4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cops Lock Up Criminals, Ransomware Locks Up Cops

Cops Lock Up Criminals, Ransomware Locks Up Cops

Society relies on law enforcement to enforce laws in a fair and just manner, but even the police have their work cut out for them when they are targeted by a cyberattack. A recent incident in Cockrell, Texas shows that not even the police are immune to the threats of ransomware--particularly the emerging brand of ransomware, Osiris.

Before you start to panic over a new type of ransomware, you should know that Osiris is a particular strain of the Locky ransomware. The only difference seems to be the file extension for the encrypted files, which is “.osiris.” The main takeaway from this event is that sometimes even the good guys don’t have what it takes to protect themselves from unfortunate events--a truth all-too-painfully real for a business owner.

This type of ransomware attack started off just like any other. Out of nowhere, the police were shown a message that claimed their files had been locked down, with paying a fee of $4,000 being the only way of recovering them. The cause for this ransomware was a spoofed email that claimed to be from another part of the police department. In an attempt to get rid of the ransomware, the police followed what’s commonly called a best practice for this type of situation: restore a backed-up copy of the server’s data.

Unfortunately for them, the backup that they tried to restore from had also been infected, as it was taken after the systems were infected with the ransomware.

As you can imagine, this caused quite a bit of trouble for the Cockrell Police Department. Included in the encrypted files were photographic and video evidence that could have been used in the prosecution of criminals. Whether or not this particular instance will mean anything for legal battles in the future is yet to be determined, but it sure is convenient for those who are involved with them.

What this shows us is that ransomware is a threat for anyone who relies on data to perform their daily duties, businesses notwithstanding. A ransomware attack at the wrong time could be enough to completely upend operations, and it forces you to reconsider your approach to cybersecurity. You need to consider every single user of your email solution is a potential outlet of a ransomware attack. It also emphasizes the importance of keeping current backups archived in an off-site location so that you can guarantee you won’t be put in the same situation as these police officers.

If your business wants to take a stand against ransomware, 4IT can serve and protect you. We can help you implement spam-blocking solutions and security measures to keep ransomware from installing on your devices in the first place. Furthermore, we can help your employees know what to look for so that they don’t make the same mistakes as the Cockrell P.D. To learn more about network security, reach out to us at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 20 October 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet Business Computing software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware Google IT Services Business Efficiency Windows Disaster Recovery Innovation IT Support Hardware Business Continuity Workplace Tips Saving Money Computer VoIP Virtualization User Tips Upgrade Windows 10 Miscellaneous Mobile Device Management Mobile Devices Data Server Network Security Mobile Computing Email Microsoft Office Communication Network Alert Save Money Quick Tips communications BYOD Going Green Mobile Office Smartphone Social Media Information Technology Smartphones Office Apps Small Business Health Android Outsourced IT Ransomware Browser Gadgets Operating System Chrome Application Managed IT Services Disaster Tablet Firewall Avoiding Downtime Productivity Remote Computing Telephone Systems Managed IT Unified Threat Management IT Solutions Cybersecurity Spam Risk Management BDR Mobility WiFi Search Data Management Holiday Cybercrime Passwords The Internet of Things Facebook Vendor Management Employer-Employee Relationship Budget Hard Drives Automation Saving Time Remote Monitoring History Hacking Best Practice Apple VPN Marketing Big Data Recovery Phone System Law Enforcement Proactive IT iPhone Customer Relationship Management Office Tips User Error Collaboration Phishing Wireless Technology Password Hosted Solution Computers Telephony Printer USB Content Filtering Analytics Humor Encryption Administration Gmail Router Wearable Technology Office 365 Maintenance PowerPoint Virus Data Recovery Lithium-ion battery Antivirus Shortcut Money Social Current Events Data Backup Bring Your Own Device Data Security Private Cloud Tech Support Point of Sale IT COnsultant Outlook Work/Life Balance Computer Repair Government App Cost Management Audit HaaS Intranet Bandwidth Users Printer Server Business Intelligence Laptop Windows 8 OneNote Wireless Unsupported Software Cloud Computing Education Social Engineering Google Drive Trending Net Neutrality Save Time Network Congestion Instant Messaging Emails Internet of Things Identity Theft HIPAA Augmented Reality Data Protection Solid State Drive Help Desk Entertainment Flexibility Paperless Office Benefits DDoS Computer Accessories Fax Server Mouse Compliance Workplace Samsung Wi-Fi Streaming Media Emergency IT Support Two-factor Authentication Managing Stress Uninterrupted Power Supply SaaS Applications Windows 10 Excel online currency Social Networking Politics Vulnerability hacker Personal Information Transportation Travel Battery Robot Computer Care Update Customer Service Efficency Biometrics Data Storage Automobile Retail Virtual Reality End of Support Meetings Internet Exlporer Display Managed Security Nanotechnology Amazon Reliable Computing Co-managed IT Scam Tablets Hard Disk Drive Root Cause Analysis Bloatware Sports Employer Employee Relationship HBO NFL Worker Commute best practices Operating Sysytem Ebay CrashOverride Nokia PDF Computing Branding Scalability Files IT Management Word Distributed Denial of Service data breach Safety Settings Text Messaging How To WIndows 7 Chromecast WIndows Server 2008 Upgrades Windows Ink eWaste risk management Inbound Marketing Regulations Artificial Intelligence Administrator Training Patch Management Twitter Consultant Google Maps Colocation Value Cameras The Blindside Of Commerce Black Market User Access Surge Protector Company Culture Regulation Television Touchscreen Science Hard Drive 3D Printing Presentation IT Security Virtual Desktop Bluetooth Best Available Cleaning Sync Data Loss IT Technicians Experience iOS Uograde Images Keyboard Managed IT Service Avoid Downtime SharePoint Managed IT Services ISP Adobe Music Computer Fan Hiring/Firing Teamwork Programming Data storage Blogging Licensing Books Dark Web Busines Continuity Near Field Communication Smart Technology Screen Mirroring Networking Video Games Document Management Wiring Website Data Breach Information Advertising Legal IT consulting Cast Human Resources Mobile Device Running Cable Windows 10s Debate OneDrive Touchpad Taxes Lifestyle Supercomputer Electronic Medical Records IT Budget Tutorial Storage Reputation IT service Domains Software as a Service Shadow IT Microblogging Youtube Relocation Sales Gift Giving Google Docs Managed Service Provder Buisness Webinar Webinar Microsoft Excel Mobile IT solutions File Sharing Professional Services