Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

Reciprocal Technologies Blog

Reciprocal Technologies has been serving the Indiana area since 2013, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

There Isn’t Much that Is More Devastating than Ransomware

There Isn’t Much that Is More Devastating than Ransomware

Countless high-profile ransomware attacks have surfaced over the past several years, all against targets like manufacturers, pipelines, hospitals, and utility companies. Obviously, these attacks are a cause for concern, but some small businesses might make the mistake of thinking themselves too small to target. Unfortunately, this is simply not the case; we’ll help you protect your business from these devastating cyberattacks.

0 Comments
Continue reading

What the Irish Health Service Disruption Proves About Data Restoration

What the Irish Health Service Disruption Proves About Data Restoration

This past May, Ireland’s Health Service Executive—the organization responsible for providing healthcare and social services to the country’s residents—was successfully targeted by a major ransomware attack. Unfortunately, we are still talking about it now because the entire situation has forced us to acknowledge the aftereffects of such an event.

0 Comments
Continue reading

Meat Packers On the Wrong End of Malware

Meat Packers On the Wrong End of Malware

Once again, ransomware strikes, this time targeting the world’s largest meat processor and distributor, JBS S.A. This disruptive cyberattack forced the company to suspend operations in both North America and Australia, a move which had devastating consequences to the supply chain. What can we learn from this situation?

0 Comments
Continue reading

Colonial Pipeline Ransomware Response Raises Questions

Colonial Pipeline Ransomware Response Raises Questions

As is often the case with ransomware attacks, the situation with the Colonial Pipeline hack has grown more complex as more information regarding the attack has been discovered. Here are some of the major developments that you should keep top of mind in the wake of this devastating ransomware attack.

0 Comments
Continue reading

Cyberattacks are Happening Faster with Less Time for Early Detection

Cyberattacks are Happening Faster with Less Time for Early Detection

In what sounds like a positive shift, cybersecurity experts have announced their research has found that cyberattacks are spending less time on the networks they infiltrate. Unfortunately, this isn’t such a clear-cut positive. Today, we’ll discuss “dwell time” and how less of it is a problem. 

0 Comments
Continue reading

Cybercrime (And Lightning) Have No Problem Striking Twice

Cybercrime (And Lightning) Have No Problem Striking Twice

We’ve become aware of a concerning phenomenon: the perception that a business that has already been targeted by a cyberattack, won’t be attacked again. We here to tell you that this is decidedly not the case—in fact, according to cybersecurity solutions provider Crowdstrike, there’s a 68 percent chance a targeted business will see another attack within a year.

0 Comments
Continue reading

Well-Trained Staff Will Avoid Ransomware

Well-Trained Staff Will Avoid Ransomware

Ransomware has been a real problem for the past several years. This is a result of a shift in the ways hackers approach their craft. Once known for breaching networks directly, the establishment of uncrackable encryption left hackers looking to change their strategies. Today, they use scams to get people to give them access to network resources. If they are successful, it can deliver more than headaches for a business. Let’s look at what makes ransomware so dangerous and how your company can combat the constant attacks that come your way. 

0 Comments
Continue reading

Ransomware Revisited

Ransomware Revisited

Ransom: a sum of money is demanded in order for the release of goods.
Software: the programs and other operating information used by a computer.

What do you get when you combine the two? Ransomware. 

0 Comments
Continue reading

Hackers Target Municipalities and Why That’s a Problem for Your Business

Hackers Target Municipalities and Why That’s a Problem for Your Business

On March 22, 2018, a remote-triggered ransomware called “SamSam” demanded a one-time payment of $51,000 be made to restore the city of Atlanta, Georgia’s, data. Despite an operating budget somewhere in the neighborhood of $625 million, Atlanta’s municipal leaders refused to pay the fine. The “hostage situation” has cost the city over $2 million already with an expected $9.5 million more likely to be spent restoring and re-enforcing the municipality’s network and infrastructure. This doesn’t take into account downtime and the significant amount of data lost in the hack. Whether or not you think it’s a good idea to not pay the ransom, if a whole city - especially one as large as Atlanta - can effectively be crippled by a single hack, you better believe that your business has to get serious about its cybersecurity efforts.

0 Comments
Continue reading

Could Your Business Be a Victim of Targeted Ransomware?

Could Your Business Be a Victim of Targeted Ransomware?

If you were a cybercriminal, what would be your preferred method of launching a ransomware attack? Would you rather create a catch-all threat that could capture as many potential victims as possible, or a calculated approach to land a big one? Despite the proven results of larger ransomware initiatives, most cybercriminals have made the shift to smaller, more targeted attacks against specific companies, and in some cases, individuals.

0 Comments
Continue reading

Ransomware Use Increased By 752% in 2016. Trend Continues in 2017

your_company_vs_ransomware_400

Looking back over the events of 2016, one thing was made very clear by cybercriminals: ransomware is a rising star in their arsenal. In order to continue to remain protected against these threats, it is critical to have a clear understanding of them.

0 Comments
Continue reading

ALERT: Massive Ransomware Attack is the Biggest Ever

ransomeware_5.15

Run your Windows Updates and be very skeptical about opening unsolicited emails. Failure to do so may result in a very dangerous strain of ransomware that could infect your entire network and spread to your clients, partners, and prospects.

Microsoft has even released patches for some older, unsupported versions of Windows to combat the threat that infected PCs all over the world over the weekend.

0 Comments
Continue reading