• Skip to main content
  • Skip to footer

Williams Innovation

Tomorrow’s IT Problems Solved Today.

  • Home
  • About
  • Who We Work With
    • Insurance
    • Medical Practices
    • Small Offices
    • Supplemental IT Support
  • Services
    • Managed IT Services
    • Business Voice Services
    • Email + Security
    • Executive Engineer
    • Cybersecurity Training
  • Read IT
    • FAQs
  • Contact Us

Lessons Learned from an Oil Pipeline Ransomware Attack

June 14, 2021 | Cybersecurity, Innovation, Technology

Your business may not be supplying oil to the United States, and you may not even be in the critical infrastructure business, but do not think that means ransomware cannot happen to you, too. This article shares lessons learned from a headline-grabbing event, and they are applicable to businesses of all sizes in all industries.

First, what happened? The May 2021 ransomware attack crippled a 5500-mile gasoline pipeline. The Colonial Pipeline serves up nearly half of the gasoline used by the East Coast of the United States. The attack thought to be the largest ever on US oil infrastructure, encrypted almost 100 gigabytes of data. Russian hacker group DarkSide took the systems hostage, demanding an undisclosed ransom. The pipeline was offline for days, and the disruption plagued the country for weeks.

The lesson learned? Businesses cannot underestimate the importance of being proactive about preventing cybercriminal attacks. The Colonial Pipeline attack originated in Russia and attacked the US, but the motive was financial. The majority of cyberattacks come down to money. That means your business could be at risk, too.

Lesson #1: Educate employees

Avoid falling victim to a devastating ransomware attack by educating employees about cybersecurity. Train your employees to recognize phishing emails and other scams, teach them about the importance of strong passwords, help them understand the potential dangers of using unsecured wireless networks or unencrypted devices, and prevent their downloading unsanctioned apps onto work computers.

Lesson #2: Use firewalls and email filtering

Configure firewalls to protect your network and block access from malicious IP addresses. Geo-fencing can reduce traffic from foreign actors in known cybercrime hubs.

Additionally, set up advanced spam filters. This helps identify and stop phishing emails before they even get to your employees.

Lesson #3: Limit access

You are thinking you are doing that already with firewalls and filtering, but this refers to limiting access for the people who work for you. Configure credentials so that employees can access only what is needed to do their job. Limiting administrative access makes it more difficult for bad actors to do damage.

Also, limit permissions to reduce access. One employee may need to read certain files but have no need to edit them. Configure the file and directory access accordingly.

Lesson #4: Monitor and patch

Even if you are not online at all hours of the day, you should be monitoring IT 24/7. Set up alerts to identify any suspicious activity. You want to know as soon as possible if there is a vulnerability so your business can limit its exposure.

Also, patch: do not ignore update notifications from your software providers or operating system manufacturers. Every piece of technology in your office could be an entry point for a bad actor. Cybercriminals are always finding new modes of attack and vulnerabilities. You must be vigilant and keep your systems updated to cut your risk.

Lesson #5: Have a backup plan.

If cybercriminals take your system hostage, you do not want to have to pay a ransom. It’s costly, and you can’t guarantee you’ll get a functional system back. You will still suffer downtime and a damaged reputation from the attack.

Having several system backups, tested regularly for accuracy, helps protect you from catastrophe. We recommend a 3-2-1 approach. That is three separate copies of the backup on two different storage types, and at least one of them should be off-site.

Customize your backup plan around the specific needs of your business. One company might be fine backing up daily, whereas another may suffer if it loses even a few hours of data.

Cybersecurity does not have to be complicated.

Ransomware attacks are expensive and time-consuming. Partner with a managed service provider to keep an eye on your systems. Our IT experts can configure protection, track activity, and provide backup solutions. Take preventative action to protect your business against ransomware and other cyberattacks. Work with professionals to install a layered IT security strategy today. Call us today at 737-228-1292!

Footer

  • Home
  • About
  • Who We Work With
  • Services
  • Read IT
  • Contact Us

Contact Us

williams innovation logo

Partners with:

© 2022 Williams Innovation | Privacy Policy | Legal | Built by Hot Dog Marketing

EFFICIENT BUSINESSES RUN ON EFFICIENT I.T.

Download eBook

Learn about IT efficiencies in:

  • Collaboration
  • Automation
  • Analysis
  • Security

Download this useful eBook today.

 

Are You Ready to Manage a Remote Workforce?

Download eBook

Learn six strategies to better manage a remote workforce.

Download this useful eBook today.

        • Encourage Collaboration
        • Improve Productivity
        • Increase Engagement Among Remote Employees