Analyzing the Global Impact of Cybersecurity, Law, and Business Risk
Author: Shawn E. Tuma
Shawn Tuma is an attorney who is internationally recognized in cybersecurity, computer fraud and data privacy law, areas in which he has practiced for nearly two decades. He is a Partner at Spencer Fane, LLP where he regularly serves as outside cybersecurity and privacy counsel to a wide range of companies from small to midsized businesses to Fortune 100 enterprises. You can reach Shawn by telephone at 972.324.0317 or email him at email@example.com.
The Texas local governments attack seems to me to be more akin to the trend we have been seeing in 2019 with attackers targeting one MSP and then using that access and the MSP’s tools to attack / encrypt the MSP’s individual clients. If I’m not mistaken (and, I could be), the Texas DIR often acts as sort of a provider / MSP or/ MSSP to some local governments by providing outsourced services to those local governments.
STOP OVERWRITING / WIPING / DELETING OR OTHERWISE DESTROYING YOUR CLIENTS’ DATA WHEN THEY ARE AFFECTED BY RANSOMWARE!!!
PLEASE!!! PRETTY PLEASE!!! PRETTY PLEASE WITH SUGAR ON TOP!!! JUST STOP IT!!!
Seriously, everyone understands that ransomware is scary stuff and when you discover that one of your clients has been hit by it, it can cause quite a bit of panic. That is understandable. But, when you feel that sense of panic, that is not the time to act — that is the time to pause, take a deep breath, gather your senses, and let your emotions settle down and your brain take back over. Then, recall the Hippocratic Oath that doctors must take:
“first, do no harm”
Just because you cannot figure out what to do with the encrypted data does not mean that there are not other people out there who can. Consider these points:
There are really good folks out there who are experts at getting data like this decrypted.
There are outstanding cyber insurance policies that will pay the cost of the ransom to recover the data.
Over the course of time, ransomware decryption keys start to make their way into the wild and data that was at one time unrecoverable magically becomes recoverable.
And, in many cases, that original encrypted data is necessary to perform forensics that may prove to be very beneficial to your client.
But guess what? NONE OF THIS IS POSSIBLE AFTER YOU COME ALONG AND FINISH THE HACKER’S JOB BY DESTROYING ANY HOPE YOUR CLIENT EVER HAD OF RECOVERING ITS DATA BY PERMANENTLY DELETING IT!!!
Cyberbullying — like plain “old fashioned” bullying — is a heartbreaking to see, especially when it is directed at innocent children. There are many things that can lead to it and there are many things that can help minimize it. I do not pretend to have all of the answers and, you can bet, if I thought I did, I would share them with the world.
But, there is one thing I do know and that is that parents have a very big role in helping to keep kids from bullying others and in helping to protect their own children from bullying. I use the words “helping to keep” and “helping to protect” as recognition that there is no single solution to this problem — but if we can help make it better, than that is a good place to start.
In this interview with Ken Molestina@cbs11ken on DFW CBS 11 @CBSDFW, we discuss some of the issues surrounding cyberbullying and you will notice that my advice keeps coming back to the parents, for a reason: We as parents are the first line of defense when things involve our children and there is no technology, service, app, or other person who can take our place.
Here are several helpful resources to learn more about cyberbullying and how to help protect against it: