Network Synergy Blog

Network Synergy has been serving the Trumbull area since 1988, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

The culprits behind the attack, the hacker group SamSam, are known for meticulously selecting targets that they are fairly confident will pay up when faced with a ransomware attack. Even the mayor of Atlanta was intimidated enough by the attack as to compare it to a kidnapping or hostage situation. Access to important data, files, and applications hung in the balance, and the downtime caused by this incident led to considerable trouble for countless government officials and citizens. Technology has become such an integral part of running governments and businesses that even the slightest issue could have echoing repercussions, so you can imagine the shock and horror in the wake of this ransomware attack.

Even more horrific is the ransom demanded by the hackers that exceeded $51,000 in Bitcoin. Ransomware is known for locking down files and waiting for a payment from the victims before unlocking them. This particular strain of ransomware replaces the names of all affected files with the phrase “I’m sorry” and demands that the ransom be paid in a week.

By working with the technicians at Dell SecureWorks, Atlanta is back on its feet, but not without suffering considerably from the ransomware attack. It’s not clear if Atlanta will pay up for the release of its data, and confidentiality agreements mean that Dell SecureWorks will not reveal any information about their relationship to the attack. But one thing is painfully clear in the wake of such destruction: trying to pay the problem away can be just the beginning of ransomware issues.

For example, if you pay a ransomware developer for the safe return of your files, you might be funding further attacks on other victims. This is counter-productive to the security-minded culture of the business environment. Instead, it’s better to take preventative measures such as implementing data backup and disaster recovery, as well as identifying threats before they have a chance to become a problem. If you are ever struck by a ransomware attack, it’s better to reach out to an IT provider before committing to any payments to hackers. It’s better to try just about any alternative before investing in something that isn’t even a guaranteed fix.

To improve network security and enable preventative solutions, reach out to Network Synergy. Our trained and trusted technicians will work toward ensuring your network is airtight. To learn more, reach out to us at 203.261.2201.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, July 17, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab

