{"id":9749,"date":"2022-07-29T12:24:52","date_gmt":"2022-07-29T00:24:52","guid":{"rendered":"https:\/\/kinetics.co.nz\/?p=9749"},"modified":"2022-07-29T12:24:52","modified_gmt":"2022-07-29T00:24:52","slug":"what-can-you-expect-if-you-get-crypto-locked","status":"publish","type":"post","link":"https:\/\/new.kinetics.co.nz\/?p=9749","title":{"rendered":"What can you expect if you get crypto-locked?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>!Right now, there\u2019s a crypto-locked server in the lab in our Kinetics Auckland Office.<\/p>\n<p>It\u2019s not from one of our clients, but a business that\u2019s come to us, after the event, asking for help. We are busy rebuilding it and restoring the data and configuration to the server and business&#8217;s PC&#8217;s.<\/p>\n<p>They have insurance, but that also added to their downtime. The insurer took all the client\u2019s kit and did a heap of forensic investigation before releasing it for rebuild. Only then did it come to us. By the time we finish rebuilding, this company will have been without a system for two or more weeks!!<\/p>\n<h2>Don\u2019t let ransomware happen to you!<\/h2>\n<p>In our busy work lives, with all the various challenges that compete for our attention, it is easy to forget that crypto-locking is real and extremely disruptive. As I drove into the Kinetics office this morning, I heard on the radio that reported ransomware attacks in New Zealand have doubled every year since 2019.<\/p>\n<h3>Email-based fraud might be more common and can cost a lot of money, but a ransomware attack can kill a business.<\/h3>\n<p>We are also hearing more examples of <a href=\"http:\/\/kinetics.co.nz\/are-you-meeting-the-requirements-of-your-cyber-insurer-and-are-you-minimising-your-risk-anyway\/\">insurance companies checking that organisations<\/a> have taken reasonable care before they settle claims. All businesses need a managed-cyber-security regime, like <a href=\"http:\/\/kinetics.co.nz\/cybersecurity\/\">KARE for Security,<\/a> that is multi-layered, and designed to reduce your risk.<\/p>\n<p>No one can promise to prevent you from being hacked, but we can promise to <strong>reduce your risk and make it less likely<\/strong>.<\/p>\n<p>We know it&#8217;s frustrating that as hackers become more sophisticated, the protections you use have to increase, which slowly increases costs as well.<\/p>\n<p><strong>The good news is that we know it works.<\/strong> For example, we recently had a KARE for Security client using one of our KARE supplied Firewalls. They had a cyber-event &#8211; a \u201cbot\u201d on their network. Our KARE tools sent us an alert and we jumped straight in. We quickly we found that they had given their WiFi key to a visitor, and <strong>that visitor\u2019s laptop was infected<\/strong>! The good news is that KARE for Security was able to protect the client, and that having a separate \u2018guest\u2019 network for visitors protected the business as designed. (Never give a visitor with an unknown device access to your production WiFi network)<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text _builder_version=&#8221;4.17.4&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2>So, what should you do when you are the victim of a cyber-attack?<\/h2>\n<p>Firstly, make contact with your IT support, and set up an emergency response team.\u00a0 Most insurance includes some recovery expertise, so they should be one of your first phone calls.<\/p>\n<p>Secondly, the team needs to contain the breach. How large is it, what is impacted, and how can you be sure that the vulnbnerability is no longer present and the hackers can&#8217;t get back in?\u00a0 For\u00a0 example, you may want to turn things off and isolate them on their own network away from your &#8216;clean&#8217; IT assets, and lock out all user credentials that aren&#8217;t absolutely needed.\u00a0 \u00a0Start changing passwords for the remaining users.<\/p>\n<p>Next, consider the Privacy Act, and your obligations to communicate with any stakeholders whose data has been impacted.\u00a0 You might need to work with your HR team where your people are concerned , and your comms or PR support as you reach out to larger groups of people.<\/p>\n<p>At all times, remember that you are not alone! Every organisation is under the same threat and many blue-chip names have succumbed, in some cases more than once.\u00a0 All any of us can do is reduce the risk, and to do so within the budget that fits your tolerance for risk and cost.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>!Right now, there\u2019s a crypto-locked server in the lab in our Kinetics Auckland Office. It\u2019s not from one of our clients, but a business that\u2019s come to us, after the event, asking for help. We are busy rebuilding it and restoring the data and configuration to the server and business&#8217;s PC&#8217;s. They have insurance, but [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":9754,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,5],"tags":[],"class_list":["post-9749","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-security"],"_links":{"self":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/9749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9749"}],"version-history":[{"count":0,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/wp\/v2\/posts\/9749\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=\/"}],"wp:attachment":[{"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.kinetics.co.nz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}