It’s 4:30 AM and your cell phone is ringing. It’s your IT Manager. This can’t be good.

    “They’re in.”

Your heart stops, your mouth goes dry, you finally remember to take a breath… All the while you’re being told about the chaos that is happening.

The Timing Won't Be Convenient

Cyber criminals don’t wait for a convenient time. They aren’t going to announce themselves during business hours. In fact, they probably won’t even do it on a weekday. Holidays and in the middle of the night are the most opportune time. Why? Because you aren’t at work.

The days ahead will be very long for your IT staff and leadership. IT will see activity on the network, users in the network, things changing, servers going offline. Everything looks and feels suspect – you don’t trust your machine, you don’t trust your internal communication mechanism (like Microsoft Teams). You don’t know if they have taken your bank info, taken your customer info, have they taken dollars – you won’t know. Constant phone calls and text messages are made to executive cell phones, the company voicemail box, and any other number they can get a hold of – demanding payment. The calls and texts are continuous. It’s scary, it’s confusion, it’s chaotic.

Listen...

In just a mere 7 minutes, Jason Malmquist, Head of CHR's Software and IT, talks about what happens the first few days of being cyberattacked. It's eye-opening.

First Line of Defense: Shut It Down

What’s your first step? Shut it down! Don’t get us wrong, they’ve already been through your files, accessed sensitive data, acquired administrative privileges, but shut the network down immediately! Everything that runs on a server needs to stop.

Your business could easily be the next victim. It’s a question of when, not if. Unfortunately, many businesses remain unaware of the rapidly evolving challenges to keep them safe. Understanding the risks and adhering to best practices are crucial for businesses of all sizes. CHR can help, contact us now – before it’s too late.

Because October is Cybersecurity Awareness Month, we are providing information on what you should expect when you are cyberattacked. Check out our Cyberattack: When It Happens to You resource page to view our cybersecurity white paper and infographic and keep watching and learning.

Subscribe to Our Newsletter!

Sign up with your email address to receive news and updates.

* indicates required