 {"id":32254,"date":"2021-06-07T11:07:35","date_gmt":"2021-06-07T18:07:35","guid":{"rendered":"https:\/\/moderneuc.com\/?p=32254"},"modified":"2026-03-24T14:51:24","modified_gmt":"2026-03-24T21:51:24","slug":"cybersecurity-no-one-is-immune","status":"publish","type":"post","link":"https:\/\/jorgep.com\/blog\/cybersecurity-no-one-is-immune\/","title":{"rendered":"Cybersecurity: No One Is Immune"},"content":{"rendered":"\n<p>Guest Post by Ed Berush<\/p>\n\n\n\n<p><strong>Ed Berusch<\/strong> serves as a consultant and trusted advisor to CIO&#8217;s and CTO&#8217;s with the goal of Simplifying their IT environment. Through my work you can Get IT Faster, Run IT Better, and Grow IT Smarter.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong>Disclaimer<\/strong>: &nbsp;I work for&nbsp;<a href=\"https:\/\/www.dell.com\/en-us\/work\/learn\/by-service-type-deployment\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Dell Technology Services<\/a>.&nbsp; &nbsp; It is my passion to help guide organizations&nbsp; through the current technology transition we call the Digital Transformation specifically as it relates to&nbsp;<a href=\"https:\/\/www.delltechnologies.com\/en-us\/what-we-do\/workforce-transformation.htm\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Workforce Transformation<\/a>.&nbsp; Visit&nbsp;<a href=\"https:\/\/www.delltechnologies.com\/en-us\/index.htm\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Dell Technologies<\/a>&nbsp;site for more information.&nbsp; Opinions are my own and not the views of my employer.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p>Today I write about the uptick of recent cybersecurity incidents reported in the news as of late.    The list is long and it has affected business  of all sizes and in all industries.     The sophistication of the attacks, and vulnerabilities  they uncovered  are only one side of the coin.    Many of them are now truly affecting many lives, and livelihoods.    <\/p>\n\n\n\n<p>And the situation is now criminal entities are much more organized, and have developed a business model, they can replicate and sell to whoever needs it.   <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>DarkSide first came into light in August 2020 and was initially conducting its own ransomware attacks. By November, the group and 14 other such criminal gangs were responsible for more than 1,200 ransomware attacks, according to Intel471, which tracked 25 different RaaS groups throughout 2020.<\/em><\/p><cite><a href=\"https:\/\/www.cbsnews.com\/news\/ransomware-as-a-service-business-model-booming\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Ransomware is booming as a business model: &#8220;It&#8217;s like eBay&#8221; &#8211; CBS News<\/a><\/cite><\/blockquote>\n\n\n\n<p class=\"has-text-align-center\"><strong>The world is getting hacked, no one is immune.<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Cybersecurity should be at the center of every IT conversation out there.<\/strong><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">A few facts first:<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>According to <a rel=\"noreferrer noopener\" href=\"https:\/\/hostingtribunal.com\/blog\/hacking-statistics\/#gref\" data-type=\"URL\" data-id=\"https:\/\/hostingtribunal.com\/blog\/hacking-statistics\/#gref\" target=\"_blank\">Hosting Tribunal website report<\/a>, there is a hack every 39 seconds  ( Many go unreported ) <\/li><li>It\u2019s not just the big guys getting hit. K-12, local governments, small businesses and commercial customers<\/li><li>The call from help can come from anywhere \u2013 A friend, a peer, a friend-of-a -friend, Director, CFO , CEO.<\/li><li>Unfortunately, ransomware business has become a lucrative criminal business model ( <a rel=\"noreferrer noopener\" href=\"https:\/\/www.cbsnews.com\/news\/ransomware-as-a-service-business-model-booming\/\" data-type=\"URL\" data-id=\"https:\/\/www.cbsnews.com\/news\/ransomware-as-a-service-business-model-booming\/\" target=\"_blank\">read here <\/a>)<\/li><li>Last week, the US Government, called for the federal government and private sector to partner to confront \u201cpersistent and&nbsp;increasingly sophisticated malicious cyber campaigns\u201d that threaten U.S. security (<a rel=\"noreferrer noopener\" href=\"https:\/\/www.washingtonpost.com\/politics\/white-house-ransomware-russia-hacking\/2021\/06\/03\/055fbb64-c46a-11eb-93f5-ee9558eecf4b_story.html\" data-type=\"URL\" data-id=\"https:\/\/www.washingtonpost.com\/politics\/white-house-ransomware-russia-hacking\/2021\/06\/03\/055fbb64-c46a-11eb-93f5-ee9558eecf4b_story.html\" target=\"_blank\">Article<\/a> |  <a rel=\"noreferrer noopener\" href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/05\/12\/fact-sheet-president-signs-executive-order-charting-new-course-to-improve-the-nations-cybersecurity-and-protect-federal-government-networks\/\" data-type=\"URL\" data-id=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/05\/12\/fact-sheet-president-signs-executive-order-charting-new-course-to-improve-the-nations-cybersecurity-and-protect-federal-government-networks\/\" target=\"_blank\">press release<\/a> ).