{"id":1359,"date":"2021-06-03T16:48:04","date_gmt":"2021-06-03T21:48:04","guid":{"rendered":"https:\/\/www.is-t.net\/blog\/?p=1359"},"modified":"2024-03-26T02:21:29","modified_gmt":"2024-03-26T07:21:29","slug":"latest-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/","title":{"rendered":"Learn More About Latest Ransomware Attacks"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"1359\" class=\"elementor elementor-1359\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-87eae0c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"87eae0c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1d09fd2\" data-id=\"1d09fd2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9d07ca0 elementor-widget elementor-widget-text-editor\" data-id=\"9d07ca0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">Ransomware is growing in popularity as an effective tool for cybercriminals and hackers. This\u00a0style of\u00a0malware encrypts personal or business system\u2019s files, locking the owner out of the system completely. Once activated, the malware makes\u00a0data,\u00a0files, systems, and applications inaccessible. The cybercriminal then demands a ransom in exchange for the restoration of the system. Even if a victim pays the ransom, there is no guarantee that full restoration of the system will occur, but it is a tempting choice for companies who suffer downtime, loss of sales, and negative reputations\u00a0as a result of the attack.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">The risk of ransomware is very real and does not discriminate. From small businesses to global corporations, ransomware can affect anyone at any\u00a0time. The effects of these kind of attacks are lasting and the threat is growing, as evident by the recent Colonial Pipeline Co. attack, which affected the\u00a0entire US gas industry. Businesses must act to protect their systems with the latest in cybersecurity to avoid becoming a victim.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2293454 elementor-widget elementor-widget-image\" data-id=\"2293454\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/05\/Ransomware2_IST.jpg\" class=\"attachment-large size-large wp-image-1361\" alt=\"Fight Ransomware w\/ Off Site Data Backups\" srcset=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/05\/Ransomware2_IST.jpg 800w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/05\/Ransomware2_IST-300x150.jpg 300w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/05\/Ransomware2_IST-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2a3f2f elementor-widget elementor-widget-heading\" data-id=\"c2a3f2f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Colonial Pipeline Co. Ransomware Attack <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8fa0c1 elementor-widget elementor-widget-text-editor\" data-id=\"e8fa0c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">In May 2021, a ransomware attack executed by\u00a0DarkSide, a ransomware software created by a shadow group of hackers and cybercriminals, affected a major US pipeline, prompting gas shortages and panic fueling along the East coast.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Colonial Pipeline Co., a company that operates one of the country\u2019s major pipelines, was the victim. The ransomware attack caused the company to take some of their systems offline, causing the pipeline to stop operations until full and safe restoration of IT systems could be achieved. This was a serious problem, as this 5,500-mile pipeline is responsible for delivering 45% of the gas and jet fuel used by the East coast.\u00a0Anne Neuberger, the deputy national security adviser for cyber and emerging technology called this style of attack \u201cransomware as a service variant\u201d in which cybercriminals execute the attack and share the proceeds with the developers of the ransomware software. Neuberger called this style of ransomware attack \u201cnew and troubling.\u201d<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">As a result of the ransomware attack, gas prices increased and panic over gas shortages increased. Colonial Pipeline Co. told customers and government officials that they would work as quickly as possible to bring the pipeline, which was not physically damaged in any way, back online, but there was no assurance on how quickly that would happen given that they had never before had to shut such a massive pipeline down.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">To restore service and mitigate effects of the hack on the East coast and the entire United States, CEO of Colonial Pipeline Co.,\u00a0Joseph Blount, told the\u00a0<\/span><a href=\"https:\/\/www.wsj.com\/articles\/colonial-pipeline-ceo-tells-why-he-paid-hackers-a-4-4-million-ransom-11621435636\"><span data-contrast=\"none\">Wall Street Journal<\/span><\/a><span data-contrast=\"auto\">\u00a0that he approved the use of $4.4 million to pay the ransom\u00a0and bring the pipeline back online.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">&#8220;I know that&#8217;s a highly controversial decision,&#8221; Blount\u00a0said. &#8220;I didn&#8217;t make it lightly. I will admit that I wasn&#8217;t comfortable seeing money go out the door to people like this. But it was\u00a0the right thing to do for the country&#8221;<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a58791 elementor-widget elementor-widget-image\" data-id=\"2a58791\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/05\/Ransomware1_IST.jpg\" class=\"attachment-large size-large wp-image-1362\" alt=\"Attacked Laptop\" srcset=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/05\/Ransomware1_IST.jpg 800w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/05\/Ransomware1_IST-300x150.jpg 300w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/05\/Ransomware1_IST-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49e0bcc elementor-widget elementor-widget-heading\" data-id=\"49e0bcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What You Can Do <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20b9748 elementor-widget elementor-widget-text-editor\" data-id=\"20b9748\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">This is a single, but serious, example of how ransomware can ultimately affect not just\u00a0a\u00a0business, but\u00a0also\u00a0the\u00a0industries, communities, employees, infrastructures, and customers that the business supports. As a business owner, you cannot ignore the threat of ransomware. It\u2019s essential to equip your business, online applications, and web presence with the latest in cybersecurity. By protecting your network, you protect your business and your customers.\u00a0<\/span><span data-ccp-props=\"{}\"> If you are concerned about your <a href=\"https:\/\/www.is-t.net\/managed-it-services-houston-tx\/network-security\">network security<\/a> get an IT security expert on your side to help.<br \/><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ransomware is growing in popularity as an effective tool for cybercriminals and hackers. This\u00a0style of\u00a0malware encrypts personal or business system\u2019s files, locking the owner out of the system completely. Once activated, the malware makes\u00a0data,\u00a0files, systems, and applications inaccessible. The cybercriminal then demands a ransom in exchange for the restoration of the system. Even if a [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":1361,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[3],"tags":[],"class_list":["post-1359","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-managed-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Latest Ransomware Attacks - Let The Cybersecurity Experts At IS&amp;T Help<\/title>\n<meta name=\"description\" content=\"With ransomware attacks on the rise, the time is now to be proactive. Protect your business, and those that depend on it with industry leading security measures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Latest Ransomware Attacks - Let The Cybersecurity Experts At IS&amp;T Help\" \/>\n<meta property=\"og:description\" content=\"With ransomware attacks on the rise, the time is now to be proactive. Protect your business, and those that depend on it with industry leading security measures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"IS&amp;T Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-03T21:48:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-26T07:21:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/05\/Ransomware2_IST.