澳门六合彩开奖结果走势图

Skip to main content
澳门六合彩开奖结果走势图
澳门六合彩开奖结果走势图
澳门六合彩开奖结果走势图
Industries
Resources
About Us

How one Michigan manufacturer survived a painful cybersecurity attack

It started with team members having issues logging into the system.

鈥淲e noticed some servers weren鈥檛 responding correctly and we started investigating. It looked like a possible hardware problem,鈥 said a manager at the Michigan-based manufacturing company.

Further investigation on that late-summer day revealed a very big problem: encrypted ransomware files.

鈥淚t definitely was not a great feeling,鈥 the manager said. 鈥淥ur initial reaction was, 鈥楢re they still in the system, and what systems are compromised, if any?鈥 We went into instant recovery mode. We knew we needed to protect the data while also needing to preserve as much evidence as possible so our forensic teams could identify how it happened, how they got in. You want to turn everything off, but you can鈥檛.鈥

This Michigan company is far from alone in experiencing a cybersecurity incident 鈥 particularly during these turbulent times. Since the start of 2020, more than 20,000 pandemic-related cybersecurity threats have been reported to the Federal Bureau of Investigation鈥檚 Internet Crime Complaint Center.

Just as businesses everywhere have had to reassess and adjust during the pandemic, so have so-called threat actors who are rapidly adapting malware and phishing attacks, finding ways to wreak havoc on companies鈥 IT environments. Sophisticated hackers are becoming especially clever and are capitalizing not only on greater numbers of remote workers, but also the public鈥檚 fears and vulnerabilities during these uncertain times.

Next steps

Following the cybersecurity breach at the Michigan manufacturing company, leaders made two calls 鈥 one to their cybersecurity insurance company and another to 澳门六合彩开奖结果走势图.

鈥淲e had someone here on site from 澳门六合彩开奖结果走势图 the next day,鈥 the manager said. 鈥淎t that point, systems that we had up and running were still running. We were still trying to determine the scope of the breach.鈥

The company, with 澳门六合彩开奖结果走势图鈥檚 assistance, would discover that while they still had connectivity to the internet and their data center, serious issues remained.

鈥淭hat next day, after we had made some security changes, someone was still in the system and were able to change things back. That鈥檚 when we just shut down everything, so we could better understand and start remediating the issue,鈥 the manager said.

The power of backing up

All told, the time it took to get the company鈥檚 critical IT systems back up and running totaled almost three weeks. The good news: the company had backups.

鈥淭he good thing was we had backups so we could restore systems,鈥 the manager said. 鈥淏ut to get everything back up 鈥 it was a good two to three weeks. It was almost two weeks before we had email back up. Part of this was security. It wasn鈥檛 that they weren鈥檛 restored and usable 鈥 we were using systems internally鈥攂ut we were severely limiting internet access so we could get systems back up, get additional software involved, and have monitoring up and going.鈥

In the end, the company also was able to learn how the cybersecurity breach occurred, providing the team with valuable intel to prevent future breaches.

鈥淲e鈥檙e back up now to 99% and have been for a few weeks now,鈥 the manager said in fall 2020, a couple of months or so after the incident. 鈥淚t was definitely painful, but we were actually in better shape than a lot of other people because we had backups. [The hackers] weren鈥檛 able to get to our backups with the exception of a handful of servers that were on different backup servers. Fortunately, these weren鈥檛 critical systems.鈥

The company didn鈥檛 pay the ransom 鈥 鈥渨e didn鈥檛 engage at all with the attacker,鈥 the manager said.

The company also didn鈥檛 lose any data: 鈥淣one of our data was exfiltrated, and that鈥檚 a relief.鈥

鈥湴拿帕喜士苯峁呤仆 facilitated boots on the ground here to help us start recovering systems and also provided insight and knowledge into how to proceed, the safest way to proceed. They helped us get our business back up and running as quickly and as safely as possible.鈥

Sound cybersecurity advice

Review your backups, advises the manager of this company that experienced the cybersecurity attack.

鈥淎nd if you can keep a copy of backups off site, that鈥檚 preferred. Follow your backup vendors鈥 best practices on how to set them up so they鈥檙e isolated from your production environment. And test your backups.鈥

He also recommends following best practices from a security standpoint: use complex passwords, have your users change passwords on a regular basis 鈥 especially administrative accounts since they get overlooked sometimes.