6: Ransomware Revisited – It’s Not a Matter of If, But When
July 6, 2021
Ransomware revisited - another attack exposes vulnerabilities

Ransomware is back in the news. Over the July 4 holiday weekend, small businesses around the world were targeted by hackers demanding ransoms. These supermarkets, schools, libraries, and dentists were unfortunately vulnerable to an attack such as this, which is more common than you would imagine. And this case shows these are skilled, persistent and determined criminals.

In today’s episode I recall another ransomware attack and answer a couple of key questions that may be going through your mind. Firstly, you may be wondering, how did hackers break through our systems? Unfortunately, the personal experiences we have had with these bad actors were related to systems where we had suggested upgraded security, but for one reason or another the clients hadn’t yet implemented our suggestions.

And another big question, one we hear all the time, is, “How do I know they will hand over the encryption keys when we send the money?” The answer is simple, they want to keep getting paid for similar activities in the future. They are afraid that if they don’t hand over they keys when they get the cash, those who are hacked will stop handing over the money. Which is true.

Network security is a big deal. Hackers are out there and if you leave the door open, they will come on in and hold you hostage. Listen in and if you have any questions give us a call. We’re happy to answer any questions and give a recommendation if you think this could happen to you.

Host info

Kelly Herrod, the founder and CEO of Herrod Technology, started the company in 2000 to provide simple IT solutions for small and mid-sized businesses. His personal approach, over 30 years experience and his ability to simplify IT sets him apart in the IT industry.

Thanks for listening! Don’t forget to subscribe on Apple Podcasts, Spotify, Google, or Stitcher. (Or your favorite podcast app.) If you like what you heard, please leave a review on iTunes and share what you liked about the show.

Latest Episodes

16. Having A Great Relationship With Our Customers Is Key

I can't remember any meeting I've ever sat in with a potential client who asks us about our certifications. Most of our clients don't even know what those certifications are, or what's required to get that certification, and how it applies to them. When I was at EDS,...

15. Multifactor Authentication Could Save Your Bacon

Two-factor authentication or multifactor authentication is making a huge push over the past couple of years, but it's been around for a while. The reason it's making such a big push here lately is because Microsoft is starting to push that out to their Office 365...

14. Do Your Laptops Have Encryption Enabled? They Should!

Your phone and tablets, those are a little easier to secure in that most people either have a pass code or face ID or fingerprint identification. That's pretty secure. That's about as secure as it can get out there. You can do face ID on your laptop with Windows now,...

Subscribe
Stories of Life and Business on Apple Podcasts
Listen to Stories of Life and Business on Spotify
Listen to Education Evolution on Stitcher

Related Posts

15. Multifactor Authentication Could Save Your Bacon

15. Multifactor Authentication Could Save Your Bacon

Two-factor authentication or multifactor authentication is making a huge push over the past couple of years, but it's been around for a while. The reason it's making such a big push here lately is because Microsoft is starting to push that out to their Office 365...

14. Do Your Laptops Have Encryption Enabled? They Should!

14. Do Your Laptops Have Encryption Enabled? They Should!

Your phone and tablets, those are a little easier to secure in that most people either have a pass code or face ID or fingerprint identification. That's pretty secure. That's about as secure as it can get out there. You can do face ID on your laptop with Windows now,...

13. Password Best Practices for Ultimate Security from Hackers

13. Password Best Practices for Ultimate Security from Hackers

When it comes to passwords, there's some pretty hard and fast rules on what you should and shouldn't use as far as length of password and types of characters. What I like to tell people, and what even a lot of our business clients have started doing, is use a Password...

Subscribe for Podcast Announcements and New Episodes, Along with Information Tech and Cybersecurity Tips!

* indicates required
~

Your email is safe and secure.