The True Cost of Ransomware

  • By Dawna M. Roberts
  • Published: Jul 01, 2021
  • Last Updated: Mar 18, 2022

 You can’t open a newspaper or watch the daily news without hearing about another ransomware attack. The ransom figures have skyrocketed in only a few short months from thousands to millions. However, along with the payment of a ransom to safeguard data or unlock files, other hidden costs come with this trendy crime.

Heartland College and Cybersecurity

On October 5, 2020, Heartland Community College in Illinois experienced a cybersecurity attack. The incident locked more than 120 servers on campus and crippled computer systems. In the wake of that attack, the college has taken a hard-lined approach towards cybersecurity but not without paying a hefty price tag.

According to NDRdaily, “In a report to college trustees Tuesday, Heartland officials said the college has “made great strides toward adding to existing security efforts and enhancing those already in place.” Trustees also received the latest accounting of costs related to the attack.

  • $190,000 to implement a new backup system (planned before the attack but moved up).
  • $60,000 additional security enhancements.
  • $250,000 expenses tied to recovery to date (most of which would be reimbursed by insurance).”

President of the college, Keith Cornille, pledges to spend an additional $1 million over the next year to improve the college’s IT systems even further. He implied that it might be an ongoing annual budget item for the foreseeable future.

In a report to board trustees, Cornille noted that,

“For years to come, we’re going to have to constantly think about this as a maintenance of effort just as we do with our heating systems and our other systems throughout the college,” said Cornille. “The key is to be as proactive as we can and mitigate the potential for future attacks through new systems with regard to filters for email systems that catch things quicker. More security with our hardware so we can identify exposures. The idea of working with external partners to continually scan our systems for opportunities that we may be seeing so we can get in there and fix them are all things that we will probably always do.”

Some additional impacts of the incident include creating a full-time cybersecurity position on staff to monitor networks and continually update systems to avoid any further intrusions.

Other changes include regular password resets for both faculty and students. In addition, the college has instituted MFA (multi-factor authentication) when students or staff use email and other resources on the network to prevent any unauthorized access.

Other Hidden Costs of Ransomware Attacks

On the surface, the ransom paid seems like the only cost of ransomware, but there are many other hidden costs as well.

Along with the vast expense of improving cybersecurity systems, hardware, and software, there is also the cost of insurance to protect against future attacks.

Lost time is another huge factor. Depending on the severity of the attack, a company may have to halt operations completely, costing huge profits to evaporate overnight. According to Acronis Security Solutions, “Nearly 3 out of 4 companies infected with ransomware suffer two days or more without access to their files.”

When ransomware affects healthcare organizations, it can even cost lives as healthcare workers struggle to provide care without access to files or equipment.

In the case of Colonial Pipeline and JBS Meats, supply chain interruptions can affect millions of vendors and customers in a variety of adverse ways.

The ransom figure itself has ballooned over the past year, and even smaller organizations typically lose an average of $713,000 per incident in ransom, damages, and clean-up expenses.

As a final warning to even the smallest businesses that believe they are invisible to ransomware gangs is, “71% of companies targeted by ransomware attacks have actually been infected, and half of successful ransomware attacks infect at least 20 computers in the company.”

About the Author
IDStrong Logo

Related Articles

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagra ... Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named “A ... Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the co ... Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% ... Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that c ... Read More

Latest Articles

How to Recognize and Avoid Publishers Clearing House Scams

How to Recognize and Avoid Publishers Clearing House Scams

The Publishers Clearing House (PCH) appeared in 1967, promoting magazine subscriptions, merchandise, time-share vacations, and their famous cash prize sweepstakes.

What is a Time Theft and How to Prevent It

What is a Time Theft and How to Prevent It

Time theft happens when employees dishonestly use their paid work hours for personal activities or tasks unrelated to work. Time fraud significantly impacts an organization's productivity, business strategy, finances, and employee morale.

What is MLM? What are the red flags of MLM scams?

What is MLM? What are the red flags of MLM scams?

MLM (multi-level marketing) business models are believed to have existed since the 1920s - it is estimated that approximately over 1,000 companies in the US currently use this model.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home.

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk.

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving.

Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close