Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

The culprits behind the attack, the hacker group SamSam, are known for meticulously selecting targets that they are fairly confident will pay up when faced with a ransomware attack. Even the mayor of Atlanta was intimidated enough by the attack as to compare it to a kidnapping or hostage situation. Access to important data, files, and applications hung in the balance, and the downtime caused by this incident led to considerable trouble for countless government officials and citizens. Technology has become such an integral part of running governments and businesses that even the slightest issue could have echoing repercussions, so you can imagine the shock and horror in the wake of this ransomware attack.

Even more horrific is the ransom demanded by the hackers that exceeded $51,000 in Bitcoin. Ransomware is known for locking down files and waiting for a payment from the victims before unlocking them. This particular strain of ransomware replaces the names of all affected files with the phrase “I’m sorry” and demands that the ransom be paid in a week.

By working with the technicians at Dell SecureWorks, Atlanta is back on its feet, but not without suffering considerably from the ransomware attack. It’s not clear if Atlanta will pay up for the release of its data, and confidentiality agreements mean that Dell SecureWorks will not reveal any information about their relationship to the attack. But one thing is painfully clear in the wake of such destruction: trying to pay the problem away can be just the beginning of ransomware issues.

For example, if you pay a ransomware developer for the safe return of your files, you might be funding further attacks on other victims. This is counter-productive to the security-minded culture of the business environment. Instead, it’s better to take preventative measures such as implementing data backup and disaster recovery, as well as identifying threats before they have a chance to become a problem. If you are ever struck by a ransomware attack, it’s better to reach out to an IT provider before committing to any payments to hackers. It’s better to try just about any alternative before investing in something that isn’t even a guaranteed fix.

To improve network security and enable preventative solutions, reach out to Network Synergy. Our trained and trusted technicians will work toward ensuring your network is airtight. To learn more, reach out to us at 203.261.2201.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 25 April 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Privacy Company Culture Cybersecurity Save Time Infrastructure 5G Remote Monitoring Small Business Cybercrime Smart Tech Recycling Social Networking Cookies Facebook Bandwidth Time Management Recovery Cleaning Humor LinkedIn Laptop Ransomware Apple Gadget Data Management Websites Distributed Denial of Service Start Menu Screen Reader Heating/Cooling Net Neutrality Windows 8 Current Events Augmented Reality Multi-Factor Security Mail Merge Business Management Remote Computing Hard Drives Secruity Data Loss Consumers Data Backup Cameras Scary Stories BYOD Leadership IT service WiFi Mobile Security Business Owner Hotspot Malware Big Data Notifications Outlook Mobile Device Management Knowledge Managed IT Service Antivirus Miscellaneous Router Digital Signature Operating System Data Security 3D Office 365 Food Error Downtime Workplace Tips Consultation Artificial Intelligence Content Filtering Chatbots Entrepreneur Conferencing App Avoiding Downtime Hacks End of Support GPS Upgrades Network Security Backups Connectivity Vendor Management Upgrade Productivity Modem Video Surveillance Computing Infrastructure Superfish Remote Support Encryption iPhone Point of Sale Debate Alt Codes Analyitcs Motion sickness Spyware Refrigeration Server Management Meetings Fun Gadgets Crowdsourcing Virtualization Customer Service Administration IT Consultant Tip of the Week Virtual Private Network Windows 10 Virus CIO Phishing Save Money Memory Education Robot Software as a Service Migration IT Management Networking Virtual Reality Windows 10 Documents Identities Redundancy Relocation Motherboard Emoji Digital Computer Accessories User Supercomputer Managed IT services Techology Administrator Software Tips Wi-Fi Tablet Private Cloud Software Identity Theft Halloween History IBM Google Maps File Sharing IT Support Hosted Solutions Technology Tips Lithium-ion Battery Mouse Best Practices Backup Wearable Technology Nanotechnology YouTube Inbound Marketing Identity Maintenance Microsoft Office Access Control Corporate Profile Automation How To Personal Information Hackers Office Retail Storage IT Consulting Managed IT Printing Google Wallet Phone System Macro Business Technology Telephony Smartphone Excel Dark Web Compliance Work/Life Balance Google Windows 8.1 Update Hiring/Firing Risk Management Paperless Office Chromebook Quick Tips Smart Technology Fraud Customer Relationship Management Budget CrashOverride Mobile Computing Online Currency IT Support User Error Employer-Employee Relationship Vulnerability Intranet Trainging Firefox BDR Network Going Green Permissions Alert Language Managed Service Provider Mobile Devices Lenovo Hardware Office Tips Congratulations Typing Firewall Writing CCTV Sports Samsung Webcam Bitcoin IT Services Unsupported Software eWaste Operations Best Available Cyber Monday SharePoint Sync Public Cloud IP Address Search Efficiency Experience HIPAA Black Market Buisness Disaster Resistance Google Drive Environment Public Speaking Gaming Console PC Care Troubleshooting Unified Threat Management SaaS Assessment Business Computing Network Management Deep Learning Health Thank You Flexibility Print Server Business Project Management Crowdfunding Data Recovery Politics Presentation Mobile Data Botnet Cooperation Google Analytics Computer Repair 3D Printing Mobile Technology Comparison Charger Downloads VoIP Internet Exlporer Chrome Computing Scam Spam Internet Applications Work Station Legislation Automobile Wireless Printer Windows Wireless Technology Cortana Taxes Address Mirgation People Tip of the week PowerPoint Passwords Google Docs Licensing Bluetooth Hacker Mobility Settings Cloud Google Calendar Proactive IT Network Congestion Staffing Physical Security Cryptocurrency Tech Term Social Engineering Machine Learning Scheduling Programming Regulations Marketing Travel Social Data storage Apps Help Desk Holiday Competition Data Warehousing Twitter Unified Threat Management Mobile Device Electronic Medical Records Servers Bring Your Own Device Application Server Law Enforcement Digital Payment Two-factor Authentication Piracy Computer Care Cost Management LiFi Outsourced IT Files Trending Data Disaster Microsoft Tech Support Battery Gmail Technology Laws Password Running Cable Computers Safety Data Breach Legal Blockchain Social Media Smartphones Cloud Computing Shortcut Disaster Recovery Computer Webinar Government Tutorials communications Security Statistics Saving Money Monitors Business Continuity eBay Internet of Things Drones G Suite Business Intelligence Business Growth Solid State Drive IT budget Training Undo Skype Streaming Media Patch Management Staff Service-based Business Uninterrupted Power Supply IT Solutions Web Server Android Technology Value Fax Server Users Touchscreen Mobile Office Unified Communications Website Co-managed IT Communication VPN Hacking Browser Display Telephone Systems Information Technology Black Friday Email Law Firm IT Innovation Break Fix Cabling Tracking Productivity Best Practice Managed IT Services Alerts USB Collaboration Document Management Processors Text Messaging Money Saving Time Virtual Desktop Hard Disk Drive Microsoft Excel Specifications The Internet of Things User Tips Logs IT Technicians Domains PDF Tip of the Work Word Hosted Solution

      Latest Blogs

      It’s critical that you protect your business’ important assets, including perhaps the most important of all: its data. One of the best ways to do this is by implementing a solid ba...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube