The True Cost of Ransomware

  • By Dawna M. Roberts
  • Published: Jul 01, 2021
  • Last Updated: Mar 18, 2022

 You can’t open a newspaper or watch the daily news without hearing about another ransomware attack. The ransom figures have skyrocketed in only a few short months from thousands to millions. However, along with the payment of a ransom to safeguard data or unlock files, other hidden costs come with this trendy crime.

Heartland College and Cybersecurity

On October 5, 2020, Heartland Community College in Illinois experienced a cybersecurity attack. The incident locked more than 120 servers on campus and crippled computer systems. In the wake of that attack, the college has taken a hard-lined approach towards cybersecurity but not without paying a hefty price tag.

According to NDRdaily, “In a report to college trustees Tuesday, Heartland officials said the college has “made great strides toward adding to existing security efforts and enhancing those already in place.” Trustees also received the latest accounting of costs related to the attack.

  • $190,000 to implement a new backup system (planned before the attack but moved up).
  • $60,000 additional security enhancements.
  • $250,000 expenses tied to recovery to date (most of which would be reimbursed by insurance).”

President of the college, Keith Cornille, pledges to spend an additional $1 million over the next year to improve the college’s IT systems even further. He implied that it might be an ongoing annual budget item for the foreseeable future.

In a report to board trustees, Cornille noted that,

“For years to come, we’re going to have to constantly think about this as a maintenance of effort just as we do with our heating systems and our other systems throughout the college,” said Cornille. “The key is to be as proactive as we can and mitigate the potential for future attacks through new systems with regard to filters for email systems that catch things quicker. More security with our hardware so we can identify exposures. The idea of working with external partners to continually scan our systems for opportunities that we may be seeing so we can get in there and fix them are all things that we will probably always do.”

Some additional impacts of the incident include creating a full-time cybersecurity position on staff to monitor networks and continually update systems to avoid any further intrusions.

Other changes include regular password resets for both faculty and students. In addition, the college has instituted MFA (multi-factor authentication) when students or staff use email and other resources on the network to prevent any unauthorized access.

Other Hidden Costs of Ransomware Attacks

On the surface, the ransom paid seems like the only cost of ransomware, but there are many other hidden costs as well.

Along with the vast expense of improving cybersecurity systems, hardware, and software, there is also the cost of insurance to protect against future attacks.

Lost time is another huge factor. Depending on the severity of the attack, a company may have to halt operations completely, costing huge profits to evaporate overnight. According to Acronis Security Solutions, “Nearly 3 out of 4 companies infected with ransomware suffer two days or more without access to their files.”

When ransomware affects healthcare organizations, it can even cost lives as healthcare workers struggle to provide care without access to files or equipment.

In the case of Colonial Pipeline and JBS Meats, supply chain interruptions can affect millions of vendors and customers in a variety of adverse ways.

The ransom figure itself has ballooned over the past year, and even smaller organizations typically lose an average of $713,000 per incident in ransom, damages, and clean-up expenses.

As a final warning to even the smallest businesses that believe they are invisible to ransomware gangs is, “71% of companies targeted by ransomware attacks have actually been infected, and half of successful ransomware attacks infect at least 20 computers in the company.”

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Cybersecurity Threats: What You Need to Know About Piggybacking

Cybersecurity Threats: What You Need to Know About Piggybacking

In cybersecurity, piggybacking refers to an unauthorized person gaining access to a restricted area or system by exploiting the access privileges of an authorized user, typically by following them or leveraging their credentials, usually without their knowledge or consent.

What You Need to Know about the Coast Guard Data Breach

What You Need to Know about the Coast Guard Data Breach

The Coast Guard is the only branch of the United States military in the Department of Homeland Security. It enforces federal law, controls the nation's borders and maritime Approaches, and protects the United States ports and waterways.

Mars Hydro Security Flaw Puts IoT Users at Risk

Mars Hydro Security Flaw Puts IoT Users at Risk

Mars Hydro is a leading Chinese brand producing a wide range of Internet of Things (IoT) devices for indoor gardening and the hydroponics industry.

What You Need to Know about the Community Health Center Data Breach

What You Need to Know about the Community Health Center Data Breach

Community Health Center (CHC) is a non-profit founded in 1972 and headquartered in Middletown, Connecticut. It offers a broad range of services, including dentistry, primary care, urgent care, specialty medical services, and behavioral health.

What You Need to Know about the DeepSeek Data Breach

What You Need to Know about the DeepSeek Data Breach

DeepSeek, founded by Liang Wenfeng, is an AI development firm located in Hangzhou, China. The company focuses on developing open source Large Language Models (LLMs) and specializes in data analytics and machine learning.

What is vendor fraud and how to protect your business from vendor fraud

What is vendor fraud and how to protect your business from vendor fraud

Vendor fraud is a type of financial abuse that occurs when fraudsters pose as legitimate businesses to trick companies and individuals into paying for services they'll never receive.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close