{"id":102,"date":"2017-05-15T10:25:09","date_gmt":"2017-05-15T09:25:09","guid":{"rendered":"http:\/\/www.edwardsnet.co.uk\/?p=102"},"modified":"2017-05-15T10:25:09","modified_gmt":"2017-05-15T09:25:09","slug":"ransomware-business-cyber-attack","status":"publish","type":"post","link":"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/","title":{"rendered":"Ransomware Business Cyber-Attack"},"content":{"rendered":"<figure style=\"width: 365px\" class=\"wp-caption alignnone\"><img fetchpriority=\"high\" decoding=\"async\" class=\"\" src=\"https:\/\/ichef.bbci.co.uk\/live-experience\/cps\/800\/cpsprodpb\/vivo\/live\/images\/2017\/5\/15\/1051b708-6fd1-413b-ac5c-901428c2494d.jpg\" width=\"365\" height=\"205\" \/><figcaption class=\"wp-caption-text\">Ransomware Attack<\/figcaption><\/figure>\n<p>These kinds of cyber attack are very simple to avoid in business and yet the basics of information security management have been ignored. To get the ball rolling just ask yourself these 2 simple questions:<\/p>\n<ul>\n<li>Why is our business critical\/sensitive information connected to the internet and is it really necessary?<\/li>\n<li>Why are the same computers that are connected to the internet also used to connect to business critical\/sensitive data?<\/li>\n<\/ul>\n<p>Generally speaking the answers to these questions are the root cause of your issues. It&#8217;s as simple as that. The answers are pretty much irrelevant because if your business critical data and\/or sensitive information is connected to the internet, it shouldn&#8217;t be. A prime example of a major security risk here I spotted whilst in A&amp;E recently where I watched a nurse shopping for a new handbag on line using an NHS computer. Ouch! Why do they have internet access anyway &#8230; and on a computer used to access patient\/sensitive data?<\/p>\n<p>This has become a critical issue and yet one that makes CEO&#8217;s and top management within organisations a joke. Simply bacause something in the IT arena is possible does not mean it should be implemented. Just because the top brass say &#8216;we must do it&#8217; does not mean it should be done. Obviously employees do not generally hold the right to question the managements decisions and so they execute their requests. So, this puts the ball of responsibility farely and squarely at the feet of the top management.<\/p>\n<p>The very basic risk assessments are not being carried out or are being ignored and projects are being executed just because the management say it must be done. I have seen this so very often and it is painful to see. Systems are forced into an organisation often with neolithic incompetence.<\/p>\n<p>So, whilst you are blaming attacks such as this latest Ransomware issue on the &#8216;criminals&#8217;, ultimately as CEO, it&#8217;s your fault\/responsibility. Furthermore, as CEO &#8216;exposing&#8217; private sector operational data to the internet, you are offering systems and data to attackers. Should this not be a criminal offense?<\/p>\n<p>In preparation for BREXIT I suggest UK organisations step up their competencies and I don&#8217;t mean with qualifications, common sense, otherwise they are preparing to fail BIG time.<\/p>\n<p><a href=\"http:\/\/www.titanatlas.co.uk\">www.titanatlas.co.uk<\/a> <a href=\"http:\/\/www.edwardsnet.co.uk\">www.edwardsnet.co.uk<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>These kinds of cyber attack are very simple to avoid in business and yet the basics of information security management have been ignored. To get the ball rolling just ask yourself these 2 simple questions: Why is our business critical\/sensitive information connected to the internet and is it really necessary? Why are the same computers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,3],"tags":[],"class_list":["post-102","post","type-post","status-publish","format-standard","hentry","category-computer-news","category-my-views"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware Business Cyber-Attack - Kevin Edwards<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Business Cyber-Attack - Kevin Edwards\" \/>\n<meta property=\"og:description\" content=\"These kinds of cyber attack are very simple to avoid in business and yet the basics of information security management have been ignored. To get the ball rolling just ask yourself these 2 simple questions: Why is our business critical\/sensitive information connected to the internet and is it really necessary? Why are the same computers [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Kevin Edwards\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-15T09:25:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ichef.bbci.co.uk\/live-experience\/cps\/800\/cpsprodpb\/vivo\/live\/images\/2017\/5\/15\/1051b708-6fd1-413b-ac5c-901428c2494d.jpg\" \/>\n<meta name=\"author\" content=\"Content Administrator\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@titanatlascouk\" \/>\n<meta