sensitive data pertaining to the operations of the agency.

While your SMB may not be able to employ the services of the FBI or vigilante hackers to strike back against those who hack your business; or, even be in a position to offer your services for free during a blackout, you do have the ability to maintain backed up copies of your data so that you can revert back to these copies should a ransomware attack ever befall your organization.

Additionally, by taking advantage of security best practices like using complex passwords, two-factor authentication, and security solutions like firewall, spam blocking, and content filtering, you’ll be able to safeguard your network from getting hacked in the first place. To make sure your network is equipped to thwart a malicious ransomware attack, reach out to A PC Geek at (469) 567-0181.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 21 July 2018
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

{captcha_img}

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Software Business Business Computing Google Windows 10 Miscellaneous Workplace Tips Efficiency Innovation Computer Backup Hosted Solutions Windows Hardware Mobile Devices Mobile Computing IT Services Health User Tips IT Support Communication VoIP Business Management Holiday Data Quick Tips Virtualization Smartphone Server Network Email Mobile Device Management Saving Money Apps Disaster Recovery Alert Save Money Remote Computing Operating System Social Media Upgrade Going Green Business Continuity Office Small Business Android Chrome Social Employer-Employee Relationship Ransomware Facebook Mobility WiFi Identity Theft The Internet of Things Application Antivirus Big Data Managed Service Provider Microsoft Office Best Practice Analytics History Gmail Search Browser Current Events Government Information Technology Spam Saving Time Bandwidth Unified Threat Management Law Enforcement Lithium-ion battery Hacking Office Tips Tablet Printer Password Passwords BYOD Users USB communications Telephone Systems Encryption Humor Remote Monitoring Tech Support Streaming Media Education Recovery Network Security User Error intranet Net Neutrality Firewall Automation Wireless Computers iPhone Disaster Laptop Collaboration Avoiding Downtime Phone System Router Work/Life Balance Hard Drives Maintenance Apple Fraud Data Management Money Gadgets Smartphones Biometrics Outlook Social Engineering VPN Printer Server Telephony Customer Service Office 365 Virtual Reality Marketing Google Drive App DDoS Administration Benefits Content Filtering Personal Information IT Consultant Fax Server Point of Sale PowerPoint Cybercrime Data Loss Cost Management Risk Management Retail Wearable Technology BDR Managed IT Services Managing Stress Entertainment Private Cloud Proactive IT Wireless Technology Mobile Office Online Currency Update Wi-Fi Budget IT Solutions Flexibility Business Intelligence Transportation Shortcut Internet Exlporer Networking Amazon Blogging Robot CPU Advertising How To Cameras Data Theft Music Human Resources Near Field Communication Smart Phones Data storage Slow PDF CloudSync Books Uninterrupted Power Supply Windows 8 Text Messaging Black Market Computer Accessories Compliance Programming Electronic Medical Records Internet of Things Bloatware HaaS IT consulting Vendor Management Applications Artificial Intelligence Instant Messaging Distributed Denial of Service Mouse Inbound Marketing Safety Sports Branding Computing Emails Audit Touchpad Battery eWaste Network Congestion Twitter OneNote Emergency WIndows 7 Prodcuctivity Operating Sysytem Automobile Television Storage OneDrive Cleaning Files Online Backup Two-factor Authentication Bluetooth Bring Your Own Device Paperless Office Worker Commute Trending Workplace Save Time Chromecast Customer Relationship Management Video Games SharePoint User Display Miscelllaneous Excel Hacker Administrator Legal Teamwork Best Available Reputation HIPAA Presentation Travel Keyboard Access Meetings Regulations ISP Politics Hosted Solution Science Website Hiring/Firing RAM 3D Printing End of Support Scalability Running Cable Phishing Ebay Experience

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code