<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">A Sample List<\/h2>\n\n\n\n<p>A sample of the 22 reported breaches in May 2021 is listed below. &#8212; <strong>Yes in one month, not all year.<\/strong> Here is a partial list of the most notable ransomware attacks:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>We begin the month in Switzerland where cloud hosting provider&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/securereading.com\/swiss-cloud-suffers-ransomware-attack\/__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBFolyYG8$\" target=\"_blank\"><strong>Swiss Cloud<\/strong> [securereading.com]<\/a>&nbsp;were the first to report a ransomware attack. The firm did not reveal details about the incident but they did disclose that they were working in 24-hour shifts, including weekends to restore service. Payroll giant Sage, one of their most high-profile customers was affected by the outages.<\/li><li>Healthcare giant&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.bleepingcomputer.com\/news\/security\/health-care-giant-scripps-health-hit-by-ransomware-attack\/__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBLkC0Zel$\" target=\"_blank\"><strong>Scripps<\/strong> [bleepingcomputer.com]<\/a>&nbsp;was next to report an attack. The San Diego based non-profit healthcare provider was forced to suspend user access to its online portal and switch to alternative methods for patient care operations while some critical care patients were redirected to other facilities following the attack.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/itwire.com\/security\/norwegian-firm-shows-how-ransomware-attack-should-be-handled.html__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBDiXKhAW$\" target=\"_blank\"><strong>Volue Technology<\/strong> [itwire.com]<\/a>, a Norwegian based leading supplier of technology was a victim of RYUK ransomware. The firm took a different approach to disclosing the incident as they set up a webpage with information and updates relating to the attack. The telephone number and email address of their chief executive was also included, urging people to get in touch with him if they needed more information.<\/li><li>The most high-profile attack of the month goes to&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.bleepingcomputer.com\/news\/security\/largest-us-pipeline-shuts-down-operations-after-ransomware-attack\/__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBETs1p9m$\" target=\"_blank\"><strong>Colonial Pipeline<\/strong> [bleepingcomputer.com]<\/a>, the largest fuel pipeline in the US. An attack from the DarkSide ransomware gang caused havoc throughout several states in the US as the outages caused a shortage of gas. The company opted to pay a $5 million ransom so services could be resumed.<\/li><li>The&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.bleepingcomputer.com\/news\/security\/city-of-tulsas-online-services-disrupted-in-ransomware-incident\/__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBFAM3tme$\" target=\"_blank\"><strong>City of Tulsa<\/strong> [bleepingcomputer.com]<\/a>&nbsp;in Oklahoma were forced to shut down their systems and online services following a ransomware attack. The incident did not disrupt emergency services but it did impact online billing for residents. The city has said that customer information had not been compromised in the attack.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.infosecurity-magazine.com\/news\/japanese-manufacturer-yamabiko?utm_source=twitterfeed&amp;utm_medium=twitter__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBBzNlnKL$\" target=\"_blank\"><strong>Yamabiko<\/strong> [infosecurity-magazine.com]<\/a>, a Tokyo based manufacturer of power tools and agricultural and industrial machinery was targeted by the Babuk ransomware gang. Although the company had not officially confirmed the attack, the Russian based cybercriminals released some of the exfiltrated data on their leak site. They claimed to have exfiltrated 0.5TB of data from the firm.<\/li><li>Germany headquartered chemical distribution company&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.bleepingcomputer.com\/news\/security\/chemical-distributor-pays-44-million-to-darkside-ransomware\/__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBPxFYa-I$\" target=\"_blank\"><strong>Brenntag<\/strong> [bleepingcomputer.com]<\/a>&nbsp;paid a $4.4 million ransom in Bitcoin to the DarkSide ransomware gang in order to receive a decryptor for their encrypted files and to prevent the threat actors from publicly leaking the exfiltrated data. The cybercriminals claimed to have stolen 150GB of data during the attack. A screenshot including some stolen data was shared on their leak site.