4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Cops Lock Up Criminals, Ransomware Locks Up Cops

Cops Lock Up Criminals, Ransomware Locks Up Cops

Society relies on law enforcement to enforce laws in a fair and just manner, but even the police have their work cut out for them when they are targeted by a cyberattack. A recent incident in Cockrell, Texas shows that not even the police are immune to the threats of ransomware--particularly the emerging brand of ransomware, Osiris.

Before you start to panic over a new type of ransomware, you should know that Osiris is a particular strain of the Locky ransomware. The only difference seems to be the file extension for the encrypted files, which is “.osiris.” The main takeaway from this event is that sometimes even the good guys don’t have what it takes to protect themselves from unfortunate events--a truth all-too-painfully real for a business owner.

This type of ransomware attack started off just like any other. Out of nowhere, the police were shown a message that claimed their files had been locked down, with paying a fee of $4,000 being the only way of recovering them. The cause for this ransomware was a spoofed email that claimed to be from another part of the police department. In an attempt to get rid of the ransomware, the police followed what’s commonly called a best practice for this type of situation: restore a backed-up copy of the server’s data.

Unfortunately for them, the backup that they tried to restore from had also been infected, as it was taken after the systems were infected with the ransomware.

As you can imagine, this caused quite a bit of trouble for the Cockrell Police Department. Included in the encrypted files were photographic and video evidence that could have been used in the prosecution of criminals. Whether or not this particular instance will mean anything for legal battles in the future is yet to be determined, but it sure is convenient for those who are involved with them.

What this shows us is that ransomware is a threat for anyone who relies on data to perform their daily duties, businesses notwithstanding. A ransomware attack at the wrong time could be enough to completely upend operations, and it forces you to reconsider your approach to cybersecurity. You need to consider every single user of your email solution is a potential outlet of a ransomware attack. It also emphasizes the importance of keeping current backups archived in an off-site location so that you can guarantee you won’t be put in the same situation as these police officers.

If your business wants to take a stand against ransomware, 4IT can serve and protect you. We can help you implement spam-blocking solutions and security measures to keep ransomware from installing on your devices in the first place. Furthermore, we can help your employees know what to look for so that they don’t make the same mistakes as the Cockrell P.D. To learn more about network security, reach out to us at 305-278-7100.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 21 August 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Best Practices Privacy Microsoft Business Computing Internet software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware IT Services Business Google Efficiency Windows Innovation IT Support Hardware Workplace Tips Disaster Recovery Saving Money Miscellaneous VoIP Business Continuity Virtualization Computer Windows 10 Upgrade User Tips Mobile Devices Data Mobile Device Management Server Mobile Computing Email Network Save Money Network Security Communication Quick Tips Alert Microsoft Office Social Media Smartphones communications BYOD Going Green Mobile Office Information Technology Small Business Office Smartphone Health Apps Gadgets Outsourced IT Android Application Ransomware Operating System Browser Firewall Avoiding Downtime Managed IT Services Disaster Tablet Chrome WiFi The Internet of Things Productivity Remote Computing Managed IT Unified Threat Management IT Solutions Spam Passwords BDR Mobility Search Risk Management Holiday Hacking History Remote Monitoring Best Practice Facebook Data Management Hard Drives Saving Time Telephone Systems Vendor Management Employer-Employee Relationship Budget Automation VPN Wireless Technology Customer Relationship Management Big Data Phishing Password Apple Cybercrime Cybersecurity Hosted Solution Computers Marketing Phone System Recovery Office Tips Current Events Maintenance PowerPoint Antivirus Virus Social Printer USB Content Filtering Law Enforcement Analytics Gmail Router Telephony Bring Your Own Device Proactive IT User Error Lithium-ion battery Humor Collaboration Administration Money Wearable Technology iPhone HaaS Trending Google Drive Education Cloud Computing Net Neutrality Shortcut Business Intelligence Save Time Users Tech Support Windows 8 Social Engineering Outlook Work/Life Balance Encryption Government App Private Cloud Office 365 Cost Management Point of Sale IT COnsultant Intranet Bandwidth Computer Repair Printer Server Laptop OneNote Wireless Unsupported Software End of Support Audit Social Networking Internet Exlporer Display Data Storage Update Customer Service Internet of Things Identity Theft Augmented Reality Biometrics Data Protection Solid State Drive Retail Paperless Office Flexibility Virtual Reality Data Backup Meetings Fax Server Workplace Emails Samsung Instant Messaging Streaming Media Network Congestion HIPAA Entertainment Uninterrupted Power Supply Benefits online currency DDoS Help Desk Computer Accessories hacker Personal Information Mouse Compliance Transportation IT Support Two-factor Authentication Robot Computer Care Battery Managing Stress Efficency SaaS Excel Automobile Data Recovery Books User Sync Smart Technology Video Games Science Virtual Desktop Presentation Website iOS Document Management Managed IT Service Data Breach Bluetooth Advertising Hard Drive Best Available Travel IT Technicians Managed IT Services Legal Touchpad OneDrive Mobile Device Computer Fan Amazon Managed Security Uograde SharePoint Images Scam Co-managed IT Dark Web Screen Mirroring Teamwork Sports Busines Continuity Employer Employee Relationship Worker Commute Networking Operating Sysytem Near Field Communication Ebay Computing Cast PDF Files Windows 10s Scalability Human Resources Wiring IT consulting Nanotechnology Data Security Safety Information Running Cable Text Messaging Chromecast Hard Disk Drive How To Wi-Fi Debate Reliable Computing Upgrades Root Cause Analysis HBO Emergency Artificial Intelligence Administrator Training best practices Bloatware CrashOverride Applications Twitter Colocation Consultant IT Management The Blindside Of Access Company Culture data breach Black Market Surge Protector Settings Politics Television Branding Touchscreen 3D Printing WIndows Server 2008 IT Security Nokia Distributed Denial of Service Cleaning risk management Experience WIndows 7 Inbound Marketing Patch Management Keyboard eWaste Avoid Downtime Regulations ISP Windows 10 Commerce Music Value Regulation Hiring/Firing Data storage Cameras Programming Blogging Vulnerability Domains Adobe Microblogging Youtube Webinar Sales Buisness Taxes Managed Service Provder IT solutions Lifestyle Webinar Supercomputer Electronic Medical Records IT Budget Tutorial Reputation Shadow IT Relocation Storage Gift Giving IT service