Contact us today!
(469) 567-0181
facebooktwitterlinkedinA PC Geek RSS Feed

David M. Lay

A PC Geek has been serving the Waxahachie area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons From a Company that Successfully Beat Ransomware

Lessons From a Company that Successfully Beat Ransomware

Ransomware is a dangerous malware that all businesses fear. Although, if the right precautions are taken, a ransomware attack can be completely thwarted. A recent hack attack of the San Francisco Municipal Transportation Agency provides us with a real-world example of this, which helps make ransomware appear a lot less formidable.

Characteristic of ransomware, the attack locked transportation agency employees out of their workstations and disabled other systems. As a result of such widespread system failure, the agency was unable to collect payments for fares at their many ticketing kiosks, seeing as each kiosk could only display the message “you hacked. ALL data encrypted.” However, the agency still managed to operate by accepting cash payments for fares or not charging for rides while the system was down.

The hacker or group of hackers responsible went by the username Andy Saolis. In exchange for the decryption key, the hackers asked the agency to fork over approximately $73,000 worth of Bitcoins. In an odd twist as to why the hackers targeted the public transportation agency, an email revealed misplaced Robin Hood-like motives, “They give Your Money and everyday Rich more! But they don’t Pay for IT Security and using very old system’s !” However, an investigation by the FBI into the Andy Saolis account reveals a less-than-noble history of hacking several private companies.

Instead of bowing to the hackers’ demands, officials elected to restore their system from a backup copy. Essentially, they called the hackers’ bluff and came out on top. Upon enlisting the help of hackers of their own to assist with stopping the attack, the agency discovered that the hackers had only gained access to 25 percent of the agency’s network and made off with no data. This stands in contrast to the hacker’s online claim that they stole financial information from the payment kiosks, as well as 30 gigabytes of sensitive data pertaining to the operations of the agency.

While your SMB may not be able to employ the services of the FBI or vigilante hackers to strike back against those who hack your business; or, even be in a position to offer your services for free during a blackout, you do have the ability to maintain backed up copies of your data so that you can revert back to these copies should a ransomware attack ever befall your organization.

Additionally, by taking advantage of security best practices like using complex passwords, two-factor authentication, and security solutions like firewall, spam blocking, and content filtering, you’ll be able to safeguard your network from getting hacked in the first place. To make sure your network is equipped to thwart a malicious ransomware attack, reach out to A PC Geek at (469) 567-0181.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 23 February 2018
If you'd like to register, please fill in the username, password and name fields.

Sign Up for Our Newsletter

{captcha_img}

Powered by ChronoForms - ChronoEngine.com

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

freeconsultation
 

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Internet Microsoft Productivity Hackers Malware Business Software Business Computing Google Miscellaneous Workplace Tips Windows 10 Innovation Computer Backup Hosted Solutions Efficiency Windows Hardware IT Services Health Mobile Devices Mobile Computing Communication IT Support User Tips Business Management VoIP Email Holiday Server Network Data Quick Tips Virtualization Smartphone Office Going Green Business Continuity Mobile Device Management Save Money Saving Money Remote Computing Disaster Recovery Operating System Apps Social Media Alert Upgrade Android Chrome Managed Service Provider Microsoft Office WiFi Mobility Social Application Antivirus Facebook Best Practice Small Business Employer-Employee Relationship Ransomware The Internet of Things Big Data Passwords Identity Theft Law Enforcement Lithium-ion battery Office Tips Analytics History Printer Search Gmail Password Browser Current Events Government BYOD Information Technology Spam Bandwidth Unified Threat Management Hacking Tablet Collaboration Laptop Gadgets Smartphones Saving Time Users USB Maintenance Hard Drives Money Data Management Streaming Media Wireless Education communications User Error Computers Disaster Encryption Telephone Systems Work/Life Balance Humor Avoiding Downtime Remote Monitoring Phone System Tech Support Router Recovery Apple intranet Network Security Automation Net Neutrality Firewall iPhone Wearable Technology Private Cloud Managing Stress Office 365 Wireless Technology Proactive IT Outlook Printer Server Online Currency Update Marketing Fraud Budget Personal Information Administration Transportation Shortcut Business Intelligence Content Filtering Internet Exlporer Biometrics Point of Sale Managed IT Services PowerPoint Social Engineering Customer Service Cost Management VPN Telephony Retail Virtual Reality BDR Google Drive Entertainment App DDoS Wi-Fi Benefits Mobile Office Flexibility IT Consultant Fax Server Cybercrime Data Loss Risk Management IT Solutions Storage ISP Music Television Files Online Backup Two-factor Authentication 3D Printing Bluetooth Books Trending Chromecast Customer Relationship Management Display Cameras SharePoint User Black Market Excel Electronic Medical Records Data Theft Administrator HaaS Reputation Teamwork Best Available Instant Messaging Safety CloudSync Access Presentation Meetings Battery Science Programming Emergency Hosted Solution Compliance Website RAM Ebay End of Support Running Cable Phishing Automobile Cleaning Inbound Marketing Blogging Robot Emails CPU Networking Audit Amazon Advertising Worker Commute OneNote Save Time Twitter Data storage Slow Human Resources Near Field Communication Video Games Smart Phones PDF OneDrive Hacker Uninterrupted Power Supply Windows 8 Bring Your Own Device Legal Text Messaging Paperless Office Computer Accessories Bloatware Workplace Keyboard Internet of Things Vendor Management Applications IT consulting Politics Artificial Intelligence Distributed Denial of Service Miscelllaneous Mouse Hiring/Firing Sports Touchpad Branding Scalability Computing Experience eWaste HIPAA Network Congestion Travel Operating Sysytem Regulations WIndows 7 How To Prodcuctivity

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To A PC Geek, a disaster is anything that involves a major loss of data or major downt...
QR-Code