Posted on 12/14/2019 7:02:07 AM PST by BenLurkin
Phishing attempts and suspicious activity were detected on the city's network around 5 a.m., New Orleans chief information officer Kim LaGrue said during a press conference. By 11 a.m., technician investigators detected "a cybersecurity incident" and the city's information technology department began powering down servers and city computers as a precaution, the New Orleans Office of Homeland Security and Emergency Preparedness said in a series of tweets.
While ransomware was detected, no ransom has been demanded in the cyberattack, Cantrell said.
(Excerpt) Read more at cnn.com ...
It's not like they don't have the money to get things right!
They already put “the money” in their pockets and the pockets of their friends. They essentially have “no” money.
Too many public employees surfing porn on the job maybe.
You actually expect competence from guberment personal?
Theyll blame it on Trump, Kremlin Agent No. 1.
Without any specific knowledge, I’ll wager that a lower-level city associate (employee or contractor) with too much access to the system, opened a link to permit the attack. What is needed is a sandbox scheme that can isolate such attacks. The rewards to the criminals who are almost always offshore are too high to stop these attacks. All it takes is a single weak link!
I think 5 billion was spent on the obamacare website.
Because no matter how much gets spent on improving the software, or how many training sessions and security reminders there are, there is always some idiot who clicks on the link.
Knittnmom has experience with this. She could tell you stories!
They don’t have the brains, either.
Uh-huh.
95% of hacks are the result of human stupidity.
And no amount of money can fix stupid.
State of emergency?
Um, ok?
Just get your IT and HR department to improve your security procedures, and actually communicate that to the grunts.
Blaming the victim for malware is an out dated concept. These days you do not have to open a link to get malware. Legitimate sites become corrupted every day. There could easily be no malfeasance or carelessness at all by an employee or contractor for the city that contributed to this issue.
All over America major road projects have had to be re-done and the crumbling new roads were found to have had far too much gravel and filler in proportion to concrete declared on documents which were not accurate ---with the funds for the missing element going into officials' pockets. "Faulty composition" was deliberate.
How much cybersecurity money drifted away in consultants' bank accounts?
Theres little doubt in my mind that much of that went back into campaign donations.
Sorry, but I'll hold to this because this is still the predominant point of access in these cases. Yes training has reduced the incidence but scammers can be very convincing, that is their profession after all. The one that is most insidious is when the message appears from an identified superior, that is not carelessness nor malfeasance and that is where I agree with you.
My desire is still for segregation (sandbox) of the local nodes. Very complex task to work it out for both safety and efficiency. A worthy job for the Federal Government to do the heavy lifting.
Hackers (and telemarketers) should be hanged in public, incompetent IT security guys should look for other work.
The password should not have been PASSWORD.
Life imitates art.
This was a plot on NCIS NOLA a few weeks ago.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.