Part 2: A Fictional Integrator, a Cyberattack and Next Steps

When we last saw our intrepid integrator, they were working through some hard choices. Their company had fallen victim to a ransomware attack. They were locked out of all of their files, and the attackers were threatening to put all of their sensitive information on the internet if they didn’t pay a hefty ransom. What […]

Part 2: A Fictional Integrator, a Cyberattack and Next Steps

A (Fictional) Integrator’s Terrible, Horrible, No Good, Very Bad Day

Unless you’ve been shortlisted for a Nobel prize or you’re waiting on the birth of a baby, early morning phone calls are never a good thing. When Joe (the owner of the company that I just made up in my head) got a call from Kate (his equally made-up service manager) at 6:30 a.m., he […]

A (Fictional) Integrator’s Terrible, Horrible, No Good, Very Bad Day

SecuringAV: The Colonial Pipeline Ransomware Cyberattack — Part 2

What motivates a hacker or group of cyberattackers? The answer is typically money. For each column in this series, rAVe writer Paul Konikowski takes a deeper dive into a recent security event or data breach, shedding light on supply chain vulnerabilities, infrastructure and cyber-physical security. The Colonial Pipeline ransomware attack in May of 2021 caused […]

SecuringAV: The Colonial Pipeline Ransomware Cyberattack — Part 2