<\/li><li>The&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/news.sky.com\/story\/irelands-health-service-shuts-down-it-systems-over-significant-ransomware-attack-12305982__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBOcp4K4f$\" target=\"_blank\"><strong>Health Service Executive in Ireland&nbsp;<\/strong> [news.sky.com]<\/a>announced on Twitter that they had experienced a \u2018significant\u2019 ransomware attack which forced the shutdown of their systems as precaution. All outpatient appointments were cancelled. The Conti gang set the ransom at $20 million in exchange for decrypting the data and deleting 700Gb of unencrypted files that they had exfiltrated during the attack.<\/li><li>After insurance giant&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.bleepingcomputer.com\/news\/security\/insurer-axa-hit-by-ransomware-after-dropping-support-for-ransom-payments\/__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBJlGoqp_$\" target=\"_blank\"><strong>AXA<\/strong> [bleepingcomputer.com]<\/a>&nbsp;announced that they would be dropping reimbursement for ransomware extortion payments for cyber-insurance policies in France, some of their locations in Asia including Thailand and Hong Kong were hit by ransomware. The Avaddon ransomware group claimed responsibility for the attack and revealed on their leak site that they had exfiltrated 3 TB of sensitive data from the company\u2019s Asian operations.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/kmph.com\/news\/local\/visalia-unified-hit-by-a-ransomware-attack-investigation-under-way__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBJ1bGLR2$\" target=\"_blank\"><strong>Visalia Unified School District<\/strong> [kmph.com]<\/a>&nbsp;in California revealed they had experienced a Ransomware attack which knocked many of its district IT systems offline. A press release issued by the district did not specify if any student or teacher information was compromised during the attack.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.rnz.co.nz\/news\/national\/442850\/cyber-attack-at-waikato-hospitals-patients-anxiously-wait-for-updates__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBAQMjHs2$\" target=\"_blank\"><strong>Waikato District Health Board<\/strong> [rnz.co.nz]<\/a>&nbsp;in New Zealand suffered a ransomware attack which is thought to have started via a malicious email attachment. The attack downed computer and phone systems and forced staff to resort to pen and paper. Patient surgeries and outpatient appointments were also cancelled because of the incident.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.boston25news.com\/news\/25-investigates\/ransomware-attack-hits-rockland-public-schools\/RUNTHR7NN5HGLLSA4LCERGVEHI\/__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBA3dIbij$\" target=\"_blank\"><strong>The Rockland Public School District<\/strong> [boston25news.com]<\/a>&nbsp;in Massachusetts became the next education victim. A notice from the school said no student Chromebooks had been affected but laptop and desktop access for staff was not possible. It\u2019s not known who was behind the attack.<\/li><li>Texas based homebuilders&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.kcbd.com\/2021\/05\/20\/betenbough-working-to-protect-clients-after-ransomware-attack\/__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBNkV4b34$\" target=\"_blank\"><strong>Betenbough<\/strong> [kcbd.com]<\/a>&nbsp;scrambled to try and protect their clients after Russian hackers leaked personal information following an attack which saw the criminal gang hold the developers data to ransom. After hiring a cybersecurity expert to help deal with the incident, the company revealed that some sensitive client data had been posted on the Dark Web.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.theregister.com\/2021\/05\/21\/toyota_cyber_attacks\/__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBE7ODh_y$\" target=\"_blank\"><strong>Toyota<\/strong> [theregister.com]<\/a>&nbsp;made news next when they disclosed that they had been hit by two cyberattacks, the first of which hit its subsidiary Daihatsu Diesel Company, meanwhile, numerous Japanese media outlets reported that US subsidiary Auto Parts Manufacturing Mississippi had revealed a ransomware attack. Reports said that some financial and customer data had been exfiltrated and exposed but the company had not paid a ransom and had not been disrupted.<\/li><li>Insurance broker&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.insurancetimes.co.uk\/news\/doncaster-based-broker-faces-15m-ransomware-attack\/1437560.article__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBL6Pb1vK$\" target=\"_blank\"><strong>One Call<\/strong> [insurancetimes.co.uk]<\/a>&nbsp;in the UK were hit by the Darkside gang who allegedly set a ransom of \u00a315 million in exchange for not leaking the firms data. The Doncaster based firm have not yet revealed if any customer data was exfiltrated during the attack.