Contact us today!
(732) 291-5938
facebook twitter linkedin The Connection RSS Feed

The Connection Blog

The Connection has been serving the Hazlet area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

The culprits behind the attack, the hacker group SamSam, are known for meticulously selecting targets that they are fairly confident will pay up when faced with a ransomware attack. Even the mayor of Atlanta was intimidated enough by the attack as to compare it to a kidnapping or hostage situation. Access to important data, files, and applications hung in the balance, and the downtime caused by this incident led to considerable trouble for countless government officials and citizens. Technology has become such an integral part of running governments and businesses that even the slightest issue could have echoing repercussions, so you can imagine the shock and horror in the wake of this ransomware attack.

Even more horrific is the ransom demanded by the hackers that exceeded $51,000 in Bitcoin. Ransomware is known for locking down files and waiting for a payment from the victims before unlocking them. This particular strain of ransomware replaces the names of all affected files with the phrase “I’m sorry” and demands that the ransom be paid in a week.

By working with the technicians at Dell SecureWorks, Atlanta is back on its feet, but not without suffering considerably from the ransomware attack. It’s not clear if Atlanta will pay up for the release of its data, and confidentiality agreements mean that Dell SecureWorks will not reveal any information about their relationship to the attack. But one thing is painfully clear in the wake of such destruction: trying to pay the problem away can be just the beginning of ransomware issues.

For example, if you pay a ransomware developer for the safe return of your files, you might be funding further attacks on other victims. This is counter-productive to the security-minded culture of the business environment. Instead, it’s better to take preventative measures such as implementing data backup and disaster recovery, as well as identifying threats before they have a chance to become a problem. If you are ever struck by a ransomware attack, it’s better to reach out to an IT provider before committing to any payments to hackers. It’s better to try just about any alternative before investing in something that isn’t even a guaranteed fix.

To improve network security and enable preventative solutions, reach out to The Connection. Our trained and trusted technicians will work toward ensuring your network is airtight. To learn more, reach out to us at (732) 291-5938.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 24 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!


Tag Cloud

Digital Automation Meetings Paperless Office Virtualization Cost Management Upgrades Piracy Hosted Solutions BYOD Modem Relocation Quick Tips Collaboration Hackers Mobile Data Apple Writing Efficiency Windows 8 Taxes Software Tips Technology Laws iPhone Phishing Smart Technology Office Tips IT Technicians Computer Repair Flexibility Server Gadget Staffing User Shortcut Office 365 WannaCry PDF Heating/Cooling Network Security Public Speaking Alerts Applications Identities Outlook Windows Presentation VPN Managed IT Services Address Mobile Device Management Smartphones Cortana Internet Exlporer Politics Nanotechnology Sync Compliance Administration Best Practices Hiring/Firing Spyware SharePoint Solid State Drive Productivity Going Green Telephony Google Files Search Intranet Mobile Security Lithium-ion Battery Redundancy Miscellaneous Social Networking Tech Support Phone System Computer Care Google Maps Email Migration Physical Security Tracking Software Maintenance Technology Tips Best Practice PowerPoint Managed IT Technology Managed IT services Running Cable Wearable Technology Consumers Business Technology Save Money Computer Safety Website Knowledge User Tips Operations Comparison Settings Innovation Cookies Wireless Technology End of Support Domains Health Specifications Vendor Management Gmail Antivirus Disaster Resistance Business Growth Downloads Servers Server Management IT solutions Mobile Computing 5G Buisness Printer Education Fraud Mouse Privacy Corporate Profile Password Staff Web Server Internet of Things Cooperation Google Wallet Network App Wireless Consultation YouTube Typing Refrigeration Security Error 3D Printing Government Cyber Monday Robot IT Support Deep Learning Hard Drives Gadgets Superfish BDR Risk Management Hacker Regulations Samsung Travel Cleaning Data Digital Payment Unified Threat Management Cabling Hard Disk Drive Android Administrator The Internet of Things Apps Motion Sickness LiFi Alert Mobility IT Budget Scary Stories Virtual Private Network Statistics Augmented Reality Chromebook Data Management Analyitcs Blockchain Business Management Cybersecurity Monitors Managed IT Service Two-factor Authentication Data loss Halloween Public Cloud Malware Update Scam Dark Data Big Data Data Warehousing Bandwidth Business Intelligence Downtime Co-managed IT VoIP Motherboard User Error Encryption Bring Your Own Device Unsupported Software Data Security Mobile Device Websites Disaster Recovery Patch Management Google Drive Business Owner Artificial Intelligence Save Time Internet Budget Wi-Fi Net Neutrality Office Electronic Medical Records Cybercrime communications VoIP Social Microsoft Office Application Personal Information Break Fix Hosted Solution Microsoft How To Business Computing Crowdsourcing Computing Business Hacking Mobile Office How To Twitter Assessment Proactive IT Communication Word Law Enforcement Holiday Supercomputer Saving Money Black Market Social Media Virtual Reality Emoji CIO Money Project Management Current Events Router Upgrade Network Congestion Bluetooth Telephone Systems IT Management Access Control Point of Sale Tip of the Week Drones Windows 10 Distributed Denial of Service IT Services Experience Help Desk Touchscreen Botnet Network Management Spam File Sharing Vulnerability Hardware Tablet Disaster Browser Cloud Facebook Remote Monitoring Lenovo Data storage Managed Service Provider HIPAA Private Cloud Small Business Work/Life Balance Document Management Troubleshooting Language IT Consultant IT Support Backup Marketing USB Mobile Devices WiFi Mirgation Printing Content Filtering Environment Data Backup Digital Signature Multi-Factor Security Mobile Device Managment Trending Information Technology Mail Merge Legislation IT Consulting Smartphone Documents Processors Cameras Business Continuity IP Address Identity Time Management Google Docs Outsourced IT Networking Social Engineering Saving Time Users Infrastructure Storage Retail G Suite Permissions Legal Humor Remote Computing Data Breach Google Calendar Programming Webcam Cloud Computing Competition Techology Black Friday Data Recovery Firewall Fun Tip of the week Chrome History Customer Relationship Management Automobile Bitcoin Workplace Tips Passwords Firefox IBM Recovery Sports Computers GPS Hotspot Tech Term Virtual Desktop Avoiding Downtime Virus Cryptocurrency Customer Service Notifications Unified Threat Management Ransomware Identity Theft Licensing Display Alt Codes Entrepreneur Chatbots Analytics Microsoft Excel Dark Web Hacks Employer-Employee Relationship IT service Machine Learning Uninterrupted Power Supply Productivity SaaS Operating System Training CCTV Software as a Service Unified Communications Laptop Undo Computing Infrastructure Windows 10 eWaste Backups

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...