Posted on 05/06/2020 2:22:44 PM PDT by karpov
Colleges and universities around the country are proving to be easy prey to hackers with ransom demands. In Massachusetts, Cape Cod Community College was defrauded of $800,000 last year, while Colorados Regis University paid an undisclosed amount to regain access to their files after a ransomware attackand still did not get access back.
Ransomware is a type of malicious software that, once it infects a computer system, allows attackers to lock out victims until they pay a ransom to regain access. With budgets getting tighter for public and private colleges in the wake of the coronavirus, funding IT security could slip through the cracks.
In many ways, a college is an ideal target for hackers. Even a small one has hundreds of people connecting to its network, and many campuses have old machines with out-of-date software used by students and the public. It only takes one person clicking on the wrong email to compromise the entire system. Colleges are a prime environment for these attacks, Jared Phipps, a cybersecurity expert, told Inside Higher Ed.
When a colleges IT system gets compromised, the ransom amount can vary considerably. When the admissions-tracking system at Grinnell, Oberlin, and Hamilton Colleges (which they share) was hacked, aspiring freshmen were offered the chance to see their files for around $4,000, which was later discounted to $60.
In contrast, when for-profit Monroe College was the victim of a ransomware attack, hackers demanded $2 million. Crowder College in Missouri saw a similarly high price tag of $1.6 million to regain control of its system. The University of Calgary and Carleton University in Canada and Los Angeles Valley College paid ransomware demands that cost the schools up to $35,000, according to the cybersecurity company Acronis.
(Excerpt) Read more at jamesgmartin.center ...
iT managers for any government function - state agencies, schools, county governments, etc., should be held financially liable and perhaps criminally negligent for not taking proper precautions with citizen owned data.
Who runs a huge data operation not thinking about buying and implementing basic computer virus and malware defenses to prevent these huge ransomware bribes and payoffs?
So typical. Government workers dont give a damn about the citizens they presumably work for.
And none of them ever get fired or punished.
First the data isn’t citizen owned, it belongs to government
Second Politicians are not even held to this standard, or any government coffee drinker for that matter.
Third These malware attacks that target government and enterprise systems are NOT the same crap that grandma loaded on her peecee by clicking on something. It is an entire different ballgame. These Ukraine/Russian/Eastern Europe hackers are really good, they spend years figuring out a particular target and once they understand their systems they launch an attack. Usually through someone who not knowingly lets them in.
I’m out of the loop.on the latest technology, but, I remember a time when we did backups on our systems, and IT guys backed up the network.
The idea was that everything could be restored from.backup tapes and files if needed.
Do things work differently today? Is it a mot more complicated than simply restoring the backed up data to the system?
Honestly, if the tapes or systems are never tested, 95% chance they wouldn’t have been any good anyways.
Tape drives are known to just stop working and some back up software wasn’t that good anyways
Nice try.
The data IS owned by the citizens. Do you know that we supposedly have a government of the people, and all powers, and assets, belong to the people?
Next, there are defensive software products that can beat the threats you so admire. These government people are too apathetic or cheap to employ the.
I think you are a government worker.
From 10/23/2017, bleeping computer...
No, it is not owned by us, do I have the right to walk on to any army base or into any room or department in any federal building or would I get carried off the property with a summons for trespassing?
No software is fool proof, software is only good for what is known, the unknown is the problem.
So you are telling me that you want some IT Guy or “network administrator” who makes a big giant salary of 71K a year with a federal pension that isn’t going to be worth 12 cents in a decade anyways be personally responsible for data systems that are 3 decades old, software that was purchased by whomever had the best political connections and some screw ball “translation/transaction” servers running Windows that makes these old antique main frames communicate on the internet running cisco routers that were obsolete a decade or so ago. So when one of these ransome wares get in, you want the government to go in, find that guy, seize his Subaru, take his apartment, his box of cornflakes, his stack of porno mags and frog march him out of whatever shiatstain government building he works in and throw him in a cage for the rest of his pathetic loser government employee life because Nancy Pelosi wouldn’t approve an appropriate budget to run these government systems properly because her husband’s company wouldn’t get the contract, never mind the fact that he has zero experience in any of this.
I say, go fuck yourself.
Have a nice day.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.