name=\"twitter:site\" content=\"@titanatlascouk\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Content Administrator\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/index.php\\\/ransomware-business-cyber-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/index.php\\\/ransomware-business-cyber-attack\\\/\"},\"author\":{\"name\":\"Content Administrator\",\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/#\\\/schema\\\/person\\\/9a6dceb8410d87c7aa7ab921f11b323c\"},\"headline\":\"Ransomware Business Cyber-Attack\",\"datePublished\":\"2017-05-15T09:25:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/index.php\\\/ransomware-business-cyber-attack\\\/\"},\"wordCount\":403,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/#\\\/schema\\\/person\\\/9a6dceb8410d87c7aa7ab921f11b323c\"},\"image\":{\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/index.php\\\/ransomware-business-cyber-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ichef.bbci.co.uk\\\/live-experience\\\/cps\\\/800\\\/cpsprodpb\\\/vivo\\\/live\\\/images\\\/2017\\\/5\\\/15\\\/1051b708-6fd1-413b-ac5c-901428c2494d.jpg\",\"articleSection\":[\"Computer News\",\"My Views\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/edwardsnet.org\\\/index.php\\\/ransomware-business-cyber-attack\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/index.php\\\/ransomware-business-cyber-attack\\\/\",\"url\":\"https:\\\/\\\/edwardsnet.org\\\/index.php\\\/ransomware-business-cyber-attack\\\/\",\"name\":\"Ransomware Business Cyber-Attack - Kevin Edwards\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/index.php\\\/ransomware-business-cyber-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/index.php\\\/ransomware-business-cyber-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ichef.bbci.co.uk\\\/live-experience\\\/cps\\\/800\\\/cpsprodpb\\\/vivo\\\/live\\\/images\\\/2017\\\/5\\\/15\\\/1051b708-6fd1-413b-ac5c-901428c2494d.jpg\",\"datePublished\":\"2017-05-15T09:25:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/index.php\\\/ransomware-business-cyber-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/edwardsnet.org\\\/index.php\\\/ransomware-business-cyber-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/index.php\\\/ransomware-business-cyber-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ichef.bbci.co.uk\\\/live-experience\\\/cps\\\/800\\\/cpsprodpb\\\/vivo\\\/live\\\/images\\\/2017\\\/5\\\/15\\\/1051b708-6fd1-413b-ac5c-901428c2494d.jpg\",\"contentUrl\":\"https:\\\/\\\/ichef.bbci.co.uk\\\/live-experience\\\/cps\\\/800\\\/cpsprodpb\\\/vivo\\\/live\\\/images\\\/2017\\\/5\\\/15\\\/1051b708-6fd1-413b-ac5c-901428c2494d.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/index.php\\\/ransomware-business-cyber-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/edwardsnet.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Business Cyber-Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/#website\",\"url\":\"https:\\\/\\\/edwardsnet.org\\\/\",\"name\":\"Kevin Edwards\",\"description\":\"Technology &amp; Business Consultant\",\"publisher\":{\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/#\\\/schema\\\/person\\\/9a6dceb8410d87c7aa7ab921f11b323c\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/edwardsnet.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/edwardsnet.org\\\/#\\\/schema\\\/person\\\/9a6dceb8410d87c7aa7ab921f11b323c\",\"name\":\"Content Administrator\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c709a4f3f25e4233689d2827510cfc3c7eea39bc3b35ef86a48b8f98945a2589?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c709a4f3f25e4233689d2827510cfc3c7eea39bc3b35ef86a48b8f98945a2589?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c709a4f3f25e4233689d2827510cfc3c7eea39bc3b35ef86a48b8f98945a2589?s=96&d=identicon&r=g\",\"caption\":\"Content Administrator\"},\"logo\":{\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c709a4f3f25e4233689d2827510cfc3c7eea39bc3b35ef86a48b8f98945a2589?s=96&d=identicon&r=g\"},\"description\":\"Kevin Edwards - Corby, Kettering, Northamptonshire, Freelance IT Consultant and Business Consultant available for contract hire. 30 Years corporate experience of IT and Business scenarios.