Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Ransomware Cyberattack Struck Atlanta, Georgia

A Ransomware Cyberattack Struck Atlanta, Georgia

Ransomware doesn’t discriminate with its targets, as the city of Atlanta, Georgia now knows so painfully well. The city became the target of a ransomware attack that crippled many of its critical system workflows. The municipal government suffered from one of the most advanced and sustained attacks in recent memory.

The culprits behind the attack, the hacker group SamSam, are known for meticulously selecting targets that they are fairly confident will pay up when faced with a ransomware attack. Even the mayor of Atlanta was intimidated enough by the attack as to compare it to a kidnapping or hostage situation. Access to important data, files, and applications hung in the balance, and the downtime caused by this incident led to considerable trouble for countless government officials and citizens. Technology has become such an integral part of running governments and businesses that even the slightest issue could have echoing repercussions, so you can imagine the shock and horror in the wake of this ransomware attack.

Even more horrific is the ransom demanded by the hackers that exceeded $51,000 in Bitcoin. Ransomware is known for locking down files and waiting for a payment from the victims before unlocking them. This particular strain of ransomware replaces the names of all affected files with the phrase “I’m sorry” and demands that the ransom be paid in a week.

By working with the technicians at Dell SecureWorks, Atlanta is back on its feet, but not without suffering considerably from the ransomware attack. It’s not clear if Atlanta will pay up for the release of its data, and confidentiality agreements mean that Dell SecureWorks will not reveal any information about their relationship to the attack. But one thing is painfully clear in the wake of such destruction: trying to pay the problem away can be just the beginning of ransomware issues.

For example, if you pay a ransomware developer for the safe return of your files, you might be funding further attacks on other victims. This is counter-productive to the security-minded culture of the business environment. Instead, it’s better to take preventative measures such as implementing data backup and disaster recovery, as well as identifying threats before they have a chance to become a problem. If you are ever struck by a ransomware attack, it’s better to reach out to an IT provider before committing to any payments to hackers. It’s better to try just about any alternative before investing in something that isn’t even a guaranteed fix.

To improve network security and enable preventative solutions, reach out to Voyage Technology. Our trained and trusted technicians will work toward ensuring your network is airtight. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 27 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Small Business Microsoft Productivity Managed Service Quick Tips Saving Money Passwords Communication Cybersecurity Data Backup Smartphone Android Upgrade Data Recovery Disaster Recovery AI Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Facebook Miscellaneous Artificial Intelligence Holiday Information Gadgets Cloud Computing Covid-19 Training Compliance Server Remote Work Managed Service Provider IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Blockchain Two-factor Authentication Apps Data Security Mobile Office Vendor Mobile Device Management Gmail Tip of the week WiFi Managed Services Voice over Internet Protocol Chrome Networking Budget Employer-Employee Relationship Apple BYOD App Applications Computing Access Control Information Technology Office 365 Conferencing How To BDR Hacker Avoiding Downtime HIPAA Marketing Health 2FA Risk Management Help Desk Retail Analytics Office Tips Big Data Augmented Reality Healthcare Managed IT Services Storage Password Bring Your Own Device Computers Website Virtual Private Network Router Operating System Windows 11 Paperless Office Infrastructure Firewall Excel Monitoring Document Management The Internet of Things Remote Workers Scam Social Data loss Telephone Free Resource Project Management Customer Service Cooperation Patch Management Windows 7 Save Money Remote Monitoring End of Support Vulnerability Microsoft 365 Vendor Management Going Green Solutions Physical Security Display Printer Cybercrime YouTube User Tip Modem Holidays Processor Cryptocurrency Mobile Security Supply Chain Data Storage Machine Learning Virtual Desktop Safety Video Conferencing Data storage Managed Services Provider LiFi Smart Technology Virtual Machines Professional Services Outlook Maintenance Saving Time Antivirus Money Humor Managed IT Service iPhone Downloads Data Privacy Customer Relationship Management Licensing Vulnerabilities Sports Mouse Entertainment Images 101 Robot Administration Hacking Multi-Factor Authentication Mobility Presentation Telephone System IT Management Cost Management Wireless Technology VPN Meetings Employees Settings Wireless Printing Integration Computer Repair Content Filtering Word Monitors Surveillance Virtual Assistant Username Google Drive Virtual Machine Knowledge Refrigeration Black Friday Small Businesses Displays Reviews Medical IT Websites Database Public Speaking Lithium-ion battery IT Technicians 5G Development Transportation Google Docs Hypervisor Proxy Server Unified Communications Electronic Medical Records Cookies Experience Cyber Monday Outsourcing SharePoint Entrepreneur Shopping Optimization Bitcoin PowerPoint Tactics Running Cable Hotspot Writing Mirgation Workplace Lenovo Google Wallet Employer/Employee Relationships Navigation Virtual Reality Nanotechnology Undo Hiring/Firing PCI DSS Language Gig Economy Paperless Server Management Windows 8 Private Cloud Addiction Laptop Management Chatbots Co-managed IT Internet Service Provider Superfish Drones Teamwork Identity Theft Evernote Twitter Screen Reader Distributed Denial of Service Technology Care Regulations Compliance Computing Infrastructure Business Communications Memes Error Service Level Agreement Halloween Social Engineering Identity Application Scams Net Neutrality SQL Server History Bookmark Remote Computing Smart Tech Hybrid Work Financial Data IBM Alerts Smartwatch Human Resources IT Hacks Download Scary Stories Fun Cables Procurement Azure Tablet Cyber security Browsers Deep Learning Tech Alert Connectivity Break Fix Telework CES Google Apps Communitications Managed IT File Sharing Upload Dark Data Social Network Education How To Multi-Factor Security IT Maintenance Supply Chain Management FinTech Term Notifications IoT Competition Dark Web Business Intelligence Shortcuts IT Assessment Mobile Computing Travel Trends Value Google Maps Customer Resource management Regulations Search Google Calendar Ransmoware Flexibility Techology Organization Data Analysis Best Practice Star Wars Microsoft Excel Vendors Staff Digital Security Cameras User Be Proactive Smart Devices Unified Threat Management Gamification Buisness Memory IT solutions Social Networking Legislation Workforce Remote Working Unified Threat Management Legal Data Breach Fileless Malware Business Growth Google Play Threats Network Congestion IP Address Wearable Technology Videos Workplace Strategies Electronic Health Records Content Wasting Time Health IT Motherboard Cortana Comparison Meta User Error Trend Micro Directions Alt Codes Security Cameras Assessment Permissions Amazon Recovery Software as a Service Point of Sale Downtime Managing Costs Hosted Solution Hard Drives Specifications Outsource IT Environment Media eCommerce Network Management Microchip Typing SSID Tech Support Internet Exlporer Domains Fraud

Blog Archive