Scale and Manage Your Business Before Disaster Strikes

It’s easy to underestimate the impact that technology can have on your business. Most people don’t even realize it until disaster strikes.

That is why we are here to help.  It has been estimated that one in three businesses in NJ have been hit by Cryptolocker or other variants of ransomware. These vary from small to mid-size and even larger organizations in the state. Considering that the vast majority of breaches in NJ are still not reported, this number is staggering. Many businesses have not kept pace with the bad guys in securing their networks, and unfortunately have become victims as a result.

A Case Study

A few years ago, we assisted a local NJ business that came to us after struggling for a week on their own to recover from a ransomware attack. Safeguards were in place, but their security posture lax. The antivirus was renewed religiously every year and it was assumed an old firewall was still protecting them. It was also assumed the computer guy was doing his part to keep the business secure.

They were wrong and ignorance was not bliss. The old, out-of-date firewall provided little protection against current threats. The antivirus was ineffective in stopping the invasive ransomware once the infected email link was clicked. The computer guy was fixing issues as they arose, but they never asked (and he never offered) any sort of upgrades or management of their cybersecurity. The ransomware quickly spread from the lawyer’s PC to the network and soon encrypted the entire server network. An online backup had been established the prior year, but it hadn’t been running in 6 months. No one had bothered to check, and there were no other backups.

By the time the business came to us, there was very little we could do. But if they had reached out to us before this attack, all of this could have been prevented.

Decryption keys are available for some types of older ransomware which makes recovering data fairly easy. However, this strain of ransomware was new and breaking the encryption without the decryption keys is virtually impossible. The FBI recommends against paying a ransom. After all, there is no guarantee you will get your data once you pay. And paying a ransom is also no easy task. Bitcoins must be purchased through a public exchange and then transferred to the bad guys over the “dark web” with the hope you receive your decryption keys. The business decided to pay the ransom as well as restore from the 6 month old backup.

For many of the reported cases of ransomware infections in NJ, we know the businesses were able to restore from backup and therefore, are unconcerned with protecting against future attacks. The thought of confidential client data in the hands of criminals or extended employee downtime or even the fear that the backup may not have been healthy is not enough for many businesses to make a change.

The Moral of the Story

The moral of the story is: Be prepared. Just having a good backup is not the end of the story. According to the NJ Identity Theft Protection Act, all data breaches including ransomware may require a breach notice. Breach notices not only increase the monetary cost of a security incident; they can be devastating to a business’s reputation.wer workloads.

Do not bet the livelihood of your business on a backup. Safeguards are available that can ensure almost zero likelihood of infection at little to no cost. You owe it to your staff, clients and professional reputation to use due diligence in securing your business. Let us help you scale and manage your business before it’s too late. Don’t rely on the “computer guy” – rely on us: a dedicated team of experts. You need to focus on your core business. Ransomware attacks will not only halt your operations, but also possibly ruin your reputation. Find a Cybersecurity expert who can evaluate your current situation, and make sure you are secure.

Want more from your IT provider? We know change is hard.

A conversation is a great place to start. Contact us to set up a call.

Download this post for your personal resources

Endpoint Security

Take the protection of your business to the next level. Many technologists and futurists claim the rate at which humankind evolves flatlines when compared to the evolution of technology. Ray Kurzweil, a renowned scientific thinker, inventor, and futurist, stated that...

Risky Business: Defining 3rd Party Vendor Risk

Hiring third-party vendors to provide services at an affordable rate has gained traction as a major trend among businesses, and exponentially so for businesses in need of IT support. Here’s the catch: “risk” is a pretty broad umbrella term, with no two vendors or regulators defining risk in the same way. To effectively create assessments for third-party vendors, let’s break “risk” down.