With Ransomware Attacks, Déjà Vu May Be the New Normal

By Paul E. Goatley © Fisher Phillips September 28, 2021
LIKE SAVE
someone working on a computer

​Pick the date and news publication. After a few flips of the pages or a scroll of the mouse, you'll no doubt find an article about "ABC Company" reeling from a ransomware attack. This proliferation of cyberattacks is all too familiar and the source of sleepless nights for many employers. The COVID-19 pandemic has played a major role in the increase, as IT departments were afforded little time to strengthen networks and data security protocols once companies abruptly shifted to a remote work environment. Some reports suggest ransomware attacks have increased by as much as 800 percent during the pandemic.

Unfortunately, cybercriminals don't disparately select their targets—very few, if any, companies are immune from their reach. Higher education institutions have even felt the brunt of ransomware attacks, with some being forced to cancel classes to limit the number of users on their network to slow the spread of malicious software. What can you do minimize your chances of being a victim—and what should you do in case you fall prey to a cyberattack?

Are Employers Just Sitting Ducks?

Absolutely not. There are numerous steps you can take to strengthen your data security protocols and stave off cybersecurity attacks. On Aug. 23, the Cybersecurity and Infrastructure Security Agency (CISA) released a fact sheet that provides employers with recommendations on how to prevent ransomware attacks and protect sensitive and personal information from data breaches. The CISA's fact sheet builds on the agency's ransomware guidance from last year, with specific recommendations on protecting personal data. It contains tips such as developing an incident response plan, regular scans and software updates, training employees on phishing attempts, and creating an environment of "good cyber hygiene."

Here are the highlights from the CISA's latest guidance:

Preventing Ransomware Attacks

  • Maintain offline, encrypted backups of data and regularly test your backups.
  • Create, maintain, and exercise a basic cyber incident response plan, resiliency plan and associated communications plan.

          +The cyber incident response plan should include response and notification procedures for ransomware incidents.

  • Mitigate Internet-facing vulnerabilities and misconfigurations.

          +Employ best practices for use of Remote Desktop Protocol (RDP) and other remote desktop services.

          +Conduct regular vulnerability scanning.

          +Update software.

          +Ensure that devices are properly configured and security features are enabled.

  • Reduce the risk of phishing emails by enabling stronger spam filters, and implementing a cybersecurity user awareness and training program.

Protect Sensitive and Personal Information

  • Know what personal and sensitive information is stored on your network and who has access to it.
  • Identify the computers or servers where sensitive personal information is stored and ensure it is encrypted.
  • Implement firewalls to protect networks and systems from malicious or unnecessary network traffic.
  • Consider applying network segmentation to further protect systems storing sensitive or personal information.

What Should We Do if Our Company is The Victim of a Ransomware Attack?

If your company becomes the victim of a ransomware attack, the CISA recommends implementing your cyber incident response plan and taking the following steps:

  • Determine which systems were impacted and immediately isolate them.
  • If affected devices cannot be removed from the network or if the network cannot be temporarily shut down, power infected devices down to avoid further spread of the ransomware infection.
  • Triage impacted systems for restoration and recovery.
  • Engage your internal and external stakeholders.
  • Consider retaining a third-party incident response provider with experience in data breaches.
  • Notify affected individuals and report the incident to your local FBI field office.

Companies that become victim of a ransomware attack should also hire legal counsel with data breach experience to provide advice on potential notification obligations and to ensure compliance with reporting requirements, as well as to engage appropriate vendors to assist in investigation of the incident. 

Importantly, before engaging with the individual(s) responsible for the ransomware attack, take note of the October 2020 advisory opinion from the Department of Treasury's Office of Foreign Assets Control (OFAC) indicating that companies involved in facilitating ransomware payments may encourage future ransomware payment demands and also risk violating OFAC regulations. As a result, you might face civil penalties for paying ransomware demands. If confronted with a ransomware attack, you should consider promptly contacting federal authorities for guidance, in addition to seeking legal counsel.

Paul E. Goatley is an attorney with Fisher Phillips in Louisville, Ky. © 2021 Fisher Phillips. All rights reserved. Reposted with permission. 

LIKE SAVE

SHRM HR JOBS

Hire the best HR talent or advance your own career.

SHRM’s SMALL-BUSINESS LEGAL RESOURCE

SHRM LegalNetwork members can quickly connect with attorneys on an unlimited number of topics for a low monthly fee.

SHRM LegalNetwork members can quickly connect with attorneys on an unlimited number of topics for a low monthly fee.

LEARN MORE

SPONSOR OFFERS

HR Daily Newsletter

News, trends and analysis, as well as breaking news alerts, to help HR professionals do their jobs better each business day.