\",\"sameAs\":[\"https:\\\/\\\/edwardsnet.org\"],\"url\":\"https:\\\/\\\/edwardsnet.org\\\/index.php\\\/author\\\/sysadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Business Cyber-Attack - Kevin Edwards","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/","og_locale":"en_GB","og_type":"article","og_title":"Ransomware Business Cyber-Attack - Kevin Edwards","og_description":"These kinds of cyber attack are very simple to avoid in business and yet the basics of information security management have been ignored. To get the ball rolling just ask yourself these 2 simple questions: Why is our business critical\/sensitive information connected to the internet and is it really necessary? Why are the same computers [&hellip;]","og_url":"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/","og_site_name":"Kevin Edwards","article_published_time":"2017-05-15T09:25:09+00:00","og_image":[{"url":"https:\/\/ichef.bbci.co.uk\/live-experience\/cps\/800\/cpsprodpb\/vivo\/live\/images\/2017\/5\/15\/1051b708-6fd1-413b-ac5c-901428c2494d.jpg","type":"","width":"","height":""}],"author":"Content Administrator","twitter_card":"summary_large_image","twitter_creator":"@titanatlascouk","twitter_site":"@titanatlascouk","twitter_misc":{"Written by":"Content Administrator","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/#article","isPartOf":{"@id":"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/"},"author":{"name":"Content Administrator","@id":"https:\/\/edwardsnet.org\/#\/schema\/person\/9a6dceb8410d87c7aa7ab921f11b323c"},"headline":"Ransomware Business Cyber-Attack","datePublished":"2017-05-15T09:25:09+00:00","mainEntityOfPage":{"@id":"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/"},"wordCount":403,"commentCount":0,"publisher":{"@id":"https:\/\/edwardsnet.org\/#\/schema\/person\/9a6dceb8410d87c7aa7ab921f11b323c"},"image":{"@id":"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/ichef.bbci.co.uk\/live-experience\/cps\/800\/cpsprodpb\/vivo\/live\/images\/2017\/5\/15\/1051b708-6fd1-413b-ac5c-901428c2494d.jpg","articleSection":["Computer News","My Views"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/","url":"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/","name":"Ransomware Business Cyber-Attack - Kevin Edwards","isPartOf":{"@id":"https:\/\/edwardsnet.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/#primaryimage"},"image":{"@id":"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/ichef.bbci.co.uk\/live-experience\/cps\/800\/cpsprodpb\/vivo\/live\/images\/2017\/5\/15\/1051b708-6fd1-413b-ac5c-901428c2494d.jpg","datePublished":"2017-05-15T09:25:09+00:00","breadcrumb":{"@id":"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/#primaryimage","url":"https:\/\/ichef.bbci.co.uk\/live-experience\/cps\/800\/cpsprodpb\/vivo\/live\/images\/2017\/5\/15\/1051b708-6fd1-413b-ac5c-901428c2494d.jpg","contentUrl":"https:\/\/ichef.bbci.co.uk\/live-experience\/cps\/800\/cpsprodpb\/vivo\/live\/images\/2017\/5\/15\/1051b708-6fd1-413b-ac5c-901428c2494d.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/edwardsnet.org\/index.php\/ransomware-business-cyber-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/edwardsnet.org\/"},{"@type":"ListItem","position":2,"name":"Ransomware Business Cyber-Attack"}]},{"@type":"WebSite","@id":"https:\/\/edwardsnet.org\/#website","url":"https:\/\/edwardsnet.org\/","name":"Kevin Edwards","description":"Technology &amp; Business Consultant","publisher":{"@id":"https:\/\/edwardsnet.org\/#\/schema\/person\/9a6dceb8410d87c7aa7ab921f11b323c"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/edwardsnet.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/edwardsnet.org\/#\/schema\/person\/9a6dceb8410d87c7aa7ab921f11b323c","name":"Content Administrator","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/c709a4f3f25e4233689d2827510cfc3c7eea39bc3b35ef86a48b8f98945a2589?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c709a4f3f25e4233689d2827510cfc3c7eea39bc3b35ef86a48b8f98945a2589?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c709a4f3f25e4233689d2827510cfc3c7eea39bc3b35ef86a48b8f98945a2589?s=96&d=identicon&r=g","caption":"Content Administrator"},"logo":{"@id":"https:\/\/secure.gravatar.com\/avatar\/c709a4f3f25e4233689d2827510cfc3c7eea39bc3b35ef86a48b8f98945a2589?s=96&d=identicon&r=g"},"description":"Kevin Edwards - Corby, Kettering, Northamptonshire, Freelance IT Consultant and Business Consultant available for contract hire. 30 Years corporate experience of IT and Business scenarios.","sameAs":["https:\/\/edwardsnet.org"],"url":"https:\/\/edwardsnet.org\/index.php\/author\/sysadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/edwardsnet.org\/index.php\/wp-json\/wp\/v2\/posts\/102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/edwardsnet.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/edwardsnet.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/edwardsnet.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/edwardsnet.org\/index.php\/wp-json\/wp\/v2\/comments?post=102"}],"version-history":[{"count":1,"href":"https:\/\/edwardsnet.org\/index.php\/wp-json\/wp\/v2\/posts\/102\/revisions"}],"predecessor-version":[{"id":103,"href":"https:\/\/edwardsnet.org\/index.php\/wp-json\/wp\/v2\/posts\/102\/revisions\/103"}],"wp:attachment":[{"href":"https:\/\/edwardsnet.org\/index.php\/wp-json\/wp\/v2\/media?parent=102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/edwardsnet.org\/index.php\/wp-json\/wp\/v2\/categories?post=102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/edwardsnet.org\/index.php\/wp-json\/wp\/v2\/tags?post=102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}