<\/li><li>Audio giant&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.bleepingcomputer.com\/news\/security\/audio-maker-bose-discloses-data-breach-after-ransomware-attack\/__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBC7KEXnc$\" target=\"_blank\"><strong>Bose Corporation<\/strong> [bleepingcomputer.com]<\/a>&nbsp;disclosed a data breach following a ransomware attack that hit the company earlier this year. A company spokesperson said that the systems were recovered quickly, no ransom had been paid and that an investigation revealed a small number of affected parties who had been notified. The investigation also found that some employee data had been exfiltrated but had not been leaked on the Dark Web.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.insidehighered.com\/quicktakes\/2021\/05\/24\/ransomware-attack-takes-sierra-college-line__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBE9uB6LG$\" target=\"_blank\"><strong>Sierra College<\/strong> [insidehighered.com]<\/a>&nbsp;a Northern California community college was hit by ransomware which affected the college website and some other online systems according to a statement posted by the college. The college is working with third-party cybersecurity forensics experts and law enforcement to investigate the incident.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.krmg.com\/news\/local\/ransomware-attack-city-parking-app\/H7RNPED6ENEGFLKG2INJV5Y7AY\/__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBOFnh-MT$\" target=\"_blank\"><strong>ParkMobile<\/strong> [krmg.com]<\/a>, a Tulsa Oklahoma firm that manages the city\u2019s downtown parking via its app altered users of a ransomware attack. The company disclosed that the incident was linked to a third-party software vendor. The attack was not related to the earlier attack on the City of Tulsa.<\/li><li><a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.kiro7.com\/news\/local\/clover-park-school-district-investigating-possible-ransomware-attack\/J7ZJQSJGBRARJE5IEM3CMJVV2M\/__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBGfQQCPR$\" target=\"_blank\"><strong>Clover Park School District<\/strong> [kiro7.com]<\/a>&nbsp;in Washington was the next victim in education. The hackers threatened to release the exfiltrated data unless a ransom was paid. A screenshot of the message said \u201cClover Park School District, you\u2019ve been hacked,\u201d \u201cPay or grief. Sensitive information will be shared to the public \u2026 There are (not) any third-party solution(s) which can help you. But you can damage your information\u201d, was shared was local news.<\/li><li>The&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.latimes.com\/california\/story\/2021-05-31\/azusa-ransomware-hack-sensitive-police-documents-online__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBPE2PTM0$\" target=\"_blank\"><strong>Azusa Police Department<\/strong> [latimes.com]<\/a>&nbsp;in Southern California became a victim of the DoppelPaymer criminal gang who exfiltrated data and followed up with a ransom demand. Officials of the city of 48,000 residents decided to keep the attack a secret for 2.5 months before disclosing that data compromised in the attack \u201cmay have included\u201d social Security numbers, driver\u2019s license numbers, medical information, financial account information and other records. The cybercriminals posted 7 GBs of Azusa records on the Dark Web.<\/li><li>The next reported attack of the month was on the world\u2019s largest meat processing firm&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.bleepingcomputer.com\/news\/security\/food-giant-jbs-foods-shuts-down-production-after-cyberattack\/__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBNDLPK1T$\" target=\"_blank\"><strong>JBS Foods<\/strong> [bleepingcomputer.com]<\/a>. The company was forced to shut down production at several global sites following a cyberattack. JBS USA issued a press release on May 31 confirming that the attack had impacted their North American and Australian IT systems. At time of writing the nature of the attack is still unknown while the investigation continues, but cybersecurity experts believe there is a high chance that ransomware was involved.<\/li><li>The last attack for May hit backup appliance specialist<a rel=\"noreferrer noopener\" href=\"https:\/\/urldefense.com\/v3\/__https:\/www.computerweekly.com\/news\/252501665\/Exagrid-pays-26m-to-Conti-ransomware-attackers__;!!LpKI!zfdhRgqdkjfLyjNiES3K35UHBEy0G-unmagiUsZXBFz-UfC5ejfkye9BBDMOvmAG$\" target=\"_blank\"><strong>&nbsp;Exagrid.