Your business may not be supplying oil to the United States, and you may not even be in the critical infrastructure business, but don’t think that means ransomware can’t happen to you, too. This article shares lessons learned from a headline-grabbing event, and they’re applicable to businesses of all sizes in all industries.

First, what happened? The May 2021 ransomware attack crippled a 5500-mile gasoline pipeline. The Colonial Pipeline serves up nearly half of the gasoline used by the East Coast of the United States. The attack, thought to be the largest ever on US oil infrastructure, encrypted almost 100 gigabytes of data. Russian hacker group DarkSide took the systems hostage, demanding an undisclosed ransom. The pipeline was offline for days, and the disruption plagued the country for weeks.

The lesson learned? Businesses cannot underestimate the importance of being proactive about preventing cybercriminal attacks. The Colonial Pipeline attack originated in Russia and attacked the US, but the motive was financial. The majority of cyberattacks come down to money. That means your business could be at risk, too.

Lesson #1: Educate employees

Avoid falling victim to a devastating ransomware attack by educating employees about cybersecurity. Train your employees to recognize phishing emails and other scams, teach them about the importance of strong passwords, help them understand potential dangers of using unsecured wireless networks or unencrypted devices, and prevent their downloading unsanctioned apps onto work computers.

Lesson #2: Use firewalls and email filtering

Configure firewalls to protect your network and block access from malicious IP addresses. Geo-fencing can reduce traffic from foreign actors in known cybercrime hubs.

Additionally, set up advanced spam filters. These help identify and stop phishing emails before they even get to your employees.

Lesson #3: Limit access

You’re thinking you’re doing that already with firewalls and filtering, but this refers to limiting access for the people who work for you. Configure credentials so that employees can access only what’s needed to do their job. Limiting administrative access makes it more difficult for bad actors to do damage.

Also, limit permissions to reduce access. One employee may need to read certain files but have no need to edit them. Configure the file and directory access accordingly.

Lesson #4: Monitor and patch

Even if you’re not online at all hours of the day, you should be monitoring IT 24/7. Set up alerts to identify any suspicious activity. You want to know as soon as possible if there is a vulnerability so your business can limit its exposure.

Also, patch: don’t ignore update notifications from your software providers or operating system manufacturers. Every piece of technology in your office could be an entry point for a bad actor. Cybercriminals are always finding new modes of attack and vulnerabilities. You have to be vigilant and keep your systems updated to cut your risk.

Lesson #5: Have a backup plan

If cybercriminals take your system hostage, you don’t want to have to pay a ransom. It’s costly, and you can’t guarantee you’ll get a functional system back. You will still suffer downtime and damaged reputation from the attack.

Having several system backups, tested regularly for accuracy, helps protect you from catastrophe. We recommend a 3-2-1 approach. That’s three separate copies of the backup on two different storage types, and at least one of them should be off-site.

Customize your backup plan around the specific needs of your business. One company might be fine backing up daily, whereas another may suffer if it loses even a few hours of data.

Cybersecurity doesn’t have to be complicated

Ransomware attacks are expensive and time consuming. Partner with a managed service provider to keep an eye on your systems. Our IT experts can configure protection, track activity, and provide backup solutions. Take preventative action to protect your business against ransomware and other cyberattacks. Work with professionals to install a layered IT security strategy today.

We found it very easy to work with Underdog. He gave a very clear and professional quote, he has been promptly responsive in all communications, and the network is working great. I feel very good about using his company for any future IT needs for our business.
Pam Watkins, Forks Bistro
Barton Heights had a very successful computer upgrade due to Underdog.  I met with him 2-3 months before the project and he gave us an estimate of the entire upgrade process involving 31 computers and a server.  He advised us and placed the order.  He also worked with us and ended up revising the estimate twice to completely satisfy our computer upgrade needs.  He added true value to his service as he was willing to perform the upgrade in the evening when we were closed to minimize our down time as we are a paperless business and rely 100% on our computers.  Carmine stepped up and took care of those problems as well, even though that was not his responsibility.  He always responds quickly to any issue that occurs.  I would highly recommend him to anyone!
Dr. Jeremy Wentz., Barton Heights Veterinary Hospital

I HAVE WORKED WITH CARMINE FOR MANY YEARS.  HE HAS DONE EVERYTHING FROM NETWORK SERVER INSTALLATION TO PROGRAM TROUBLESHOOTING.  HIS QUALITY OF WORK AND KNOWLEDGE ARE OUTSTANDING.   YOU CAN ALWAYS COUNT ON Underdog TO WORK HARD FOR YOU.

Tim Stump, Shawnee Mountain Ski Area
Underdog makes you feel that you are his first concern if you have a Server down or you have a small printing question.  We have been with Carmine for 16 years and have only received quality service.
Dee McConnel, Straub Metal International
Thank you Underdog.  Will recommend you from the rooftops.
Law Office of Maria T. Candelaria, Maria Candelaria

12 years in business and I have been there and done that with other IT / Computer biz, and finally found one that listens, asks questions, and comes up with a plan.

If you are having issues or just want to see if there are options for and avenues of improvement for your computer / networking needs, checkout Underdog Computer and Network Support LLC.

There are some others that are good, but I cannot express the difference enough – they actually get it! Every business IS different with different needs and processes, and they take the time to find what is best for you instead of what they think is best for you!

Thank you, Carmine J. Corridore, for allowing me to have a stress free vacation this year! I look forward to working with you in the near future for some serious upgrades!

Carollee Streeter Kidd, CLK Transcription

“Underdog Computer and Network Support are amazing. They go over and above to help the small business owner Thank you Carmine for all you do”

Jennifer Narkavich, My Girl Managed Services - Marketing Consultant

Underdog Came out to install our Phone System. They made a complicated process easy. Brian Davis, Full Circle Removal.

Brian Davis, Full Circle Removal

We have used Underdog Computer and Networking for business and personal use.  We have found them easy to schedule an appointment, very responsive, professional, and quick to isolate the problem and/or identify our real need.  We highly recommend Underdog.

Denise Flietman, Spread Eagle Realty

Jill Reeder, Pearl S Buck International

Want More Information Fill out this form

Thank you for your message. It has been sent.
There was an error trying to send your message. Please try again later.

For Immediate Answers to your Questions Click on the Icon in the Lower Right. You can Chat| Video or Call right from this website.