Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

The culprits behind the attack, the hacker group SamSam, are known for meticulously selecting targets that they are fairly confident will pay up when faced with a ransomware attack. Even the mayor of Atlanta was intimidated enough by the attack as to compare it to a kidnapping or hostage situation. Access to important data, files, and applications hung in the balance, and the downtime caused by this incident led to considerable trouble for countless government officials and citizens. Technology has become such an integral part of running governments and businesses that even the slightest issue could have echoing repercussions, so you can imagine the shock and horror in the wake of this ransomware attack.

Even more horrific is the ransom demanded by the hackers that exceeded $51,000 in Bitcoin. Ransomware is known for locking down files and waiting for a payment from the victims before unlocking them. This particular strain of ransomware replaces the names of all affected files with the phrase “I’m sorry” and demands that the ransom be paid in a week.

By working with the technicians at Dell SecureWorks, Atlanta is back on its feet, but not without suffering considerably from the ransomware attack. It’s not clear if Atlanta will pay up for the release of its data, and confidentiality agreements mean that Dell SecureWorks will not reveal any information about their relationship to the attack. But one thing is painfully clear in the wake of such destruction: trying to pay the problem away can be just the beginning of ransomware issues.

For example, if you pay a ransomware developer for the safe return of your files, you might be funding further attacks on other victims. This is counter-productive to the security-minded culture of the business environment. Instead, it’s better to take preventative measures such as implementing data backup and disaster recovery, as well as identifying threats before they have a chance to become a problem. If you are ever struck by a ransomware attack, it’s better to reach out to an IT provider before committing to any payments to hackers. It’s better to try just about any alternative before investing in something that isn’t even a guaranteed fix.

To improve network security and enable preventative solutions, reach out to Voyage Technology. Our trained and trusted technicians will work toward ensuring your network is airtight. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Information Artificial Intelligence Facebook Miscellaneous Holiday Automation Covid-19 Gadgets Cloud Computing Compliance Training Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Wi-Fi Blockchain Business Technology Vendor Data Security Apps Managed Services Two-factor Authentication Mobile Office Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship Voice over Internet Protocol BYOD HIPAA Applications Managed IT Services How To BDR Conferencing Computing Physical Security Hacker Information Technology Avoiding Downtime Marketing Access Control Office 365 Office Tips Analytics Augmented Reality Router Retail Storage Password Bring Your Own Device Big Data 2FA Help Desk Operating System Healthcare Computers Virtual Private Network Risk Management Website Health Solutions Firewall Document Management The Internet of Things Scam Data loss Windows 11 Social Monitoring Excel Going Green Patch Management Save Money Remote Monitoring Managed IT Service Vulnerability End of Support Remote Workers Vendor Management Customer Service Cybercrime Telephone Display Cooperation Free Resource Printer Project Management Windows 7 Paperless Office Infrastructure Microsoft 365 Outlook Machine Learning Money Humor Employees Integration Safety Maintenance Antivirus Sports User Tip Modem Mobile Security Mouse Processor Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Professional Services Robot Saving Time Virtual Machines Customer Relationship Management Settings Printing Wireless Content Filtering Downloads Hacking IT Management iPhone Presentation VPN YouTube Meetings Licensing Cryptocurrency Vulnerabilities Wireless Technology Entertainment Computer Repair Data Privacy Virtual Desktop Images 101 Data storage LiFi Mobility Telephone System Multi-Factor Authentication Cost Management Word Electronic Medical Records Content Remote Working Wearable Technology Memory Vendors SharePoint Comparison Google Play Be Proactive Refrigeration Halloween Health IT Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Public Speaking Lenovo Writing Directions Videos Virtual Reality Wasting Time Threats Lithium-ion battery Specifications Security Cameras Workplace Strategies Hacks Server Management Entrepreneur Scary Stories Private Cloud Trend Micro Internet Exlporer Software as a Service Fraud Meta Superfish Identity Theft Fun Microchip Twitter Username Managing Costs Amazon Deep Learning Black Friday SSID Undo Error eCommerce Database Surveillance Virtual Assistant Outsource IT Education Social Engineering Remote Computing IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Mobile Computing Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Tablet Search Alert Mirgation Hypervisor Displays Application Best Practice PowerPoint Managed IT Buisness File Sharing Dark Data Shopping Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing IBM Legal IT solutions How To Notifications Management PCI DSS Chatbots Navigation Business Growth Distributed Denial of Service Workplace Travel Gig Economy Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Techology Google Maps Cortana Alt Codes Regulations Compliance Identity Evernote Paperless Smart Tech Memes Co-managed IT Competition Downtime Unified Threat Management Bookmark Download Net Neutrality Alerts SQL Server Technology Care Unified Threat Management Hosted Solution Business Communications Typing Financial Data History Connectivity IT Break Fix Scams Network Congestion Browsers Smartwatch Knowledge Upload Procurement Azure Hybrid Work Google Drive User Error User Multi-Factor Security Tech Human Resources Social Network Telework Cyber security IoT Communitications Dark Web Cables Point of Sale 5G CES Experience Trends Supply Chain Management IP Address Google Docs Unified Communications Google Calendar Term Google Apps Bitcoin Network Management Running Cable Tech Support Customer Resource management FinTech Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Google Wallet Monitors Data Analysis Gamification Flexibility Staff Value Business Intelligence Recovery Legislation Shortcuts Hard Drives Windows 8 Laptop Websites Organization Social Networking Smart Devices Ransmoware Domains Drones Fileless Malware Digital Security Cameras

Blog Archive