Hackers are currently evaluating which networks to hit next

Posted by Mary Scott Nabers on Tuesday, May 8th, 2018

Written by Mary Scott Nabers
President and CEO, Strategic Partnerships Inc.

Code on screen, representing ransomware and hacking - courtesy of Pexels.comIn March, the city of Atlanta, Georgia, was given an ultimatum – pay unknown hackers $51,000 or lose access to all internal files. There are a couple of lessons to learn from this unfortunate situation.  Hackers look for networks with critical, time-sensitive data and they love to attack cities.

The city of Atlanta did what most cities would do…they chose not to pay the ransom.  However, the city ended up paying about four times as much to restore its systems. Ransomware attacks are multi-million-dollar crimes and they are becoming more common every day.

Ransomware infects more than 100,000 computers each day. The Federal Bureau of Investigation reports 3,000 ransomware reports last year and says that individuals may have paid out as much as $24 million to hackers.  The official reports normally involve ransomware attacks on large organizations or public entities. Payments for ransomware attacks are reaching $1 billion – yet, many companies and organizations remain completely vulnerable.

Most governmental entities have taken major precautions but many remain vulnerable because of a lack of funds.  Public entities usually have a policy not to pay ransoms but, as in Atlanta’s situation, officials realize that the fix may be considerably higher than the ransom request.  A few years ago, hackers lowered their ransom requests hoping that would escalate payments.  Many do pay the ransom but at least one in every five times, those who pay the ransom don’t get their files back.

Because government now puts more data on the same network, ransomware attacks are more frightening and usually more costly. Everything that touches citizens can be impacted by a cyberattack – traffic lights, online payment systems, air traffic at airports, security systems, emergency response, cameras, education and health care. Getting hacked is one of the greatest fears for public officials.

While most IT personnel say they can detect a ransomware attack, only 28 percent say they have the ability to prevent one. Hackers prefer to victimize organizations with an abundance of critical, time-sensitive data.  That’s because these are the most vulnerable targets and the most likely to pay quickly.

In January, a SamSam attack hit Hancock Health, locking the hospital’s computers that contained patient data. Hackers gained access to the system by using a vendor’s username and password. Given the time-sensitive nature of the information, the hospital system felt it had no option other than to pay the ransom, and it did – about $55,000. 

A misconfigured web server led to a SamSam attack on the Erie County medical center. The ransom request was $44,000 and a decision was made not to pay. That decision cost the medical center 227 times more than the requested ransom. Internal audits and emergency procurements cost the medical center $10 million to get back online and the whole process took about six weeks.

The now infamous Colorado attack on the state’s Department of Transportation (CDOT) took 2,000 employees offline for over a week. Attackers demanded about $325,217. CDOT officials publicly said they did not pay the ransom but officials have not reported how much it cost the agency to get back online or how the attack occurred.

In December 2017, attackers locked down Mecklenburg County, North Carolina’s, computer system demanding $23,000. The county refused to pay and was left without access to its computers for over two weeks, causing issues for their property tax deadline. Now the county’s IT department says it needs $2 million to update its cybersecurity policy, monitoring response and network policies.

Incidents like this are all too common.  Paying a ransom request only encourages more hackers to get into the game.  Not paying, however, almost always costs many times more.

What can be done? Some large companies hire a software firm to test their own employees to catch any who might click on a suspicious link, open an unfamiliar document or click on an unfamiliar web site.  That’s too costly for most, so here are a few basic instructions – and these rules should apply to organizations of all sizes:

  • Ongoing employee communication is critically important. Schedule security awareness campaigns. Employees must be aware of what can happen if they are careless.  Most hackers are aided by human error, weak network rules or users who don’t consistently obey the rules.
  • Training of all users should be ongoing and the training should include helping all users know how to recognize suspicious emails links or web sites.
  • Use anti-virus software on all computers.
  • Get a network audit, develop a cybersecurity plan and keep all security software very current.
  • Appoint a security team to oversee internal policies, recommend additional training and to be responsible for updates to cybersecurity efforts.
  • Backup all data regularly – daily is best.
  • Spend what you must to prevent cyberattacks – otherwise don’t be surprised if you pay much more if hackers find you.

Let’s don’t let the hackers profit at the expense of taxpayers.  Let’s encourage public officials to spend whatever it costs to protect public data and government networks.  Upfront costs are much less than the costs to recover from cyber breaches.

Mary Scott Nabers is president and CEO of Strategic Partnerships Inc., a business development company specializing in government contracting and procurement consulting throughout the U.S. Her recently released book, Inside the Infrastructure Revolution: A Roadmap for Building America, is a handbook for contractors, investors and the public at large seeking to explore how public-private partnerships or joint ventures can help finance their infrastructure projects.

Tags: , , ,

Comments are closed.

Follow InfraUSA on Twitter Facebook YouTube Flickr

CATEGORIES


Show us your infra! Show us your infra!

Video, stills and tales. Share images of the Infra in your community that demands attention. Post your ideas about national Infra issues. Go ahead. Show Us Your Infra!  Upload and instantly share your message.

Polls Polls

Is the administration moving fast enough on Infra issues? Are Americans prepared to pay more taxes for repairs? Should job creation be the guiding determination? Vote now!

Views

What do the experts think? This is where the nation's public policy organizations, trade associations and think tanks weigh in with analysis on Infra issues. Tell them what you think.  Ask questions.  Share a different view.

Blog

The Infra Blog offers cutting edge perspective on a broad spectrum of Infra topics. Frequent updates and provocative posts highlight hot button topics -- essential ingredients of a national Infra dialogue.


Dear Friends,

 

It is encouraging to finally see clear signs of federal action to support a comprehensive US infrastructure investment plan.

 

Now more than ever, our advocacy is needed to keep stakeholders informed and connected, and to hold politicians to their promises to finally fix our nation’s ailing infrastructure.

 

We have already engaged nearly 280,000 users, and hoping to add many more as interest continues to grow.

 

We require your support in order to rise to this occasion, to make the most of this opportunity. Please consider making a tax-deductible donation to InfrastructureUSA.org.

 

Steve Anderson

Managing Director

 

SteveAnderson@InfrastructureUSA.org

917-940-7125

InfrastructureUSA: Citizen Dialogue About Civil Infrastructure