Would You Survive a Cyberattack?
For over a month you’ve heard about the threat Iran poses to U.S. businesses. Have you taken steps to prepare? According to FEMA, 90% of small businesses fail within a year, if it takes them more than 5 days to re-open after a disaster. Thinking “It won’t happen to me” is easy now, but won’t help you if a worst-case scenario unfolds.
As the Cybersecurity and Infrastructure Security Agency (CISA) detailed in their alert, previous Iranian targets include the financial sector, a dam in New York and a corporation in Las Vegas. Even if your business isn’t directly targeted, you can still anticipate an impact from the Iranian cyberterrorism threat. A large vendor you work with, like Microsoft, might be targeted and take systems offline, or an attack might have a reverberating impact on the economy that you need to be ready for.
Build your cyber incident response plan now.
Video: Why Choose DiamondIT as Your IT Service Provider
Follow These 3 Examples and Beat Cybercriminals
1. Enloe Medical Center’s systems shut down by cyberattack
A ransomware attack brought down the systems and phones at Enloe Medical Center. Fortunately, the Chico-area hospital was prepared for such an incident and was able to quickly restore critical systems. Their backups allowed patient care to continue uninterrupted.
Enloe Medical Center’s ability to continue caring for patients and rapidly respond to the incident underscores the importance of having dependable backup and disaster recovery solutions in place.
2. L.A. phishing attack comes up empty
Phishing emails landed in the inboxes of more than two dozen L.A. County employees. This wasn’t the first time the county was targeted. But unlike in previous attacks, this time no employees fell for the scam. The attempted hack was quickly discovered, and there were protocols in place to stop the threat.
Enroll your team in security awareness training and learn how to spot fake emails. It’s one of the most cost-effective tools in your security arsenal. Plus, training is often required for cyber insurance policies.
3. Cybercriminals look to check out more than books at Contra Costa County Library
The next time you think you don’t have any data worth stealing, consider whether you store any names, addresses, birth dates or phone numbers. That’s all the personal information Contra Costa County Libraries hold. To their surprise, they were victims of an attack that took some of their services offline. The library isolated impacted servers, disconnecting them to prevent the ransomware from spreading. They then notified members about the attack.
Continual monitoring and quick action are essential for containing breaches. Our SecureCentric solution adds layers of security to our client’s organizations. Our tools monitor and patch systems as well as actively hunt down threats. Discover how we’ll protect your business.