Ransomware attacks hit over 200 US public sector organizations last year

Ransomware attacks on US public sector organizations have reached an all-time high, with over 200 attacks being reported in the past year alone. The attacks, which involve hackers encrypting the data of a target organization and demanding payment in exchange for the decryption key, have disrupted services and caused significant financial losses for the affected organizations.

One of the most high-profile attacks occurred in July of last year when the city of Baltimore was hit by a ransomware attack that disrupted a range of services, including the city’s email system and online payment portal. The attack resulted in millions of dollars in losses and took months to fully recover from.

Other public sector organizations that were hit by ransomware attacks in the past year include schools, hospitals, and local government agencies. In some cases, the attacks resulted in the temporary shutdown of essential services, causing disruptions for the communities that rely on them.

The increase in ransomware attacks on public sector organizations has raised concerns among cybersecurity experts, who warn that the sector is particularly vulnerable to these types of attacks due to a lack of resources and funding for cybersecurity measures.

In response to the rise in attacks, the US government has released guidelines for public sector organizations on how to prevent and mitigate the impact of ransomware attacks. The guidelines recommend implementing strong passwords, regularly updating software, and regularly backing up data as key measures to protect against ransomware attacks.

Despite these efforts, however, ransomware attacks on public sector organizations are expected to continue, with experts warning that the threat is likely to only increase in the coming years. It is therefore crucial that organizations take the necessary precautions to protect themselves and their communities from these devastating attacks.

Be the first to comment

Leave a Reply

Your email address will not be published.


*