Maximize your protection, eliminate business risks.
Optimize and modernize with cloud transformation.
Empower your people to work securely from anywhere.
What it takes to convince leadership that migrating to the cloud is the right move.
Let us handle IT so you can focus on growing your business.
Get multichannel 24/7/365 expert end-user support.
Stay ahead of attacks with 24/7 protection and monitoring.
Maximize uptime with with industry-leading DRaaS.
Improve efficiency, productivity and outcomes with cloud.
Ensure all mobile devices, everywhere, are secure.
Gain a competitive edge with strategic IT solutions.
This battle-tested checklist enables your team to swiftly initiate a ransomware response.
IT for businesses of all sizes, in any industry.
Empower institution growth with custom IT solutions.
Ensure your firm is always in compliance.
Improve patient care and staff morale.
Deal with pressing legal matters, not IT.
Keep up with the evolving digital landscape.
Focus on your mission by outsourcing IT.
Accelerate PE client deals and secure data.
Leverage your technology as a strategic asset.
Execute initiatives and develop IT strategies.
Get the latest industry insights and trends.
Join us at events in person and online.
Hear from clients and learn more about strategic IT.
See how Dataprise can make IT your greatest asset.
Get informative technical resources from IT experts.
Stay on stop of emerging cybersecurity threats.
Discover the key areas of DR your organization needs to address to ensure downtime is minimized.
Gain a strategic asset by bringing harmony to IT.
Ensure 24/7 support and security with dedicated teams.
Drive business forward by partnering with Dataprise.
Meet our one-of-a-kind leadership team.
Discover the recognition Dataprise has earned.
Help us help businesses with strategic IT.
Embracing different perspectives and backgrounds.
Find a Dataprise location near you.
Dataprise is committed to empowering more women to consider a career in technology.
Posts
By: Paul Reissner
Table of content
Businesses must protect sensitive information in the digital frontier now more than ever before. For as long as individuals have owned items of value, others have tried to steal them. Nowhere is this truer than in the American Old West, where savvy and unscrupulous criminals known as “cattle rustlers” stole the livestock and livelihoods of honest ranchers living on the frontier. In today’s world, it’s not too hard to draw parallels between that frontier and the digital frontier of information age cybersecurity. Both are rife with persistent, ever-evolving threats, but offer lucrative rewards to businesses and individuals who can successfully protect themselves and their assets.
Instead of wily and elusive cattle rustlers, modern businesses face the ever-present threat of ransomware attacks; rather than stealing physical assets such as cattle, these attackers are after the sensitive information and data that keeps your business running and gives you a competitive edge. Now more than ever, as your herd of computers roams free in your employee’s home environments, it’s crucial to start preparing to defend your network.
The Digital Frontier
In case you are unfamiliar with the term or missed our previous article covering security exploits, ransomware is a type of malicious software designed to infiltrate a network, prevent access to files or computer systems, and hold this access for ransom. The list of ransomware victims is long and getting longer every day. Most recently, global technology giant Garmin was infiltrated by a ransomware attack at the end of July 2020. The attack disrupted Garmin’s services worldwide, prevented their commercial smartwatches from syncing, and impaired performance of their aviation equipment, not to mention the millions that Garmin may have had to pay in ransom to recover.
Though high-profile attacks get the most news coverage, you don’t need to be a major technology company to be hurt by a ransomware infection; according to Tech Times, as much as 71% of ransomware attacks target small businesses. These information age cattle rustlers often target smaller companies simply because they are less likely to be able to make a recovery and are more likely to pay the ransom. With the average ransomware ransom currently close to $100,000, and a 41% increase in ransomware attacks from last year, the threat has never been more serious. Has your business taken the right steps to protect sensitive information?
Oddly enough, the motivation for hackers to perform ransomware attacks is similar to that of the cattle rustlers of the Wild West: money (ransom payments), valuable assets (data), and fame (covert advertising). Let’s examine each reason in greater detail.
Ranchers, both Old Western and modern, cannot get attached to their cattle. They are there to serve a purpose, to enable the rancher to maintain their livelihood, and not for companionship like pets. Similarly, organizations must treat computers as cattle rather than pets – as tools to an end rather than objects of attachment. This perspective can help you protect sensitive information from malicious attacks. I’m sure many of us have “favorite” tools (I’m guilty of naming screwdrivers), but cybersecurity best practices dictate that we must remain objective about replacing and maintaining our computers. Follow these best practices which foster a “cattle, not pets” culture in your business:
As its name implies, the Wild West was just that – wild. Ranchers living on the frontier had to user their wits to survive and find multiple ways to solve problems; if you’re trying to start a fire and you only have a matchbox, what happens when you run out of matches? Similarly, modern businesses should adopt a “two is one, one is none” mantra when protecting their data in the digital frontier. If you only have one copy of your data, it might as well not exist- it could be stolen, lost, or destroyed at any time. But even with one backup copy, organizations are still at risk; many ransomware attacks lock you out of your backups and force you to ransom them back. Thus, an optimal recovery strategy requires multiple copies of the data to be available to you, but hopefully not the bad guys. Achieve this by adhering to the following:
We’ve written previously about the threats to your network, like business email compromise, large data breaches, and core network security. Cyber threats are constantly evolving, and the next security breach is right around the corner. Fortunately, cybersecurity solutions are also evolving, and approaching your organization’s technology culture with the proper “secure mentality” is essential. If your organization successfully follows the two mantras described above and their associated best practices, you can expect the following result from a typical ransomware attack:
Many small to medium-sized businesses may be thinking at this point, “if a multi-billion-dollar international enterprise like Garmin can’t keep the bad guys out, what hope do we have?” The answer may surprise you. For one thing, smaller businesses are nimbler, with a smaller attack surface to manage; you can take meaningful steps to protect sensitive information faster and more efficiently than industry titans. Additionally, the hacker coordinating the attack will often expect smaller organizations to be unprepared, and they are more likely to look for an easier target if they encounter a strong defense rather than doubling down. The best practices covered here will not comprehensively protect you from every threat you may encounter, but they will make you much better equipped to cope with and recover from attacks than those who ignore them.
The first time I encountered a ransomware attack was over a decade ago, but I still remember it like it was yesterday. Thankfully, an offline backup was available on a tape and it was easy for that client to recover to the previous night’s data. It was a small company with less than 25 employees, which imported and resold hats. The cattle rustlers made it into the ranch, but thanks to the backups, no cattle were lost. However, they did get a request to pay a ransom using a new digital currency called “bitcoin”.
As much as things change, I’m always impressed by how much they stay the same.
At Dataprise, we help businesses protect their data from ransomware and other cattle rustlers of the information age. We are not just your fence, but your guards, alarm system, and sheriff. For more information, visit Dataprise Cyber.
INSIGHTS
Subscribe to our blog to learn about the latest IT trends and technology best practices.