https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2022 Winter Showcase
    • IWCE 2023 Pre-event Guide
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2023 Pre-event Guide
    • IWCE 2022 Winter Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

View From The Top


Commentary

3 tips for mitigating the ransomware threat to government offices

3 tips for mitigating the ransomware threat to government offices

  • Written by Rich Clark / Ontario Systems
  • 9th March 2020

In 2019, more than 140 local governments, hospitals, and police stations fell victim to malicious ransomware attacks. Various cities across Louisiana, Texas, and Florida are among many that have appeared in the headlines. This particularly malicious type of cybercrime has become a global issue whose reach and impact continue to grow. Recent reports claim ransomware damages could cost the world $20 billion by 2021.

Cybercriminals are continuously adapting and refining their strategy, making ransomware attacks very difficult to prevent and expensive to resolve. More recent attacks have targeted small and midsize local governments, with data and operations severely compromised and ransom demands frequently in the tens of thousands of dollars.

Guarding against ransomware can be substantially more difficult for local and county government agencies, which are often smaller and operating with less sophisticated IT systems. To mitigate the risk and limit the fallout of ransomware attacks, public officials must understand the threat, shore up internal defenses, and plan an effective response.

The Basics of Ransomware

Let’s start with an overview of how these attacks work. Ransomware is a type of malware that encrypts mission-critical data such as personal information and financial records to make them inaccessible to the organization that owns the data. Once cybercriminals have the information locked down, they demand a ransom before returning access to victims by way of a decryption key.

How do cybercriminals access data to begin with?

Malicious code can enter a system a variety of ways; among the most common are email attachments and phishing emails with embedded links. Once activated by click, open, or download, this code will then instruct the host system to run the ransomware code.

How vulnerable are most organizations to ransomware attacks?

The short answer is, frighteningly so. The average employee receives more than 120 emails per day, and any of these emails can contain malicious code. It takes only one employee responding to one wrong email to unleash ransomware and potentially bring operations to a halt.

Why not just pay the ransom?

Many smaller government agencies feel the only way to respond to a ransomware attack is to pay the ransom. But your odds of resolving the issue this way are slim. In fact, studies show that fewer than a third of organizations that pay cybercriminals recover access to their data.

Rather than simply caving to cybercriminals’ demands and hoping for the best, I recommend taking the following steps to lower your risk for an incident and to get your system up and running more quickly if an attack occurs.

To read the complete article, visit American City & County.

Tags: Critical Infrastructure Cybersecurity Enterprise Federal Government/Military Incident Command/Situational Awareness Networks & Systems Commentary News Commentary Policy Public Safety Security Software Standards State & Local Government System Design System Operation Tracking, Monitoring & Control View From The Top Commentary

Most Recent


  • Researchers uncover RaaS affiliate distributing multiple ransomware strains
    A new threat group is leveraging a relatively large network of malicious servers to distribute and manage multiple ransomware families including prolific ones such as ALPHV, Quantum, and Nokoyawa. The group has been active since at least June 2022 and appears to have links to the operators of Cl0p, Play, Royal, and Cactus ransomware families […]
  • FCC Chair starts process to restore Title II authority over ISPs
    FCC Chairwoman Jessica Rosenworcel said the agency will begin a proceeding to restore the FCC’s authority under Title II of the Communications Act, reestablishing oversight over broadband companies and enacting nationwide net neutrality rules. In a speech at the National Press Club on Tuesday, Rosenworcel announced her plan to hold a vote on a notice […]
  • Sean McDevitt appointed to FirstNet Authority board
    U.S. Secretary of Commerce Gina Raimondo today announced the appointment of commercial communications veteran Sean McDevitt as the latest board member for the FirstNet Authority, which oversees the development of the FirstNet nationwide public-safety broadband network. “It is with great pleasure that I announce the selection of Mr. Sean McDevitt to serve on the FirstNet […]
  • Cisco drops $28 billion on Splunk acquisition
    Cisco plans to bring on data mining and cybersecurity company Splunk for $28 billion, according to an announcement today. This is Cisco’s largest-ever acquisition and the latest in a string of cybersecurity-related acquisitions, according to CNBC. Splunk monitors and analyzes enterprise customer data to reduce the threat of security breaches and remediate threats. Cisco said the acquisition […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • 3 tips for mitigating the ransomware threat to government offices
    Newscan: Feds recover millions from pipeline ransom hackers, hint at U.S. Internet tactic
  • Cyber is the new Cold War, and AI is the arms race
  • Microsoft patches 6 zero-day vulnerabilities under active attack
  • IoT connectivity spending climbs as COVID-19 cases decline

Commentary


Better technology can help solve the public-safety staffing crisis

26th June 2023

Updated: How ‘sidelink’ peer-to-peer communications can enhance public-safety operations

  • 1
27th February 2023

NG911 needed to secure our communities and nation

24th February 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.