Maximize your protection, eliminate business risks.
Optimize and modernize with cloud transformation.
Empower your people to work securely from anywhere.
What it takes to convince leadership that migrating to the cloud is the right move.
Let us handle IT so you can focus on growing your business.
Get multichannel 24/7/365 expert end-user support.
Stay ahead of attacks with 24/7 protection and monitoring.
Maximize uptime with with industry-leading DRaaS.
Improve efficiency, productivity and outcomes with cloud.
Ensure all mobile devices, everywhere, are secure.
Gain a competitive edge with strategic IT solutions.
This battle-tested checklist enables your team to swiftly initiate a ransomware response.
IT for businesses of all sizes, in any industry.
Empower institution growth with custom IT solutions.
Ensure your firm is always in compliance.
Improve patient care and staff morale.
Deal with pressing legal matters, not IT.
Keep up with the evolving digital landscape.
Focus on your mission by outsourcing IT.
Accelerate PE client deals and secure data.
Leverage your technology as a strategic asset.
Execute initiatives and develop IT strategies.
Get the latest industry insights and trends.
Join us at events in person and online.
Hear from clients and learn more about strategic IT.
See how Dataprise can make IT your greatest asset.
Get informative technical resources from IT experts.
Stay on stop of emerging cybersecurity threats.
Discover the key areas of DR your organization needs to address to ensure downtime is minimized.
Gain a strategic asset by bringing harmony to IT.
Ensure 24/7 support and security with dedicated teams.
Drive business forward by partnering with Dataprise.
Meet our one-of-a-kind leadership team.
Discover the recognition Dataprise has earned.
Help us help businesses with strategic IT.
Embracing different perspectives and backgrounds.
Find a Dataprise location near you.
Dataprise is committed to empowering more women to consider a career in technology.
Posts
Paul Reissner
Table of content
Have you and your business taken steps to protect against ransomware? Not one day after writing my previous blog article inspired by the Garmin ransomware attack, I found out that another high-profile attack has impacted another major technology company, Canon. My last article, How to Protect Your Ranch, goes into detail about how you can help protect your organization from similar ransomware attacks. In this blog, I want to elaborate on a quote that I heard when I joined the Dataprise CYBER team several years ago: The bad guys have a boss and a budget too.
It may seem simple, but this phrase serves as a powerful reminder of the current state of cyber threats. I remember writing it down on my whiteboard at Dataprise headquarters when I heard it, and it has stuck with me ever since, whether I am assessing a company’s security posture, migrating servers into the cloud, or simply setting up a new computer. As a cybersecurity professional, it is imperative for me to remember that at any given time, there are paid engineers attempting to breach and compromise clients’ networks without their knowledge. my
The days of computer viruses written by a single programmer is over. In their place are organized businesses which exist to pay salaries and make profit just like yours. The business of ransomware is booming, and its one of many tools that enable the “bad guys” to profit from your vulnerabilities. In this article, we’ll provide a high-level overview of ransomware and share some information about resources available to help protect against ransomware.
An Advanced Persistent Threat (APT) is, broadly, a group or company of organized hackers. You could imagine APTs as the ‘Tom Clancy’ or ‘Hollywood’ image of hackers: advanced, highly organized, and well-funded. In the information age, APTs are often associated with – or sponsored by – specific countries (e.g., North Korea, Russia, China, Israel, or the United States), but many operate completely independently. As far as the average business is concerned, an APT should not be viewed as a technical threat, but as a human one. These are organized groups of people using purpose-built threats to meet their quotas and keep their boss happy.
While it may seem difficult to protect against ransomware, it’s much harder to respond to an attack when you weren’t prepared. The recent ransomware attack on Canon was carried out using a type of ransomware called Maze. This relatively new type of ransomware threat has impacted numerous organizations since it was first discovered in November 2019, including the City of Pensacola, Florida (December 2019); LG (June 2020); Xerox (June 2020); and now Canon (July 2020). In response, the FBI has issued a warning to the public sector of active attempts to attack US-based companies through Maze. They requested that affected organizations provide Indicators of Compromise (IOC) from each attack, which are digital fingerprints left behind by ransomware attacks which can help to identify the perpetrator.
But why all the alarm and concern over these Maze attacks? What makes Maze unique is that instead of holding your data for ransom, they exfiltrate the information (or copy it offsite) for later use, including public disclosure.
One of the best parts of the digital frontier is that many software providers (like Microsoft or Adobe), cloud service providers (like Azure and AWS), and MSPs (like Dataprise) can offer their services or products to organizations with an intuitive and predictable monthly subscription model. But, just as Microsoft has realized that they can offer their services at a fixed monthly fee, so have the bad guys. Believe it or not, ransomware as a service (RaaS) has become an increasingly common business model for APTs and other hackers, making it more important that your business takes the proper steps to protect against ransomware.
Anyone with an internet connection and a credit card (including a stolen credit card) can subscribe to a RaaS platform and start holding networks or computers for ransom. RaaS providers even offer service level agreements (SLA) and technical support so that you can get your ransomware business up and running quickly. The practice is so lucrative that one RaaS provider called Netwalker managed to make $25 Million in under five months.
As Sun Tzu said: “To know your enemy, you must become your enemy.” Since committing actual cybercrime is illegal, it’s important to read about these threats to understand how they operate and better protect yourself from them. At a high level, most low-complexity ransomware attacks often include the following:
I’m not a master strategist, and I won’t claim to fully understand the intricacies of business operations and strategy (that’s for the members of our vCIO team). But, as an amateur, at some point, you must take stock of your competition, changing trends, and other threats to your business to stay current in the market. The same principle should be applied to APTs and other cyber threats. Your business may not have the resources of a Garmin or a Canon behind you, but you as a small or mid-market business are probably in a better position implement new, more stringent, security controls compared to a large global enterprise.
By re-framing cyber-threats as business threats, it may be easier for you to develop a comprehensive strategy on how to handle an incident when it happens. It’s no longer a matter of it will happen, but when. Security is a continuous process. It requires the use of complementary administrative controls (e.g., policies, strategy, formalization) and physical controls (e.g., locks, logs, attentive personnel) to ensure that you’re getting the most of your technical tools and taking the right steps to protect against ransomware (e.g., anti-ransomware, mail security, network monitoring). As with all things, when we pull together to work towards a common goal, we’re more likely to succeed.
INSIGHTS
Subscribe to our blog to learn about the latest IT trends and technology best practices.