{"id":264,"date":"2021-06-21T22:28:14","date_gmt":"2021-06-21T22:28:14","guid":{"rendered":"https:\/\/rm73v2idht.onrocket.site\/?p=264"},"modified":"2022-11-22T18:49:16","modified_gmt":"2022-11-22T18:49:16","slug":"how-can-ransomware-affect-my-law-firm","status":"publish","type":"post","link":"https:\/\/blog.integrityfirstins.biz\/?p=264","title":{"rendered":"How Can Ransomware Affect My Law Firm?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2021\/06\/How-Can-Ransomware-Affect-My-Law-Firm-blog-1024x1024.png\" alt=\"What is ransomware?\" class=\"wp-image-265\" srcset=\"https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2021\/06\/How-Can-Ransomware-Affect-My-Law-Firm-blog-1024x1024.png 1024w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2021\/06\/How-Can-Ransomware-Affect-My-Law-Firm-blog-300x300.png 300w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2021\/06\/How-Can-Ransomware-Affect-My-Law-Firm-blog-150x150.png 150w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2021\/06\/How-Can-Ransomware-Affect-My-Law-Firm-blog-768x768.png 768w, https:\/\/blog.integrityfirstins.biz\/wp-content\/uploads\/2021\/06\/How-Can-Ransomware-Affect-My-Law-Firm-blog.png 1080w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>With the multitude of ransomware attacks that have been in the news recently, we\u2019ve been receiving various questions surrounding this topic.\u00a0 So, we wanted to clear up any confusion on this topic.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">First of all, what is ransomware?<\/h2>\n\n\n\n<p>As the name suggests, it is software that can hold your individual computer or your business\u2019 entire system for ransom.&nbsp; A cyber thief will take control of your network and not relinquish control until you have paid the requested amount.<\/p>\n\n\n\n<p>According to Chainanalysis, which is a blockchain research firm, ransomware attacks are up over 340% in the past year.\u00a0 Over $400 million dollars have been paid in ransoms.<\/p>\n\n\n\n<p>The average ransom amount has been on the rise over the past few years.\u00a0 In 2021, the average ransom requested is over $50,000.<\/p>\n\n\n\n<p>Naturally, this leads us to the question of \u201cHow does ransomware get on your computer or in your network?\u201d<\/p>\n\n\n\n<p>The most typical way hackers accomplish this is via phishing emails.&nbsp; These emails will pretend to be from an authoritative entity, like your bank or PayPal.&nbsp; In reality, they are just posing as them and hoping to get you to enter your username and password into an online form that they created.<\/p>\n\n\n\n<p>Now, according to security company SecureAuth, more than 50% of people use the same password for multiple accounts.&nbsp; Thus, if a hacker can get one username and password combination from you, there\u2019s a 50% chance that it can be used for all accounts that are associated with you.<\/p>\n\n\n\n<p>Another common way that a ransomware attack occurs is through tricking you or your employees into downloading a piece of malicious software.\u00a0 The download could appear to be a pdf or some other innocuous file type.\u00a0 Once it\u2019s in your system, it works like a virus.\u00a0 It will lock everyone out and demand a payment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What happens if you refuse to pay?<\/h2>\n\n\n\n<p>If you choose not to pay the ransom, there are a few different scenarios that could happen.<\/p>\n\n\n\n<p>Scenario 1 \u2013 They move onto the next victim.&nbsp; This is the best-case scenario and leaves you in a position of having to restore your system.<\/p>\n\n\n\n<p>Scenario 2 \u2013 They discover that you won\u2019t pay, so they leak private information about you or your clients online.&nbsp; Depending upon what type of data you store, this could prove to be a huge blow to your reputation.<\/p>\n\n\n\n<p>Scenario 3 \u2013 They discover that you won\u2019t pay, so they decide to make their money a different way.\u00a0 They sell the private data of you and your clients on the dark web.\u00a0 Again, depending upon what type of data you have, they could make more money this way than if you decided to pay.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">So, how can you protect yourself and your business from this type of attack?<\/h2>\n\n\n\n<p>There are 5 very clear steps for you to take to accomplish this goal.<\/p>\n\n\n\n<p>Step 1 \u2013 Make sure that your entire system is backed up nightly offsite and off-network.&nbsp; You should retain at least 2 weeks of full backups (or a month if you have the digital space).&nbsp; This way, if the code doesn\u2019t attack right away, you have the option of multiple data sets.<\/p>\n\n\n\n<p>Step 2 \u2013 Have a plan in place for restoring from a backup in 24 hours or less if possible.<\/p>\n\n\n\n<p>Step 3 \u2013 Train your employees to recognize cyber threats in all forms.&nbsp; There are many cyber training programs available that will send tips, tricks and quizzes on a monthly basis.<\/p>\n\n\n\n<p>Step 4 \u2013 Keep your antivirus and firewall software up to date.&nbsp; You will see some added protection if you get your employees to use a VPN as well.<\/p>\n\n\n\n<p>Step 5 \u2013No system is impenetrable and many times, human error is the cause.&nbsp; Purchase a standalone cyber insurance policy to guard against this.&nbsp; Most cyber insurance policies cover this type of attack and provide the support to get you back up and running smoothly.<\/p>\n\n\n\n<p>Have questions about any of these steps or how to purchase a cyber policy?&nbsp; Contact INF at 412.563.2106.&nbsp; We can get you a policy in less than a week!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the multitude of ransomware attacks that have been in the news recently, we\u2019ve been receiving various questions surrounding this topic.\u00a0 So, we wanted to clear up any confusion on this topic. First of all, what is ransomware? As the &hellip; <a href=\"https:\/\/blog.integrityfirstins.biz\/?p=264\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-264","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=264"}],"version-history":[{"count":1,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/264\/revisions"}],"predecessor-version":[{"id":266,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=\/wp\/v2\/posts\/264\/revisions\/266"}],"wp:attachment":[{"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.integrityfirstins.biz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}