<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Ransomware Incident Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/ransomware-incident/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/ransomware-incident/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 24 Jun 2021 13:55:38 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Ransomware Incident Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/ransomware-incident/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 083 HSE Ransomware Update</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-083-hse-ransomware-update/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 01:15:31 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backup Strategy]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Encryption Key]]></category>
		<category><![CDATA[HSE]]></category>
		<category><![CDATA[HSE Ransomware Update]]></category>
		<category><![CDATA[HSE Update]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Ransomware Incident]]></category>
		<category><![CDATA[Ransomware Key]]></category>
		<category><![CDATA[Ransomware Update]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2546</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 83. This week we&#8217;re going to talk about HSE Ransomware Update. This is a quick HSE Ransomware Update At the time of recording, we&#8217;re just one day shy of it being 5 weeks since we learned of the devastating impact of the HSE ransomware incident. To all of those experts that&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-083-hse-ransomware-update/">#WeekendWisdom 083 HSE Ransomware Update</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 83. This week we&#8217;re going to talk about HSE Ransomware Update.</p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2546-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-083-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-083-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-083-lo.mp4</a></video></div>
<h3>This is a quick HSE Ransomware Update</h3>
<p>At the time of recording, we&#8217;re just one day shy of it being 5 weeks since we learned of the devastating impact of the HSE ransomware incident. To all of those experts that were on TV, Radio, Newspapers and other online media who were saying &#8220;Just pay the ransom and we&#8217;ll get back up and running.&#8221;</p>
<p>Here we are 5 weeks later and they&#8217;re still not back up and running. That&#8217;s even with them getting the key to decrypt the data within 3 days of the incident. So even having the key, it&#8217;s taking them so much longer to recover.</p>
<h3>Why is it taking so long?</h3>
<p>This is because the HSE has huge, vast quantities of data that needs to be checked and made sure the integrity is perfect. Because you don&#8217;t want your health records to be damaged in anyway, do you? I certainly wouldn&#8217;t. So they have to be so very careful with getting the data back.</p>
<h3>What hope does a small business owner have?</h3>
<p>For smaller businesses, which is where more my focus would be, things can be a lot simpler. It can be a lot easier for you to be able to recover from these type of ransomware incidents, if you put in place a decent backup strategy. I am happy to talk to any small business owner that needs any kind of assistance in making sure they have good backups in place.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<div class="fl-post-meta fl-post-meta-bottom">
<div class="fl-post-cats-tags">Posted in <a href="https://www.l2cybersecurity.com/category/news/" rel="category tag">News</a> and tagged <a href="https://www.l2cybersecurity.com/tag/securitysimplified/" rel="tag">#SecuritySimplified</a>, <a href="https://www.l2cybersecurity.com/tag/weekendwisdom/" rel="tag">#WeekendWisdom</a>, <a href="https://www.l2cybersecurity.com/tag/cdn/" rel="tag">CDN</a>, <a href="https://www.l2cybersecurity.com/tag/cdn-failure/" rel="tag">CDN Failure</a>, <a href="https://www.l2cybersecurity.com/tag/clare/" rel="tag">Clare</a>, <a href="https://www.l2cybersecurity.com/tag/content-delivery-network/" rel="tag">Content Delivery Network</a>, <a href="https://www.l2cybersecurity.com/tag/cyber-security/" rel="tag">Cyber Security</a>, <a href="https://www.l2cybersecurity.com/tag/fastly/" rel="tag">Fastly</a>, <a href="https://www.l2cybersecurity.com/tag/fastly-cdn/" rel="tag">Fastly CDN</a>, <a href="https://www.l2cybersecurity.com/tag/fastly-failure/" rel="tag">Fastly Failure</a>, <a href="https://www.l2cybersecurity.com/tag/internet-down/" rel="tag">Internet Down</a>, <a href="https://www.l2cybersecurity.com/tag/internet-down-situation/" rel="tag">Internet Down Situation</a>, <a href="https://www.l2cybersecurity.com/tag/limerick/" rel="tag">Limerick</a>, <a href="https://www.l2cybersecurity.com/tag/tipperary/" rel="tag">Tipperary</a></div>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-083-hse-ransomware-update/">#WeekendWisdom 083 HSE Ransomware Update</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-083-lo.mp4" length="30406366" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 034 Ransomware Case Study</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-034-ransomware-case-study/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 25 Jun 2020 23:15:33 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Protection Commission]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR Report]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Ransomware Case Study]]></category>
		<category><![CDATA[Ransomware Incident]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2166</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 34. This week we&#8217;re going to talk about a ransomware case study. Where did this ransomware case study come from? Earlier this week the data protection commission issued a report on the first two years of the GDPR and their regulatory activity within it. It is quite an interesting report for&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-034-ransomware-case-study/">#WeekendWisdom 034 Ransomware Case Study</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 34. This week we&#8217;re going to talk about a ransomware case study.<span id="more-2166"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2166-2" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-034-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-034-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-034-lo.mp4</a></video></div>
<h3>Where did this ransomware case study come from?</h3>
<p>Earlier this week the <a href="https://www.dataprotection.ie/" target="_blank" rel="noopener noreferrer">data protection commission</a> issued <a href="https://www.dataprotection.ie/sites/default/files/uploads/2020-06/DPC%20Ireland%202018-2020%20Regulatory%20Activity%20Under%20GDPR.pdf" target="_blank" rel="noopener noreferrer">a report</a> on the first two years of the GDPR and their regulatory activity within it.</p>
<p>It is quite an interesting report for privacy professionals and I read through it with a great deal of interest. And I came across a case study about a ransomware incident that a sports and leisure company had suffered. It was interesting in that data protection commission had gone back to the company after being told about the breach and they asked for quite a detailed list of items from that company. You can see this list here.</p>
<h3>What did the Data Protection Commission want to know?</h3>
<p>So you can see that they wanted to know:</p>
<ul>
<li>The chronology of the events that led up to the incident.</li>
<li>They wanted a description of the hardware and software that the company used.</li>
<li>What was the source and the attack vector of that ransomware</li>
<li>What was the variant</li>
<li>Was there some audit logs</li>
<li>What was the demand notice for the ransomware</li>
<li>Very important of course, whether there were backups available to recover from and</li>
<li>finally what types of measures that company have put in place to try and prevent this from occurring in the first place</li>
</ul>
<h3>That seems like a lot for a ransomware incident.</h3>
<p>That&#8217;s quite a detailed list of items and if you couldn&#8217;t answer those questions right now in your business, then you need some help. You need to have things like:</p>
<ul>
<li>A data breach handling procedure</li>
<li>Need to have a asset registers for your hardware and software</li>
<li>Your security setup and</li>
<li>Your backups</li>
</ul>
<p>All of these things you need to have those put in place in case this ever happens to you. So feel free to reach out if you need any assistance or advice on that.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training.</p>
<p>We can also provide assistance on implementing mitigation measures to help protect your business from #Ransomware.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-034-ransomware-case-study/">#WeekendWisdom 034 Ransomware Case Study</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/06/WeekendWisdom-034-lo.mp4" length="25023185" type="video/mp4" />

			</item>
	</channel>
</rss>
