Handling the Threat of Ransomware

“Ransomware” is the term used when cybercriminals make the data on your network inaccessible to you until you pay a large ransom. The tools used for ransomware are no

different from those used for traditional hacking, but instead of stealing your data, criminals want to steal your money.

Due to the increased processing powers of computers and the rise of anonymous payment systems, ransomware attacks have become a lot more frequent, making ransomware one of the most substantial digital threats businesses face.

Once your business is infected, you face two tough choices – either spend the time to recover your locked files, resulting in days of downtime and lost business opportunities, or you pay the ransom and hope the attackers do not disappear before they unlock your files. Either option will still require that you wipe and restore all computers to remove the ransomware.

The best target for ransomware is a business that has vulnerabilities in its network. Just like traditional thieves, they go after the location that is the easiest to break into. The more secure you can make your network the less likely it is that your business will be attacked. Data security experts typically advise that you follow these four critical steps to reduce the risks of ransomware and avoid the need to pay a ransom:

Employee Training. Ransomware often starts with an employee opening a single file that unleashes a virus that shuts down the entire system. But the ransomware can be activated in a number of ways. These include infected downloads, phishing scams, or opening an email attachment containing malware. It is crucial to train your employees never to download or open any email attachments unless they directly apply to their daily business responsibilities. It’s also important to stress to employees never to visit Websites other than those relating to business research or business activities.

Sometimes individuals are hacked, then the hackers use the addresses gleaned from that person’s contact list to send out infected attachments or links. Employees should be trained to look out for strange emails that appear to be from people they know that may have been hacked. Any emails looking remotely suspicious should be immediately deleted even if they are from people known to the employee.

Strong Security Systems: Over the years, companies that provide security solutions for ransomware have developed even better ways to protect businesses from this costly and time-consuming threat. You should research what is now available for ransomware to see if you can close any gaps you may have in your network.

Effective ransomware security always includes:

A strong firewall

Anti-malware tools that update automatically

Keeping your system current with patches and other updates

Security software that stops users from clicking on infected Websites

System Backups. Backing up your system is always the best way to protect your business. If your network becomes infected with ransomware, it needs to be wiped clean and restored from your backup. This lets you avoid having to pay a ransom in order to get your data back.

If you are conducting backups on-premise, you should make sure you can recover an image of the data for months in the past and keep multiple copies. Any backups made between the time of infection and when the attack is detected will be encrypted, and thus unrecoverable.

During the wipe-and-restoration process, however, the data is still inaccessible. So this could interrupt or virtually shut down your business while the data is being restored. This is why it’s more cost-effective to avoid being hit by ransomware than to have to recover from it.

Automatic Incremental Online Backups. Your businesses should keep at least one set of backups offsite. There are many companies offering offsite backups at very affordable rates, so this is easy to do. Offsite backups give you another restoration option that adds a valuable layer of protection to your business. Most online backup services let you set how many prior days or months of backups you want to be stored so you can easily restore from a network version that has not been encrypted by ransomware.

We can help you evaluate your firewall and other network security systems to help you make sure you significantly reduce the threat that your business will be hit by ransomware.

New Area Code coming to the 405

OKLAHOMA CITY, OK (September 24, 2020) – The Oklahoma Corporation Commission (OCC) today reminds residential and business customers served by the 405-area code to prepare for the introduction of the new 572 area code. The 572-area code will be added as an overlay to the 405 regions to ensure a continuing supply of telephone numbers for the area. An overlay is the addition of another area code (572) to the same geographic region served by an existing area code (405).

The OCC ordered an area code overlay for the 405 Area Code on January 8, 2020. An overlay does not require customers to change their existing area code.

A six-month permissive dialing period will begin on October 24, 2020 to give consumers adequate time to adjust to the changes. During this period, local calls can be made with either 7 or 10 digits and all calls that are local will continue to be local even though you dial 10 digits.

Beginning April 24, 2021, mandatory dialing will occur where all local calls made within the Oklahoma 405 area code will have to be placed using the 10 digit telephone number (area code + the 7-digit telephone number).

Beginning May 24, 2021, new telephone lines or services may be assigned numbers using
the new 572 area code.

The most important facts for consumers to know about the upcoming 405/572 area code overlay are:

  • Your current telephone number, including current area code, will not change
  • If you seek new phone service after May 24, 2021, you may be assigned a phone number with the 572-area code.
  • You will need to dial area code + telephone number for all local calls.
  • You will continue to dial 1 + area code + telephone number for all long-distance calls.
  • The price of a call, coverage area, or other rates and services will not change due to the overlay.
  • What is a local call now will remain a local call.
  • You can still dial just three digits to reach 911. You can also dial three digits to reach 211 and 811, as well as 311 and 511, where available.

Please remember to identify your telephone number as a 10-digit number (area code + 7-digit telephone number), and include the area code when giving the number to friends, family, business associates and customers, etc.

Customers should ensure all services, automatic dialing equipment, applications, software, or other types of equipment recognize the new 572 area code as a valid area code. Examples include life-safety systems, fax machines, Internet dial-up numbers, alarm and security systems, gates, ankle monitors, speed dialers, mobile phone contact lists, call forwarding settings, voicemail services, and similar functions. Be sure to check your business stationery, advertising materials, personal checks, and your personal or pet ID tags to ensure the area code is included in your telephone number.

Important safety and security equipment, such as medical alert devices, and alarm and security systems must be programmed to use 10-digit dialing. Many systems operate on 10-digit dialing by default but some older equipment may still use 7 digits. Please contact your medical alert or security provider if you are not sure whether your equipment needs to be reprogrammed to accommodate the upcoming change to 10-digit local dialing. Any needed reprogramming of alarm and home security equipment should be done between October 24, 2020 and April 24, 2021.

Remember that all local calls must be programmed using 10-digits and you need to add ‘1’ for all long-distance calls.

For additional information, please visit the OCC website at http://occeweb.com/ or contact your local telephone service provider.