Ransomware Lessons for City Governments

By November 11, 2019 Security
Ransomware - Cybersecurity Banner

U.S. towns and cities are being hit hard by ransomware and cyberattacks

A city government’s network is a prime target for hackers. Many small towns and cities don’t have the tools, personnel, or budget to fight back. And when an attack is successful, who is to blame? Cities like Lake City, Florida have been in the news recently for falling victim to devastating ransomware attacks and the consequences afterwards.

Lake City, Florida’s computer network was devastated within hours. Their security and backup defenses were no match for expert hackers and sophisticated spear phishing campaigns. Their budget never extended to cover recommended protection measures that might have saved them hundreds of thousands in ransom money.

Tools to Defend Against Cyberattacks

How do you best protect yourself? How do you prepare so that you can bounce back with minimal damage and minimal loss if the worst happens?

You can protect your critical infrastructure, network, and data, with a full suite of security services. These solutions and tools are ones that you can plan and budget for:

data backupData Backup: A business continuity and disaster recovery (BCDR) solution provides off-site and/or cloud backup. This ensures that you have a safe backup that you can restore if your local network and servers are compromised. A good data backup solution is one of the most highly recommended defenses against cyberattacks, especially ransomware. You shouldn’t be without one.

Breach Prevention Services IconEmployee Security Training: Ransomware attacks like the one that hit Lake City, Florida were successful because multiple employees were fooled by spear phishing emails. Your employees can be your greatest defense if they are educated and trained to recognize and avoid malicious emails and compromising situations.

cyber security network monitoringDevice & Network Monitoring: Don’t just rely on a firewall to keep your network safe from threats trying to get in. You can also monitor inside your network for suspicious activity, including employees making mistakes that might open the door for hackers.

cyber security anti-virus anti-malware anti-spamAnti-Virus / Anti-Malware / Anti-Spam: Like a firewall, good anti-virus, anti-malware, and anti-spam solutions are essential and the bedrock of any security defense. A strong management and monitoring service will provide these services for not just your desktops but also your servers.

What next?

Interested in taking the next step, so your city isn’t the next victim? Ransomware and other cyberattacks are only going to increase, so don’t wait to take action. We’d love to talk to you about the options available and how to design a multi-layered cybersecurity defense for your needs. Contact us today at 888.296.3619 or hello@oxen.tech.


Recent Posts / View All Posts

IT Leadership | Shared CIO

You Need IT Leadership

| Consulting, Leadership | No Comments
Missouri is just beginning to emerge from its stay-at-home order in response to the pandemic threat. Who ever imagined that pandemic planning policies would become a reality? What was once regarded as a threat with low probability of occurrence will likely become a much higher probability as we navigate through the coming years. The realization of this threat has certainly changed the way we view ourselves and the world around us. It has sensitized us to our newfound vulnerability. This month, I am writing to you from the Joplin, MO office of OXEN Technology. Considering our present circumstances, our physical…
Tech Tip Background

Office 365 Tip: Create a file request in OneDrive

| Office 365, Tech Tip | No Comments
If you need to obtain files from various people, you can use OneDrive to create a file request that allows others to upload documents directly to a folder you specify. This gives people a quick way to transfer files to you without giving them view or edit permissions to your OneDrive folder. Here’s how! Note: This feature is not available in Office 365 Government. For file requests to work, your Office 365 administrator must enable Anyone links in OneDrive. Requesting Files Using OneDrive Online, select the folder where you want others to upload their files. Click Request files on the…
Virtual Private Network

What is a VPN and do you need one to work from home?

| Security | No Comments
Since businesses started shifting to remote work due to COVID-19, OXEN has seen a sizeable uptick in requests for purchasing and implementing VPNs for at-home workers. You’ve probably seen that a Virtual Private Network (VPN) connection is often recommended for securely working from home while accessing company resources. So what’s a VPN for in this context, and do you need one? If you’re a business manager, do you need a VPN connection for every employee who’s now working from home? Read on for our tips. What Is a Virtual Private Network? VPN stands for “Virtual Private Network”. It creates a…