QR-Code dieser Seite

Sign Up

  • First Name *
  • Last Name *

      Blog Categories

      Scheduling Macro Tech Support Tutorials Net Neutrality Application IT Management Managed IT Services Antivirus Mirgation Private Cloud Disaster Resistance Mouse Files Office 365 Firewall Holiday Skype Undo Hosted Solutions Computer Care Google Wallet Router G Suite High-Speed Internet Work/Life Balance Scary Stories Virtualization Debate Printing Alert Unified Threat Management Server PowerPoint Saving Money Hard Drive IT Consulting Windows Shortcut Cryptocurrency Managed IT Service Humor Entrepreneur Flexibility Deep Learning Collaboration Project Management Google Calendar Best Practices Travel Mobile Technology Domains Hacks People Point of Sale Text Messaging Samsung Managed IT services Automobile Bring Your Own Device Applications Technology Tech Term Chatbots Utility Computing Email Business Owner IBM YouTube Fun Piracy Health Document Management End of Support Phishing Law Enforcement Streaming Media Patch Management Experience Internet CCTV Fax Server History Running Cable Microsoft Office WiFi Touchscreen Consultation communications Office Tips Webinar Computer Accessories Black Friday Wireless Technology Time Management Compliance Consumers Downloads Relocation Drones Mobile Devices Operating System Operations Smartphone Logs IT Solutions Word Android Tip of the week Crowdsourcing Mobile Device Management IT Technicians Content Filtering Sync Taxes Fraud Value Blockchain IT budget Password Technology Tips Cybercrime Safety Monitors Productivity Migration Bitcoin Virtual Reality Cabling Apple Telephone Systems Cables Data Warehousing Windows 10 eBay Managing Stress Computing Infrastructure Data Loss Software Administration Internet of Things HIPAA IT Consultant Proactive IT Documents BDR Upgrades Malware Specifications Internet Exlporer Marketing Distributed Denial of Service IT Support Users Server Management Staff Legislation Money Bandwidth Spyware Training Enterprise Resource Planning Outsourced IT Google Servers Mobile Device Windows 10 IT service Gaming Console Chrome Permissions Access Control Encryption Chromebook Sports Saving Time Management Mobile Security Administrator IP Address Business Continuity Employer-Employee Relationship Troubleshooting Miscellaneous Presentation Spam eWaste Crowdfunding Statistics Lenovo Network Security Intranet Network Congestion Printer Microsoft Excel Charger Co-managed IT PC Care Healthcare Comparison Secruity Solid State Drive Supercomputer Cooperation Development Address Best Practice Business Backups Processors Mobile Computing Scam File Sharing App Display SaaS Managed IT Workplace Tips Augmented Reality Vendor Management Vulnerabilities Website Virtual Desktop Legal Telephony Security Heating/Cooling Search Hacking Hackers Modem Machine Learning Business Intelligence Identity Big Data Data Backup Identities Facebook 3D Printing Social Networking Avoiding Downtime Conferencing Save Money Laptop Save Time Buisness USB Mobile Office Business Technology Network Innovation Cloud Government Tip of the Week Cyber Monday Upgrade Corporate Profile Alt Codes Google Docs Electronic Medical Records The Internet of Things Gadget Google Maps Networking Star Wars Mail Merge Typing Disaster Google Drive Company Culture Social Budget Computer Physical Security Staffing Customer Service Halloween Wearable Technology LiFi Computing Wi-Fi 5G Ransomware Enterprise Content Management Environment Trending Automation Paperless Office Remote Computing Bluetooth VoIP Print Server Virtual Private Network Screen Reader Backup Cybersecurity SharePoint Data Security Business Computing Motion sickness Politics Storage Cookies 3D Digital Signature Managed Service Provider Web Server Office Gmail Network Management VPN Hardware Settings Writing Leadership Going Green Notifications Robot BYOD Infrastructure Remote Monitoring User Tips Cleaning Refrigeration Online Currency Virus Windows 8 Software Tips Meetings Apps Tracking Current Events Recycling Hiring/Firing Multi-Factor Security Competition IoT Smart Tech Cameras Information Technology Efficiency Computer Repair Quick Tips Outlook Start Menu User Error IT Services Law Firm IT Google Analytics Best Available Service-based Business Redundancy Windows 8.1 Update Two-factor Authentication Geography Public Cloud Retail Data Error Cortana Downtime Privacy Tablet IT Support Public Speaking Food Technology Laws Excel Congratulations Digital Payment Data Management User CrashOverride Uninterrupted Power Supply Software as a Service Customer Relationship Management Websites Business Management PDF iPhone Data Breach Hacker Black Market Unified Threat Management Tip of the Work Personal Information Work Station Memory Break Fix Smartphones Browser Twitter Productivity Identity Theft Cloud Computing Nanotechnology Dark Web Unified Communications Data Recovery Communication Analyitcs Cost Management Hard Drives Wireless Botnet Business Growth Superfish Webcam Recovery Vulnerability Mobile Mobility Assessment Trainging Artificial Intelligence Disaster Recovery Data storage Knowledge Programming Social Media Thank You Inbound Marketing Lithium-ion Battery Computers Video Surveillance Battery Education Motherboard Hotspot Firefox Connectivity Maintenance Cache Wires Microsoft Digital Gadgets Remote Support Language CIO Unsupported Software Smart Technology How To Help Desk Alerts Phone System Licensing Hosted Solution Techology Passwords LinkedIn Emoji GPS Regulations Small Business Mobile Data Hard Disk Drive Social Engineering Risk Management

      Latest Blogs

      The Internet of Things means a lot more than just enhanced connectivity. In particular, you’ll have a considerable security risk associated with the Internet of Things. It’s clear ...

      Latest News

      Our Site Has Launched!


      Welcome to Our New Site!
      We are proud to announce the unveiling of our new website at Network Synergy!

      Read more ...

      Contact Us

      Learn more about what Network Synergy can do for your business.


      Call us today    203.261.2201

      Fax Number :    203-261-2935

      126 Monroe Turnpike
      Trumbull, Connecticut 06611

      facebook twitter linkedin #youtube