<\/strong> [computerweekly.com]<\/a>&nbsp;The Conti cybercriminal gang were behind the attack which exfiltrated employee and customer data, confidential contracts and source code. A ransom of $2.6 million was paid to<\/li><\/ol>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>My company Dell Technologies has multiple types of products and services to help our customers mitigate, reduce risk and more importantly recover from a breach. <\/p>\n\n\n\n<p>Check out <a rel=\"noreferrer noopener\" href=\"https:\/\/www.delltechnologies.com\/en-us\/what-we-do\/security-transformation.htm\" target=\"_blank\">Dell Technologies Security Transformation<\/a> for more information.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/jorgep.com\/blog\/wp-content\/uploads\/image007.jpg\" alt=\"\" class=\"wp-image-30438\"\/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Additional Resources:<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.cyberpeace.org\/only-12-pc-of-cybercrime-victims-sought-police-help-reveals-survey\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Only 12 pc of cybercrime victims sought police help, reveals survey \u2014 Cyber Peace Foundation<\/a><\/li><li><a href=\"https:\/\/www.cnbc.com\/2021\/06\/04\/ceos-need-to-prepare-for-increase-in-ransomware-attacks-doj-official.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">CEOs need to prepare for increase in ransomware attacks: DOJ official (cnbc.com)<\/a><\/li><li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/the-week-in-ransomware-june-4th-2021-wheres-the-beef\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">The Week in Ransomware &#8211; June 4th 2021 &#8211; Where&#8217;s the beef? (bleepingcomputer.com)<\/a><\/li><li><a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/pdfs\/whitepaper\/sophos-state-of-ransomware-2021-wp.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">sophos-state-of-ransomware-2021-wp.pdf<\/a><\/li><\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The uptick of recent cybersecurity incidents reported in the news as of late is up.    The list is long and it has affected business  of all sizes and in all industries.     The sophistication of the attacks, and vulnerabilities  they uncovered  are only one side of the coin.    Many of them are now truly affecting many lives, and livelihoods.   <\/p>\n","protected":false},"author":2,"featured_media":368574,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","ngg_post_thumbnail":0,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[681,441],"tags":[700,823,742,757],"class_list":["post-32254","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-moderneuc2","category-tech-talk","tag-cybersecurity","tag-guest-post","tag-moderneuc1","tag-ransomware"],"taxonomy_info":{"category":[{"value":681,"label":"ModernEUC"},{"value":441,"label":"Tech Talk"}],"post_tag":[{"value":700,"label":"Cybersecurity"},{"value":823,"label":"guest post"},{"value":742,"label":"ModernEUC"},{"value":757,"label":"ransomware"}]},"featured_image_src_large":["https:\/\/jorgep.com\/blog\/wp-content\/uploads\/CyberSecurity-FeaturedImage2-730x430-1.jpg",730,430,false],"author_info":{"display_name":"Jorge Pereira","author_link":"https:\/\/jorgep.com\/blog\/author\/jorge\/"},"comment_info":0,"category_info":[{"term_id":681,"name":"ModernEUC","slug":"moderneuc2","term_group":0,"term_taxonomy_id":691,"taxonomy":"category","description":"","parent":0,"count":261,"filter":"raw","cat_ID":681,"category_count":261,"category_description":"","cat_name":"ModernEUC","category_nicename":"moderneuc2","category_parent":0},{"term_id":441,"name":"Tech Talk","slug":"tech-talk","term_group":0,"term_taxonomy_id":451,"taxonomy":"category","description":"","parent":0,"count":672,"filter":"raw","cat_ID":441,"category_count":672,"category_description":"","cat_name":"Tech Talk","category_nicename":"tech-talk","category_parent":0}],"tag_info":[{"term_id":700,"name":"Cybersecurity","slug":"cybersecurity","term_group":0,"term_taxonomy_id":710,"taxonomy":"post_tag","description":"","parent":0,"count":29,"filter":"raw"},{"term_id":823,"name":"guest post","slug":"guest-post","term_group":0,"term_taxonomy_id":833,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw"},{"term_id":742,"name":"ModernEUC","slug":"moderneuc1","term_group":0,"term_taxonomy_id":752,"taxonomy":"post_tag","description":"","parent":0,"count":284,"filter":"raw"},{"term_id":757,"name":"ransomware","slug":"ransomware","term_group":0,"term_taxonomy_id":767,"taxonomy":"post_tag","description":"","parent":0,"count":4,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/32254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/comments?post=32254"}],"version-history":[{"count":1,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/32254\/revisions"}],"predecessor-version":[{"id":518807,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/32254\/revisions\/518807"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/media\/368574"}],"wp:attachment":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/media?parent=32254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/categories?post=32254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/tags?post=32254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}