4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cops Lock Up Criminals, Ransomware Locks Up Cops

Cops Lock Up Criminals, Ransomware Locks Up Cops

Society relies on law enforcement to enforce laws in a fair and just manner, but even the police have their work cut out for them when they are targeted by a cyberattack. A recent incident in Cockrell, Texas shows that not even the police are immune to the threats of ransomware--particularly the emerging brand of ransomware, Osiris.

Before you start to panic over a new type of ransomware, you should know that Osiris is a particular strain of the Locky ransomware. The only difference seems to be the file extension for the encrypted files, which is “.osiris.” The main takeaway from this event is that sometimes even the good guys don’t have what it takes to protect themselves from unfortunate events--a truth all-too-painfully real for a business owner.

This type of ransomware attack started off just like any other. Out of nowhere, the police were shown a message that claimed their files had been locked down, with paying a fee of $4,000 being the only way of recovering them. The cause for this ransomware was a spoofed email that claimed to be from another part of the police department. In an attempt to get rid of the ransomware, the police followed what’s commonly called a best practice for this type of situation: restore a backed-up copy of the server’s data.

Unfortunately for them, the backup that they tried to restore from had also been infected, as it was taken after the systems were infected with the ransomware.

As you can imagine, this caused quite a bit of trouble for the Cockrell Police Department. Included in the encrypted files were photographic and video evidence that could have been used in the prosecution of criminals. Whether or not this particular instance will mean anything for legal battles in the future is yet to be determined, but it sure is convenient for those who are involved with them.

What this shows us is that ransomware is a threat for anyone who relies on data to perform their daily duties, businesses notwithstanding. A ransomware attack at the wrong time could be enough to completely upend operations, and it forces you to reconsider your approach to cybersecurity. You need to consider every single user of your email solution is a potential outlet of a ransomware attack. It also emphasizes the importance of keeping current backups archived in an off-site location so that you can guarantee you won’t be put in the same situation as these police officers.

If your business wants to take a stand against ransomware, 4IT can serve and protect you. We can help you implement spam-blocking solutions and security measures to keep ransomware from installing on your devices in the first place. Furthermore, we can help your employees know what to look for so that they don’t make the same mistakes as the Cockrell P.D. To learn more about network security, reach out to us at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 24 May 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet Business Computing software Productivity Backup Hackers Business Management Hosted Solutions Managed Service Provider Malware Business IT Services Google Efficiency Innovation Windows IT Support Hardware Workplace Tips Saving Money Miscellaneous Windows 10 VoIP Upgrade Computer Disaster Recovery Business Continuity Virtualization Mobile Devices Data Mobile Computing User Tips Server Mobile Device Management Save Money Communication Network Security Quick Tips Network Going Green Mobile Office Email Alert Information Technology Office Smartphones Smartphone Microsoft Office BYOD Apps Small Business communications Health Social Media Gadgets Operating System Firewall Managed IT Services Disaster Tablet Browser Application Ransomware Avoiding Downtime Passwords Remote Computing Unified Threat Management Mobility Search WiFi Android Holiday Chrome The Internet of Things Automation Outsourced IT Vendor Management IT Solutions Hard Drives Hacking Saving Time Best Practice Risk Management Data Management BDR Remote Monitoring History Telephone Systems Employer-Employee Relationship Budget Apple VPN Wireless Technology Recovery Productivity Facebook Big Data Marketing Office Tips Spam Customer Relationship Management Cybercrime Current Events Phone System Bring Your Own Device Managed IT Printer USB Content Filtering Analytics Law Enforcement Antivirus Router Humor Gmail Administration Social Wearable Technology iPhone Password User Error Maintenance PowerPoint Lithium-ion battery Collaboration Computers Telephony Money Trending Education Net Neutrality Save Time Tech Support Point of Sale HaaS Cybersecurity IT COnsultant Encryption Work/Life Balance Computer Repair Proactive IT Government Phishing Cost Management Intranet Social Engineering Hosted Solution Bandwidth Virus Printer Server Users Laptop Wireless Private Cloud Windows 8 End of Support Benefits DDoS Computer Accessories Google Drive Cloud Computing Mouse Internet Exlporer Display Internet of Things Two-factor Authentication Network Congestion Identity Theft Managing Stress Solid State Drive Paperless Office SaaS Flexibility Help Desk Fax Server Outlook Workplace Samsung Streaming Media Shortcut Business Intelligence App Update Uninterrupted Power Supply Customer Service Office 365 online currency Biometrics Retail Virtual Reality hacker Social Networking Personal Information Transportation Robot Instant Messaging Emails Battery Efficency HIPAA OneNote Unsupported Software Entertainment Automobile Books Hard Disk Drive Smart Technology Video Games Website Document Management Data Breach best practices Advertising Branding Distributed Denial of Service Compliance Legal Wiring OneDrive Touchpad Mobile Device Information WIndows 7 Managed Security data breach Amazon Co-managed IT eWaste Scam Debate Inbound Marketing Augmented Reality Regulations Data Protection risk management Excel Employer Employee Relationship Value Sports Operating Sysytem Ebay Cameras Worker Commute User Audit PDF Computing Science Scalability Files Virtual Desktop Nokia Presentation Best Available Safety Text Messaging Bluetooth IT Technicians Travel How To Chromecast Upgrades Wi-Fi Emergency Artificial Intelligence SharePoint Training Administrator Colocation Twitter Consultant Applications The Blindside Of Teamwork Surge Protector Company Culture Busines Continuity Black Market Access Television Networking Touchscreen Near Field Communication Politics IT Security 3D Printing Meetings Cleaning Hard Drive Experience Human Resources IT consulting Running Cable Keyboard Avoid Downtime Computer Care Uograde Images ISP Reliable Computing Music Windows 10s Hiring/Firing Data storage Blogging Bloatware Programming Managed Service Provder Webinar Storage Taxes IT service Lifestyle Supercomputer Electronic Medical Records Windows 10 Domains IT Budget Vulnerability Reputation Tutorial iOS Managed IT Services Buisness Webinar Shadow IT IT solutions Relocation Microblogging Youtube Gift Giving Sales