Dallas Ransomware Attack

Most people do not routinely fret over cybersecurity issues, or worry about all of their personal data being used or stolen. The average person may go through their entire life without ever having any real issues about identity theft, much less issues of concern about online and internet security.

 

Recent events that directly impact more than 2000 Dallas employees may be a good opportunity to increase awareness and understanding about the importance of cybersecurity. Any time data is shared online it is at risk of being abused. In most cases, there is a dependence on the frequently visited social media websites and “third-party apps” to protect the data that is freely shared with little extra thought.

 

More than 2400 Dallas employees were recently reminded that nobody is totally immune from online security issues, even if they do not personally actively engage in online activities. If there is any consolation here, it is that not only will people be more aware of the need for internet security, and that no personal data was compromised in this particular case.

 

Ultimate Kronos Group is among the largest human resource companies in the world and was recently hit by a ransomware attack, disrupting the accounting and record keeping for local Dallas employees. A ransomware attack is one in which malicious code is inserted into a computer network. The computers are then locked out remotely, disabling the ability of computer operators to use their own computer systems.

 

As the name also implies, the operators will remain locked out of their computers until such a time as a ransom has been paid. This is of course, depending on the hackers being “honest” insofar as they will actually release the computer systems. Though in reality, if the hackers did not release the computers, it would become increasingly less likely that corporations and even governments caught in such attacks would continue to pay the exorbitant ransoms so often demanded.

 

According to the Ultimate Kronos Group, efforts are already under way to resolve the issues, and they have declared that paychecks will go out on time, even if not wholly accurate. They further stated that there would be an open period for resolution in the coming weeks in order to allow for any adjustments in payroll accounts that may have not been properly factored.

 

What are the lessons that can be learned from this attack? For the average computer user, it is extremely important to back up all of your data. Secondary and external hard drives are an increasingly inexpensive solution. Cloud based technologies like Google Drive also offer free or inexpensive options for data backups.

 

Other helpful hints for computer users include never clicking on links sent via email. Spoof sites or websites that look like Amazon may not necessarily be the Amazon website, and clever hackers can easily fool the casual user into entering sensitive information that they can then use for more nefarious purposes at the expense of the user.

 

Type the website address in to the address bar or search the website on Google, Bing, or Yahoo search engines to be sure you are directed to the proper websites. Never store your passwords on the web browsers, and ensure you have a wide selection of complex passwords that will be more difficult to hack.

 

Igmv1stk(it2ndg)fagnCS(aMES) is a good example of a more safe and secure password. How to remember such passwords is a good question as well. In this case, I got my very 1st kiss (in the 2nd

grade) from a girl named Connie Stevens (at Milford Elementary School). Virtually everyone has events that they may remember, be it the first time something happened, or an important date with an important event.

 

Passwords such as this are seemingly random, and much more difficult for “Blunt Force” programs to hack. While there is never any guarantee that your data will not be stolen, even for people who do not normally use computers, steps like these can keep even the common computer user more safe when they do actively participate in online activities.

 

Previous
Previous

State 5A Football History

Next
Next

The Infamous History of Clyde Barrow and Bonnie Parker