The True Cost of Ransomware

  • By Dawna M. Roberts
  • Published: Jul 01, 2021
  • Last Updated: Mar 18, 2022

 You can’t open a newspaper or watch the daily news without hearing about another ransomware attack. The ransom figures have skyrocketed in only a few short months from thousands to millions. However, along with the payment of a ransom to safeguard data or unlock files, other hidden costs come with this trendy crime.

Heartland College and Cybersecurity

On October 5, 2020, Heartland Community College in Illinois experienced a cybersecurity attack. The incident locked more than 120 servers on campus and crippled computer systems. In the wake of that attack, the college has taken a hard-lined approach towards cybersecurity but not without paying a hefty price tag.

According to NDRdaily, “In a report to college trustees Tuesday, Heartland officials said the college has “made great strides toward adding to existing security efforts and enhancing those already in place.” Trustees also received the latest accounting of costs related to the attack.

  • $190,000 to implement a new backup system (planned before the attack but moved up).
  • $60,000 additional security enhancements.
  • $250,000 expenses tied to recovery to date (most of which would be reimbursed by insurance).”

President of the college, Keith Cornille, pledges to spend an additional $1 million over the next year to improve the college’s IT systems even further. He implied that it might be an ongoing annual budget item for the foreseeable future.

In a report to board trustees, Cornille noted that,

“For years to come, we’re going to have to constantly think about this as a maintenance of effort just as we do with our heating systems and our other systems throughout the college,” said Cornille. “The key is to be as proactive as we can and mitigate the potential for future attacks through new systems with regard to filters for email systems that catch things quicker. More security with our hardware so we can identify exposures. The idea of working with external partners to continually scan our systems for opportunities that we may be seeing so we can get in there and fix them are all things that we will probably always do.”

Some additional impacts of the incident include creating a full-time cybersecurity position on staff to monitor networks and continually update systems to avoid any further intrusions.

Other changes include regular password resets for both faculty and students. In addition, the college has instituted MFA (multi-factor authentication) when students or staff use email and other resources on the network to prevent any unauthorized access.

Other Hidden Costs of Ransomware Attacks

On the surface, the ransom paid seems like the only cost of ransomware, but there are many other hidden costs as well.

Along with the vast expense of improving cybersecurity systems, hardware, and software, there is also the cost of insurance to protect against future attacks.

Lost time is another huge factor. Depending on the severity of the attack, a company may have to halt operations completely, costing huge profits to evaporate overnight. According to Acronis Security Solutions, “Nearly 3 out of 4 companies infected with ransomware suffer two days or more without access to their files.”

When ransomware affects healthcare organizations, it can even cost lives as healthcare workers struggle to provide care without access to files or equipment.

In the case of Colonial Pipeline and JBS Meats, supply chain interruptions can affect millions of vendors and customers in a variety of adverse ways.

The ransom figure itself has ballooned over the past year, and even smaller organizations typically lose an average of $713,000 per incident in ransom, damages, and clean-up expenses.

As a final warning to even the smallest businesses that believe they are invisible to ransomware gangs is, “71% of companies targeted by ransomware attacks have actually been infected, and half of successful ransomware attacks infect at least 20 computers in the company.”

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

Google Voice Scams: What They Are and How to Stay Safe

Google Voice Scams: What They Are and How to Stay Safe

Google Voice scams continue to pose a risk for users of this service. Scammers continuously attempt to lure users into divulging their verification PIN code.

What Are Pretexting Attacks: Scam Types and Security Tips?

What Are Pretexting Attacks: Scam Types and Security Tips?

Have you ever received a text from someone you do not know? Did you become alarmed by the message? Did the message contain information about you and the people you know?

What is a Time-based One-time Password (TOTP)?

What is a Time-based One-time Password (TOTP)?

Authentication is the process that verifies the user's identity to control access to resources, prevent unauthorized users from gaining access to the system, and record user activities (to hold them accountable for their activities).

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Notice

By proceeding with this scan, you agree to let IDStrong run a Free Scan of supplied parameters of your personal information and provide free preliminary findings in compliance with our Terms of Use and Privacy Notice. You consent to us using your provided information to complete the Free Scan and compare it against our records and breach databases or sources to provide your Free preliminary findings report.

Rest assured: IDStrong will not share your information with third parties or store your information beyond what is required to perform your scan and share your results.

Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close