Skip to main content
The Mecklenburg County Ransomware Attack -- Four Key Takeaways for Your Breach Readiness Program

The Mecklenburg County Ransomware Attack -- Four Key Takeaways for Your Breach Readiness Program

The scope of ransomware victims continues to rapidly expand beyond individual consumers and into business and Government organizations. This was recently evidenced in early December 2017 by the Mecklenburg County (NC) local Government in which they were the victim of a ransomware attack. The impact of this malicious software attack resulted in Mecklenburg County spending many man-hours and resources to restore their systems to a previously known state. For days and even weeks, County Government Services were unavailable, or at best limited, due to the lack of IT system access while the analysis and resulting phased restoration plan was being deployed. What have we learned from this event and other similar malware incidents? Upon reflection, below are 4 key takeaways from this ransomware attack that can help strengthen your organization’s Breach Readiness Response Program posture.

  1. Establish a contractual relationship with a cyber security consulting firm before a breach occurs. It’s not a matter of if, but when an attack will occur. Be prepared by establishing a contractual relationship with a trusted security firm before a breach occurs. Consider leveraging this relationship to help assess the maturity of your Breach Readiness Response Program.
  2. Increase the frequency of your cyber security awareness training to more than once every 12 months for all employees and contractors. Identify other training and learning opportunities throughout the year to help reinforce end-user cyber security responsibilities for your employees and contractors.
  3. Roll-out a monthly internal marketing campaign that focuses on end-user cyber security responsibilities. Increased messaging helps reinforce and keep end-user cyber security responsibilities top of mind for all employees and contractors throughout the year.
  4. Regularly test critical back-up data and associated media for reliability. A periodic back-up routine should not only include verifying and validating the critical data, but testing the back-up media for overall reliability.

InfusionPoints can help with your cyber security needs leveraging our build -- manage-- defend framework. We can help you build your security program by using industry best practices and best-in-class security controls into your system architecture. We can help manage your people, processes, and technology by simulating real-world threats to determine your level of preparedness in this fight. We can help defend your organization by leveraging our managed security services and 24x7x365 Network and Security Operations Center, VNSOC360. Contact us today to discuss your cyber security concerns.