Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

The culprits behind the attack, the hacker group SamSam, are known for meticulously selecting targets that they are fairly confident will pay up when faced with a ransomware attack. Even the mayor of Atlanta was intimidated enough by the attack as to compare it to a kidnapping or hostage situation. Access to important data, files, and applications hung in the balance, and the downtime caused by this incident led to considerable trouble for countless government officials and citizens. Technology has become such an integral part of running governments and businesses that even the slightest issue could have echoing repercussions, so you can imagine the shock and horror in the wake of this ransomware attack.

Even more horrific is the ransom demanded by the hackers that exceeded $51,000 in Bitcoin. Ransomware is known for locking down files and waiting for a payment from the victims before unlocking them. This particular strain of ransomware replaces the names of all affected files with the phrase “I’m sorry” and demands that the ransom be paid in a week.

By working with the technicians at Dell SecureWorks, Atlanta is back on its feet, but not without suffering considerably from the ransomware attack. It’s not clear if Atlanta will pay up for the release of its data, and confidentiality agreements mean that Dell SecureWorks will not reveal any information about their relationship to the attack. But one thing is painfully clear in the wake of such destruction: trying to pay the problem away can be just the beginning of ransomware issues.

For example, if you pay a ransomware developer for the safe return of your files, you might be funding further attacks on other victims. This is counter-productive to the security-minded culture of the business environment. Instead, it’s better to take preventative measures such as implementing data backup and disaster recovery, as well as identifying threats before they have a chance to become a problem. If you are ever struck by a ransomware attack, it’s better to reach out to an IT provider before committing to any payments to hackers. It’s better to try just about any alternative before investing in something that isn’t even a guaranteed fix.

To improve network security and enable preventative solutions, reach out to Network Synergy. Our trained and trusted technicians will work toward ensuring your network is airtight. To learn more, reach out to us at 203.261.2201.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Hard Disk Drive Cyber Monday Disaster Resistance Superfish Hard Drives Nanotechnology Save Time Work Station Personal Information Budget Software as a Service Backup Language Virtual Desktop Settings Paperless Office Chatbots Computer Care Environment Bandwidth Utility Computing Browser Unified Threat Management Identity Smartphone Start Menu Cabling Sports Redundancy Competition Fraud Error Automobile Technology Laws Android Emoji Knowledge Document Management Compliance Writing Access Control Proactive IT Firewall Best Practices People Telephone Systems Google Wallet 3D Printing Screen Reader BYOD Computing Infrastructure Heating/Cooling Internet Alt Codes Alert Cortana Cache Identity Theft Battery Lenovo Work/Life Balance Scheduling Trending Web Server Specifications Permissions Server Management Mobile Office Unsupported Software Operating System Business Technology Food Information Technology Hardware Webcam communications Cryptocurrency Managed IT Service Phishing App Efficiency Automation Administration File Sharing User Error Collaboration Disaster Software Operations Point of Sale Word Text Messaging Ransomware Debate Software Tips CrashOverride Content Filtering IT Consultant Digital Signature Data Recovery Tech Term Licensing Encryption Money Robot Travel Inbound Marketing Law Firm IT Google Mobile Security Documents Running Cable IT Consulting Uninterrupted Power Supply Social Media Touchscreen Skype Search Leadership CCTV Monitors Troubleshooting Windows 10 PC Care Remote Computing HIPAA Training Business Management Network Multi-Factor Security Gmail Public Cloud Presentation Secruity Data storage Unified Communications Password Halloween Gadget Solid State Drive Consultation Wireless How To Technology Twitter Social Networking Bluetooth Digital Payment Buisness Cameras Corporate Profile Chrome Private Cloud IT Solutions Legal Bring Your Own Device BDR Smartphones Malware Machine Learning IT service Mobility Managed IT Services Computing Hosted Solutions Privacy Memory Shortcut 5G Help Desk Wearable Technology Storage Spam Scam Managed IT services IoT Congratulations Domains Print Server Windows Black Market Physical Security Wi-Fi Hacking Files End of Support Law Enforcement Cost Management Logs Black Friday Internet of Things Excel Customer Service Downtime Employer-Employee Relationship Customer Relationship Management Mobile Device Save Money Holiday iPhone Productivity Remote Support Microsoft Excel Data Management History Spyware Mail Merge Data Warehousing Migration Backups Distributed Denial of Service Artificial Intelligence Webinar Project Management Botnet Public Speaking Programming Intranet Printer Analyitcs Charger Notifications Downloads Office 365 WiFi LiFi Microsoft Office Chromebook Cloud Computing Google Analytics Saving Time Statistics Best Practice Processors Tablet Government Wireless Technology YouTube Technology Tips Network Management Net Neutrality Staffing Network Security CIO Mobile Devices Printing Safety Regulations Quick Tips Tip of the Work IT budget Data Security Sync Risk Management Mobile Technology Virus Windows 8.1 Update Time Management Online Currency G Suite Communication Email Security Business Growth Server Data Mobile Computing Avoiding Downtime Politics Motherboard USB Vendor Management Maintenance Big Data Application Business Owner Mirgation Bitcoin Relocation Health Flexibility Co-managed IT Social Supercomputer Business Intelligence Outlook Facebook Experience Computers Disaster Recovery Websites Office Tips Recycling Best Available Two-factor Authentication Virtual Private Network Office Going Green Firefox IBM Smart Tech Infrastructure Connectivity Google Docs Virtual Reality Augmented Reality Video Surveillance Hosted Solution Remote Monitoring VPN Alerts Business Continuity eWaste Hackers Mobile Data Legislation Telephony Cleaning IT Management Gadgets Miscellaneous Data Loss Mobile Device Management Healthcare Streaming Media Tracking The Internet of Things SharePoint Entrepreneur Small Business IT Services Computer Motion sickness Address Data Breach eBay Website Managed IT Smart Technology Business Productivity Hiring/Firing IT Support Digital User Tips Apps Upgrade Networking Hotspot Social Engineering Macro Cloud Workplace Tips Tip of the Week Administrator Business Computing Refrigeration Users PowerPoint Mouse Windows 10 Saving Money Apple Crowdsourcing Meetings Piracy Network Congestion Windows 8 Star Wars Hacks Hacker Gaming Console User Retail Current Events Router Recovery Lithium-ion Battery Scary Stories Company Culture Cookies Drones IT Support Microsoft Fax Server Comparison Vulnerability Google Maps Managed Service Provider Cybercrime Tech Support SaaS Applications Laptop Passwords Antivirus Staff Blockchain Hard Drive Patch Management Data Backup Google Calendar Deep Learning Phone System Virtualization IP Address PDF 3D Tutorials Crowdfunding Break Fix Service-based Business Computer Repair Cybersecurity Assessment Upgrades IT Technicians Techology Fun Cooperation VoIP Google Drive Unified Threat Management Innovation Undo Humor Education Typing Modem GPS Electronic Medical Records Identities Servers Trainging Consumers LinkedIn Samsung Internet Exlporer Thank You Computer Accessories Tip of the week Dark Web Marketing Conferencing Taxes Display Value Outsourced IT

      Latest Blogs

      Wi-Fi has been one of the single most useful innovations for the modern office. Connecting to your Internet without having to be physically connected to it via an ethernet wire has...

      Latest News

      Our Site Has Launched!

      flag

      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.

      callphone

      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube