Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • Technology Trends Shaping the Future of Government
    • World of Work
    • Your Digital Transformation Path Starts Here
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Uncategorized

Ransomware Targets Local Governments. Here’s How They Can Fight Back

by GTI Editors
April 4, 2018
in Uncategorized
Reading Time: 4 mins read
A A
Share on FacebookShare on Twitter

Ransomware is a worldwide threat, targeting large corporations down to home users. But in a disturbing trend, attacks are frequently being committed against all levels of local governments, from the city of Atlanta, Georgia to school systems in Montana and South Carolina. Ransom demands in these cases range from several hundred to tens of thousands of dollars to unencrypt the data.

As Maureen Gray, COO of Blue Ridge Networks, a Virginia-based cybersecurity firm, explains, it’s a matter of opportunity. “To a hacker, they seem like the proverbial ‘low-hanging fruit.’  Local governments may not have the same level of cybersecurity as state or federal agencies or large corporations can employ, as they just don’t have the same funding available,” Gray explained.

Governments have the additional burden of delivering uninterrupted services to the public. A hack can interfere with operations from licensing and trash collection all the way to public safety and health. So, some local governments have chosen to pay the ransom.

That goes against the recommendations of law enforcement and many cybersecurity experts. But, if it comes down to a few thousand dollars versus spending millions to recreate the data and recover from the hack, why not just pay up?

Gray said there are two key reasons. “First, it encourages the hackers to continue trying to extort money from you and other victims. Second, there’s no guarantee you’ll get your data back, your systems are still compromised, and realistically, you’ll still have weeks or months of cleanup to do.”

No one is immune to these threats, Gray said, but added that including a layer of defense on top of common security best practices can mitigate these types of breaches. “Typically, the first step in cyber best practices is to seriously examine your network for obvious vulnerabilities. Are you running the latest operating systems everywhere, and have all security patches been applied? Are your users’ passwords strong? Is your data regularly backed up? And are you engaging your users to help maintain security?” Often, the answer to a lot of these questions is no. Updating, patching, and backing up data are all time-consuming and tedious tasks that even some of the largest organizations’ IT teams have trouble keeping up with. To alleviate some of the strain, organizations need to look to implement a non-intrusive breach prevention system that mitigates these vulnerabilities without depending on critical security patches, scanning, or updates.

A good deal of malware gets onto a network through a simple click – a user clicks on a link in an email or visits a website that downloads code to the user’s system. That code proliferates quickly, often spreading throughout the network in a matter of minutes.

The risks are increased by mobile device usage. “Smartphones, tablets and laptops come in and out of the network from both employees and third-party vendors or contractors,” Gray said, “and that means more opportunities for malicious code to slip past the network’s protections.” She also pointed to home computers and USB flash drives as a source of attacks. “If you log in remotely or copy files from an infected system and move them onto a clean one, it opens the door to a ransomware attack.”

For local governments looking to step up their cybersecurity posture, Gray says security tools need to keep up with the attacks. She suggests that endpoint security should be considered as part of the strategy. “By implementing a breach prevention tool that stops breaches before a compromise occurs, without the need for scanning or detection, you can render malicious code harmless early and actively prevent it from executing and doing any damage to the enterprise network.”

Her advice to local governments? “Think of security as a way of life,” Gray explained, “It’s an ongoing battle, but in the end, the right policy, the right tools and the right attitude from your users can give you the advantage.”

 

Ready for the next level of endpoint breach prevention? Click here to find out more.

Tags: endpoint securityLocal Government RansomwaremalwareMaureen GrayMobile Device MalwareRansomwareRansomware Attack AtlantaSurviving a ransomware attack

RELATED POSTS

collaborating on cybersecurity
Cybersecurity

Collaborating on Cybersecurity Best Practices Enables Federal Agencies to Combat Global Threats

March 8, 2023
Whole-of-State Security Might be the Key to Stronger Cyber Defenses for State and Local Governments
Cybersecurity

Whole-of-State Security Might be the Key to Stronger Cyber Defenses for State and Local Governments

January 4, 2023
Building Resilience Against Ransomware: A Guide for Public Sector Agencies
State & Local

Building Resilience Against Ransomware: A Guide for Public Sector Agencies

August 31, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    9327 shares
    Share 3731 Tweet 2332
  • Fixed Wireless Access: Communications Infrastructure Podcast for the Public Sector

    73 shares
    Share 29 Tweet 18
  • Laid-off Tech Workers Find Unexpected Opportunities with Federal Government Contractors

    11 shares
    Share 4 Tweet 3

CONNECT WITH US

Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisment Banner Ad Advertisment Banner Ad Advertisment Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2023 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us