- My Forums
- Tiger Rant
- LSU Recruiting
- SEC Rant
- Saints Talk
- Pelicans Talk
- More Sports Board
- Fantasy Sports
- Golf Board
- Soccer Board
- O-T Lounge
- Tech Board
- Home/Garden Board
- Outdoor Board
- Health/Fitness Board
- Movie/TV Board
- Book Board
- Music Board
- Political Talk
- Money Talk
- Fark Board
- Gaming Board
- Travel Board
- Food/Drink Board
- Ticket Exchange
- TD Help Board
Customize My Forums- View All Forums
- Show Left Links
- Topic Sort Options
- Trending Topics
- Recent Topics
- Active Topics
Started By
Message
Posted on 7/5/22 at 1:32 pm to teke184
quote:
Even if you have a system that has all the patches and normal security holes fixed, all it takes is one dumbass opening the wrong email to spread something like this.
True but most good IT companies these days have tools that monitor servers and can shut down the entire system as soon as it sees a single file get encrypted. Now the desktop is probably screwed. Have had this happen to me got 3 files instead of a million.
This post was edited on 7/5/22 at 1:33 pm
Posted on 7/5/22 at 1:33 pm to Tigeralum2008
quote:
Just heard a nurse from BR General saying they got hit by a "cyber attack"
personally I'd wait and see what a doctor has to say about it.
This post was edited on 7/5/22 at 1:34 pm
Posted on 7/5/22 at 1:33 pm to Tigeralum2008
All you men who went to The General with the clap, you fixin’ to be outed…
Posted on 7/5/22 at 1:37 pm to Cole Beer
quote:
Every business of any kind should buy Cyber insurance.
What would this cover? Potential lawsuits for losing people's confidential information? Cost for someone to recover your data? The ransom?
Business Interruption is always a different cost.
If you have a robust backup system, you shouldn't lose more than a few days, depending on when hit compared to when you run the backup.
Posted on 7/5/22 at 1:43 pm to Tigeralum2008
Did she tell you while doing a combo jig and twerk dance where she looks like she is having a full on grand mal seizure?
Posted on 7/5/22 at 1:45 pm to Weekend Warrior79
quote:
f you have a robust backup system, you shouldn't lose more than a few days, depending on when hit compared to when you run the backup.
Depends on the method involved, all your backups can be infected just the same.
The ransomware can lay in wait for years if needed to.
Ransomware insurance used to be cheap, but now it is modifying into highly controlled with mandatory protections and stress tests of systems.
This post was edited on 7/5/22 at 1:47 pm
Posted on 7/5/22 at 1:47 pm to SG_Geaux
quote:
When you come up with a system that is 100% guaranteed to stop this you let me know.
This would make alot of money. You cant ever guarantee 100%. If hackers want to get in, they will. The only thing you can guarantee is that you can restore the environment quickly. You do that through fail-over environments, back ups, snapshots, etc. Looks like BR general was lacking in DR planning.
This post was edited on 7/5/22 at 1:57 pm
Posted on 7/5/22 at 1:48 pm to Weekend Warrior79
quote:
What would this cover? Potential lawsuits for losing people's confidential information? Cost for someone to recover your data? The ransom?
Yes, Yes and Yes. It also can cover a portion of lost revenue during the outage.
Posted on 7/5/22 at 1:50 pm to fightin tigers
quote:
Might be cheaper to pay the ransom than the insurance, and what comes with it.
I would suggest this is the type of thing that our FBI should be much more aggressive on policing.
Posted on 7/5/22 at 1:52 pm to Y.A. Tittle
Just so insane that institutions with the money to put a solution in place to prevent most of these types of attacks don't in this day and age.
This post was edited on 7/5/22 at 1:56 pm
Posted on 7/5/22 at 1:54 pm to Y.A. Tittle
Posted on 7/5/22 at 1:55 pm to SG_Geaux
quote:
When you come up with a system that is 100% guaranteed to stop this you let me know.
You can't. However you can have good measures in place to be prepared for if and when it does. Often leadership will balk at the capital expenditure required to get a solution in place, but fire the same IT guy that proposed the solution when something like this does happen.
Posted on 7/5/22 at 2:04 pm to jdd48
[quote]I wonder if the newer nurses even know how to do things manually?[/quote
[/URL][/img]
[/URL][/img]
This post was edited on 7/5/22 at 2:05 pm
Posted on 7/5/22 at 2:05 pm to jdd48
You sound like you know a bit about this.
Do these people ever get caught? What sorts of efforts are ever taken to find them? Is it completely futile?
I'm guessing much of this is emanating internationally, but I'd think there has got to be SOME WAY to start policing it, no?
Do these people ever get caught? What sorts of efforts are ever taken to find them? Is it completely futile?
I'm guessing much of this is emanating internationally, but I'd think there has got to be SOME WAY to start policing it, no?
Posted on 7/5/22 at 2:07 pm to Tigeralum2008
Which employee opened up the phishing email?
Posted on 7/5/22 at 2:08 pm to wileyjones
Wouldn't this be tantamount to paying the Mob protection money ?
Posted on 7/5/22 at 2:09 pm to Y.A. Tittle
quote:
I would suggest this is the type of thing that our FBI should be much more aggressive on policing.
I’d be curious to know what percentage of these attacks originate from within the US or from countries with which we have strong law enforcement relationships (e.g. from places where there is a realistic chance of apprehension and conviction).
My guess is that it’s small, but I could be wrong.
Posted on 7/5/22 at 2:17 pm to Y.A. Tittle
quote:
You sound like you know a bit about this.
Do these people ever get caught? What sorts of efforts are ever taken to find them? Is it completely futile?
I'm guessing much of this is emanating internationally, but I'd think there has got to be SOME WAY to start policing it, no?
You can report it to the FBI, but unless it's part of some large operation that affects a few large influential companies, they're not likely going to get caught. Most of it is likely coming from international parties. I won't even use the word "hackers" because that would imply there's some skill involved. Some 15 year old kid with little hacking skill these days can buy a ransomware package and target just about anyone. All it takes is 1 naive user to click a legit looking link. Targets are usually not hard to find based on how much people like to publicly live their lives in social media and post their places of employment,etc. If you wanted to target an executive of a company? No problem there as well. Most companies publish their leadership by name on their public company website.
This post was edited on 7/5/22 at 2:26 pm
Popular
Back to top
Follow TigerDroppings for LSU Football News