Right now, there’s a crypto-locked server in the lab in our Kinetics Auckland Office.
It’s not from one of our clients, but a business that’s come to us, after the event, asking for help. We are busy rebuilding it and restoring the data and configuration to the server and businesses PC’s.
They have insurance, but that also added to their downtime. The insurance took all the client’s kit and did a heap of forensic investigation before releasing it for rebuild. Only then did it come to us. By the time we finish rebuilding, this company will have been without a system for two or more weeks.
Don’t let ransomware happen to you!
In our busy work lives, with all the various challenges that compete for our attention, it is easy to forget that crypto-locking is real and very disruptive. As I drove into the Kinetics office this morning, I heard on the radio that reported ransomware attacks in New Zealand have doubled every year since 2019.
Email-based fraud might be more common and can cost a lot of money, but a ransomware attack can kill a business.
We are also hearing examples of insurance companies checking that organisations have taken reasonable care before they settle claims. All businesses need a managed-cyber-security regime, like KARE for Security, that is multi-layered, and designed to reduce your risk.
No one can promise to prevent you from being hacked, but we can promise to reduce your risk and make it less likely.
We know this is frustrating, and even more so that, as the hackers become more sophisticated, the protections you use have to increase, and that slowly increases costs as well.
The good news is that we know it works. For example, we recently had a KARE for Security client with one of our KARE supplied Firewalls. They had a cyber-event – a “bot” on their network. Our KARE tools sent us an alert and we jumped straight in. We quickly we found that they had given their WiFi key to a visitor, and that visitor’s laptop was infected! The good news is that KARE for Security was able to protect the client, and that having a separate ‘guest’ network for visitors protected the business as designed. (Never give a visitor with an unknown device access to your production WiFi network)