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Lard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Lard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/latest-ransomware-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/latest-ransomware-attacks\\\/\"},\"author\":{\"name\":\"Scott Lard\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/person\\\/01b75441ccfa116bc0ca0750c112b0fa\"},\"headline\":\"Learn More About Latest Ransomware Attacks\",\"datePublished\":\"2021-06-03T21:48:04+00:00\",\"dateModified\":\"2024-03-26T07:21:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/latest-ransomware-attacks\\\/\"},\"wordCount\":587,\"publisher\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/latest-ransomware-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Ransomware2_IST.jpg\",\"articleSection\":[\"Managed Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/latest-ransomware-attacks\\\/\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/latest-ransomware-attacks\\\/\",\"name\":\"Latest Ransomware Attacks - Let The Cybersecurity Experts At IS&T Help\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/latest-ransomware-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/latest-ransomware-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Ransomware2_IST.jpg\",\"datePublished\":\"2021-06-03T21:48:04+00:00\",\"dateModified\":\"2024-03-26T07:21:29+00:00\",\"description\":\"With ransomware attacks on the rise, the time is now to be proactive. Protect your business, and those that depend on it with industry leading security measures.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/latest-ransomware-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.is-t.net\\\/blog\\\/latest-ransomware-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/latest-ransomware-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Ransomware2_IST.jpg\",\"contentUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/Ransomware2_IST.jpg\",\"width\":800,\"height\":400,\"caption\":\"Fight Ransomware w\\\/ Off Site Data Backups\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/latest-ransomware-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Learn More About Latest Ransomware Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\",\"name\":\"IS&amp;T Blog\",\"description\":\"News for nerds, stuff that matters\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\",\"name\":\"IS&T Consulting Group, LLC\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ist-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ist-logo.png\",\"width\":125,\"height\":47,\"caption\":\"IS&T Consulting Group, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/person\\\/01b75441ccfa116bc0ca0750c112b0fa\",\"name\":\"Scott Lard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"caption\":\"Scott Lard\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Latest Ransomware Attacks - Let The Cybersecurity Experts At IS&T Help","description":"With ransomware attacks on the rise, the time is now to be proactive. Protect your business, and those that depend on it with industry leading security measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Latest Ransomware Attacks - Let The Cybersecurity Experts At IS&T Help","og_description":"With ransomware attacks on the rise, the time is now to be proactive. Protect your business, and those that depend on it with industry leading security measures.","og_url":"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/","og_site_name":"IS&amp;T Blog","article_published_time":"2021-06-03T21:48:04+00:00","article_modified_time":"2024-03-26T07:21:29+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/05\/Ransomware2_IST.jpg","type":"image\/jpeg"}],"author":"Scott Lard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Lard","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/#article","isPartOf":{"@id":"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/"},"author":{"name":"Scott Lard","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/person\/01b75441ccfa116bc0ca0750c112b0fa"},"headline":"Learn More About Latest Ransomware Attacks","datePublished":"2021-06-03T21:48:04+00:00","dateModified":"2024-03-26T07:21:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/"},"wordCount":587,"publisher":{"@id":"https:\/\/www.is-t.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/05\/Ransomware2_IST.jpg","articleSection":["Managed Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/","url":"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/","name":"Latest Ransomware Attacks - Let The Cybersecurity Experts At IS&T Help","isPartOf":{"@id":"https:\/\/www.is-t.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/05\/Ransomware2_IST.jpg","datePublished":"2021-06-03T21:48:04+00:00","dateModified":"2024-03-26T07:21:29+00:00","description":"With ransomware attacks on the rise, the time is now to be proactive. Protect your business, and those that depend on it with industry leading security measures.","breadcrumb":{"@id":"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/#primaryimage","url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/05\/Ransomware2_IST.jpg","contentUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2021\/05\/Ransomware2_IST.jpg","width":800,"height":400,"caption":"Fight Ransomware w\/ Off Site Data Backups"},{"@type":"BreadcrumbList","@id":"https:\/\/www.is-t.net\/blog\/latest-ransomware-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.is-t.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Learn More About Latest Ransomware Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.is-t.net\/blog\/#website","url":"https:\/\/www.is-t.net\/blog\/","name":"IS&amp;T Blog","description":"News for nerds, stuff that matters","publisher":{"@id":"https:\/\/www.is-t.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.is-t.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.is-t.net\/blog\/#organization","name":"IS&T Consulting Group, LLC","url":"https:\/\/www.is-t.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2019\/04\/ist-logo.png","contentUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2019\/04\/ist-logo.png","width":125,"height":47,"caption":"IS&T Consulting Group, LLC"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/person\/01b75441ccfa116bc0ca0750c112b0fa","name":"Scott Lard","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","caption":"Scott Lard"}}]}},"_links":{"self":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/1359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/comments?post=1359"}],"version-history":[{"count":13,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/1359\/revisions"}],"predecessor-version":[{"id":5939,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/1359\/revisions\/5939"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/media\/1361"}],"wp:attachment":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/media?parent=1359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/categories?post=1359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/tags?post=1359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}