[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-state-of-cybersecurity\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-state-of-cybersecurity\/","headline":"The Ping: State of CyberSecurity","name":"The Ping: State of CyberSecurity","description":"Do you know the state of cybersecurity today? Why are cities being targeted more than other entities? Is malware on the rise? Learn more here!","datePublished":"2019-06-14","dateModified":"2019-06-14","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2019\/06\/Hacker.jpg","url":"https:\/\/univista.com\/wp-content\/uploads\/2019\/06\/Hacker.jpg","height":1280,"width":1920},"url":"https:\/\/univista.com\/posts\/the-ping-state-of-cybersecurity\/","about":["business management","disaster recovery","internet","malware","network","safety","Security","The Ping","update","virus","vulnerability","windows"],"wordCount":596,"keywords":["cybersecurity","data breaches","disaster recovery","end of life","hackers","malware","microsoft","Risk","Security","updates","upgrades"],"articleBody":"ShareTweet                                        Last week we discussed the consequences of allowing your systems to pass their end of life and continuing to use them. One of the larger issues is the increased potential of malware on your machines. Not only can this affect your desktops, but it can spread to the whole network. With malware attacks not slowing down, is this really a chance you can afford to take?Malware AttacksAt the end of 2018, in The Ping: 2018 Breakdowns, we listed many of the major malware attacks that happened within the year. Since then, malware attack frequency and severity has increased and many of these attacks specifically target city infrastructures. EternalBlue is an exploit that \u201ctargets a vulnerability in Microsoft\u2019s implementation of the Server Message Block (SMB) protocol,\u201d according to WeLiveSecurity. With over a million machines vulnerable to this exploit, multiple companies and cities have fallen victim to this malware.Most experts agree that cities and other entities are not learning from past mistakes and allowing themselves to be vulnerable to more ransomware attacks. In March of 2018 hackers \u201ctook down at least a third of Atlanta\u2019s 424 software programs, about 30% of which were considered \u201cmission critical.\u201d The recovery price tag is now somewhere in the range of $21 million,\u201d &#8211; Synopsys. This could have largely been prevented with healthy network maintenance, including but not limited to basic system updates and upgrades.Cities Being TargetedDue to low funding from budget cuts, most cities don\u2019t always have the money to replace the systems that have passed their end of life. Many cities also use outdated software that is not compatible with the latest supported and most secure versions of Microsoft Windows, and in effect are hesitant towards upgrading. Not only does their lack of funding affect the system replacements, it also affects their ability to provide proper training to the employees that use these systems. According to Synopsys, \u201ca rigorous awareness training program for employees to help them spot and avoid phishing attacks is obviously more expensive than patching, but is still likely to cost much less in the long run than recovering from an attack.\u201dIn early May of this year the City of Baltimore was the victim of a targeted malware attack. See The Ping: End Of Life \u2013 Server And Desktop for more information. Using a form of the EternalBlue malware, hackers were able to access the city network and freeze all networked machines. The hackers demanded $76,000 in ransom but the city correctly refused. To date Baltimore has spent over $18 million trying to rebuild and recover. \u201cAs of Wednesday, 70 percent of city employee email accounts are active again. By the end of the week, the goal is to have 95 percent of employees with full access,\u201d according to Baltimore\u2019s own CBS local news. However, the city\u2019s June utility bills are still not expected to go out to citizens and tickets and fees still can\u2019t be paid online.What can you do?Now more than ever it is important to be aware of cybersecurity and ways to prevent yourself and your organization from falling victim to attacks. One of the best ways to do this is to keep your systems updated and replace end of life systems. The next best thing is to continue to keep employees aware of what the signs of a potential attack are. Stay tuned next week for our post about training and how it can keep you safe! As always, if you have any questions or concerns, feel free to contact us!Your UniVista Team*Celebrating 20 Years of Customer Satisfaction*ShareTweet                                        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"The Ping: State of CyberSecurity","item":"https:\/\/univista.com\/posts\/the-ping-state-of-cybersecurity\/#breadcrumbitem"}]}]