More than 4 Billion Records Stolen in First Half of 2019

1. 20 Texas cities attacked by ransomware

The City of Borger, along with 20 other Texas municipalities, recently suffered a ransomware attack that disabled the city’s ability to conduct business. The attack was part of a targeted effort, and it cut off access to basic city services like public records, bill payments and communications systems. The city has been able to restore several functions without paying the ransom, but several services remain unavailable.

Many public entities such as cities and counties struggle to implement adequate cyber security solutions. DiamondIT works closely with municipalities to manage their networks within restrained budgets and long planning cycles.

Do You Know the True Cost of Cyberattacks?

Cities, enterprises, nonprofits, small businesses and your organization are all united by one commonality: the threat cybercriminals pose. A successful attack harms more than your finances and will impact every facet of your business. 60% of small businesses will close after being hit with a cyberattack. The right IT investments prevent attacks and limit downtime and damage during a worst-case scenario. Below are 4 costs to consider and the solutions you can use to protect your business.

Cyber Security Best Practices to Protect Against Hackers

1. Thousands of Los Angeles police caught up in data breach

The Los Angeles Police Department personnel records were hacked into in July. The breach went undetected until the cybercriminals contacted them to let them know names, partial Social Security numbers, dates of birth and other personally identifying information from the department were now available through “external sources.” PII for 2,500 LAPD officers was compromised along with about 17,500 records of LAPD’s Candidate Applicant program.

Every day, more experienced hackers and sophisticated phishing schemes invade businesses across California. You can’t afford to sit back and hope you have enough protection against hackers. Download your free copy of DiamondIT’s ebook: “Detect and Prevent Cybersecurity Threats to Your Business.”

2.  City of Lodi confirms ransomware behind computer troubles

Lodi city employees received ransomware emails with attachments appearing to be invoices. The malware disabled the city’s phone lines, financial data systems and other computer systems. The hackers demanded $400,000 in Bitcoin as ransom; Lodi officials declined to pay.

Balancing limited resources with cyber security best practices is complex. DiamondIT works with city and county organizations across Central and Southern California to secure government entities: Check out our solutions here.

Disasters are Unpredictable – Do You Have a Recovery Plan?

A business owner runs through the street as buildings burn around him. He clutches his business’ server in his hands as he runs, searching for safety.

Sounds like the opening to an end-of-the-world movie, right? Unfortunately, this happened last year to a large medical center with numerous locations around California during the Santa Barbara fires. Because he didn’t have a disaster recovery plan in place, this business manager did the only thing he could think of to protect his data – unplug his server, grab it and run.

2019 Cyberthreat Predictions

Cybercrime is not a new problem, but one that keeps evolving as technology itself progresses.  As we enter into 2019, the cybercrime conundrum continues: it is not a matter of IF a company or institution will be targeted by cybercriminals, but WHEN.

Multi-Factor Authentication is a Practical Way to Protect Against Cyber Threats

The government is doing it.

Major healthcare centers are doing it.

Private businesses are doing it.

Everyone should be doing it, in fact. That is, implementing multi-factor authentication (MFA).

Hey, You! Get Off of My Cloud

  In conversations about cloud computing, people tend to refer to the tool as “The Cloud” which implies that somewhere out there in the virtual world is a single place where all data and online apps live. Actually, there are many cloud services available. In fact, the virtual world can be downright overcast with the number of cloud choices.

Cloud computing gives businesses access to data, apps, services and files anywhere, anytime. The problem is – what if it also allows access to anyone?

The Cloud especially improves team collaboration when a business has multiple locations or even numerous employees working on the same project in the same location but on individual devices. Teams that use social technologies like cloud collaboration tools have raised their productivity over 20 percent.

CyberSecurity Trends – A Year in Review

Now that we are a few months into 2018, security analysts are able to look back on 2017 and analyze leading cybersecurity trends. Not surprisingly, according to the Cisco 2018 Annual Cybersecurity report, there was an elevenfold increase in malware last year.

“Adversaries are becoming more adept at evasion— and weaponizing cloud services and other technology used for legitimate purposes,” the report declares.

The following are some of the major cybersecurity trends of 2017:

Ransomware Families Up 32%, Total Ransomware Threats Down 41%
According to Dark Reading, the growth in ransomware attacks hit a plateau, while the number of ransomware families rose considerably. As cybercriminals become more adept in targeting individuals and organizations, the variety of ransomware attacks are evolving. Not surprisingly, the WannaCry variant dominated the landscape – making up 57% of all ransomware detected last year.

Don’t Trade Security for Wi-Fi Connectivity – Top Ten Threats to Your Wi-Fi Network

The ability to connect to the Internet anywhere and at any time has made a business Wi-Fi network a necessity for most organizations. With benefits ranging from increased productivity to improved customer satisfaction, implementing a wireless network for your employees and guests is no longer just an option. It’s pretty simple to enable Wi-Fi, just walk into any retail store or office lobby and you’ll find a long list of available connections. However, keeping the network secure is the real challenge.

Cybersecurity Spending is on the Rise in 2018 – Invest in Peace of Mind

It seems a full week can’t go by without another headline about an organization getting breached. Whether it’s a new phishing scheme, a major malware attack on a city municipality or a strategic ransomware threat, the dangers are real, and the costs can be extraordinary. The cybersecurity landscape continues to evolve and as modern technology advances, security threats do as well. What protections do you need in place for you to sleep better at night?