Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

30 Schools Shut Down In Montana After Cyber Attack

30 Schools Shut Down In Montana After Cyber Attack

Students generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

TheDarkOverlord Solutions also went as far as to make graphic death threats against the children attending the schools, taking advantage of the memory of recent school shootings. This hack resulted from the Columbia Falls district server being targeted, which contained all sorts of personal data belonging to residents of the school district. This includes addresses, medical histories, behavioral history, and other information that’s helpful to cybercriminals. Thanks to these events, 30 schools closed and canceled any weekend activities. When class resumed, there was much more security than before.

TheDarkOverlord Solutions, true to its name, targets individuals that have particularly lucrative data on the line. In July 2017, they were responsible for a major information harvest from healthcare providers which resulted in almost 9.5 million records going up for sale on the black market. These records were reportedly stolen from a clinic, a healthcare provider, and a health insurance provider.

This same group also reached out and made their name known by stealing media from Netflix. The popular series Orange is the New Black was released prior to its actual release date, thumbing the nose of the audio post-production studio that provided a ransom of $50,000. It just goes to show that you can never trust a thief!

Therefore, all signs point toward the Columbia Falls school district to not pay the ransom demanded of them. They made the correct choice by not giving in to the demands of hackers, as there is no reasonable expectation that they will actually hand over their data. If they do decide to pay the ransom, it’s money that’s just going toward funding further ransomware attacks. Plus, if they are willing to pay, it just shows that the tactic actually works.

The best way to stay secure is to protect your organization against all types of threats. To learn more, reach out to Telesys Voice and Data at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Wednesday, 20 November 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Network Security Internet IT Services Computer Windows 10 Managed Service Provider Productivity Data Backup Backup Ransomware Innovation Business Continuity Mobile Devices Outsourced IT Android Hardware Smartphone Google Managed IT services Social Media Data Recovery Efficiency Upgrade User Tips Disaster Recovery Browser Communication Data IT Support Workplace Tips Small Business Business Management Cloud Computing IT Support Managed IT Services Data Management App Smartphones Microsoft Office Internet of Things Office Phishing Remote Monitoring Miscellaneous Server Holiday Windows Network Paperless Office Password Facebook communications WiFi Office 365 Artificial Intelligence Gmail Big Data Save Money Apps Encryption VoIP Cybersecurity Tech Term Spam Passwords Apple Bandwidth Robot Firewall Windows 10 Collaboration Saving Money Document Management Hosted Solution Recovery Customer Relationship Management Employer-Employee Relationship Unified Threat Management Risk Management Avoiding Downtime Word How To Government Hacker Money Managed IT Mobile Device Management Infrastructure Customer Service Work/Life Balance Operating System Content Filtering Tip of the week Remote Computing Downtime Wi-Fi Office Tips Vendor Management Compliance Chrome Analytics Computers Health Mobile Device Antivirus Applications Redundancy Windows 7 Virtual Reality Hacking Training Mobile Computing Project Management Data loss SaaS Tech Support BDR BYOD Education Business Technology Cybercrime Telephone Systems Presentation Business Growth Social File Sharing Website Vulnerability Help Desk Outlook Automation Going Green Data Security Alert Healthcare Two-factor Authentication Settings Printing Data storage Managed Service Computing IT Management The Internet of Things Business Owner Augmented Reality Computer Care Net Neutrality IBM Running Cable Marketing Proactive Smart Technology Tablet Software as a Service Remote Monitoring and Management Bring Your Own Device HIPAA Search Router Sports Competition Mobile Security IT service Automobile Upgrades Cortana Budget Virtualization Information Technology Administration End of Support Humor Mouse IT solutions Safety Analyitcs Legal Wireless Technology Patch Management Solid State Drive Display Wireless Access Control Scam Laptops Identity Theft Twitter Politics Monitors Specifications Travel YouTube Google Drive VPN Websites Unified Communications Physical Security Assessment Taxes Licensing User Server Management Virtual Private Network Botnet LiFi Consultation Digital Payment Samsung Retail Maintenance Regulations Best Practice Meetings Storage Lithium-ion battery Legislation Address Corporate Profile Relocation MSP Voice over Internet Protocol Operations Electronic Medical Records Social Networking Halloween Google Wallet DFW IT Service Refrigeration Proactive IT Quick Tips Webcam Remote Work History Crowdsourcing Recycling Favorites Dark Data WannaCry Private Cloud Deep Learning Wearable Technology Fun Motherboard Scary Stories Drones IT Consulting PowerPoint Time Management Point of Sale File Management Cabling Management Conferencing Internet Exlporer Mobility Consumers Error Manufacturing Staffing Distributed Denial of Service Undo Data Breach Network Management Telephone Enterprise Resource Planning Employees IP Address data services Technology Tips VoIP WPA3 Alt Codes Gadgets GPS IT Technicians Google Maps Update Modem Managed IT Service eWaste Technology Laws Touchscreen Web Server Mobile VoIP IT Sevices Disaster Mobile Zero-Day Threat Hotspot Mobile Office User Error Comparison Lenovo Digital Administrator Fleet Tracking Typing Proactive Maintenance Tracking 3D Printing Mirgation Chromebook Cookies Buisness Break Fix Environment Unified Threat Management Cameras Shortcut Uninterrupted Power Supply Law Enforcement Company Culture Backup and Disaster Recovery Network Congestion Language Printer Black Friday Superfish Spyware Asset Tracking Cryptocurrency Processor Unsupported Software Migration Knowledge Emoji Nanotechnology Dark Web Troubleshooting business communications systems CCTV Gadget Vulnerabilities RMM Computing Infrastructure Experience Hacks Cyber Monday How To Remote Workers Bitcoin Mobile Data Chatbots IoT Data Warehousing Internet Protocol Phone System Heating/Cooling Hard Disk Drive Geography Procurement Alerts SharePoint Identity Current Events flu season Networking Firefox Information Windows 8 Active Directory Supercomputer G Suite Processors Utility Computing Microsoft Excel Domains VoIP streamlines Servers Downloads Entrepreneur Cables Remote Worker Cooperation 5G Fort Worth Application Motion Sickness Monitoring Windows Server IT Budget Users Google Docs Blockchain Public Speaking business network infrastructure Multi-Factor Security Wires Professional Services Writing Staff Personal Information flu shot Techology Electronic Health Records User Management IT Consultant Software Tips Cost Management Cyberattacks Permissions iPhone Statistics Google Calendar Mail Merge Machine Learning Virtual Assistant Social Engineering Flexibility Computer Repair Laptop Fort Worth IT Hard Drives Disaster Resistance Batteries Cleaning Notifications Hard Drive Virtual Desktop Bookmarks Fraud Bluetooth

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code