<img src="https://ws.zoominfo.com/pixel/PMY3ZvbpZt27ywWwZSBB" width="1" height="1" style="display: none;">

Production Print & Finishing

Maximize your business potential and open new revenue possibilities with start-to-finish production print and wide format solutions from EO Johnson and Standard Dynamics finishing solutions.

Business Copiers & Printers

You demand multifunction copiers that are easy to use and cost-efficient. With thorough training and prompt service response, you’ll find EO Johnson’s copiers are as dependable as you are.

locknet-dark

Locknet® Managed IT

Locknet® Managed IT offers security, network defense, backup and managed services to help businesses in Wisconsin, Minnesota, and Iowa develop successful technology strategies, whether you’re small to medium sized, regulated, non-regulated, or have little to no IT staff.

Support

With more than 85 technicians throughout our service areas of Wisconsin, Minnesota, and Northern Iowa, we have someone close by to help. The average response time for a technician to arrive at your site is under 4 hours. 

Customer Portal 
Remote Support Portal
decreased_demands_icon
Place a Service Call

For Copier and Printer Service
844.342.5365

For Production Print and Finishing
844.236.7567

EO Johnson Locknet® Managed IT Services
877.408.1656

Software Solutions
844.304.8791

Fill Out a Service Form

Cybercrime’s Top 5 Targeted Industries in 2018

3 min read

hero_angles
Ben Potaracke

Hollywood’s Oscar nominations are out. Cybercrime has its own Oscar nominations—and they’re real nightmares for industries under the hacker lights. The script plots are simple, focus on the industries who can give the highest payouts and don’t worry about who gets hurt.

Five industries need to be on particular security alert this year. Grab the popcorn and check out cybercrimes “Best High Payout Oscar Nomination Picks” for 2018.

Healthcare

Ransomware extortion attempts on the healthcare industry continue to take top billing. It’s insidious because it can, and has, shut down whole systems and put patient care in danger. Other rising bad actors for healthcare are wiper malware or ransomworm viruses ‘masquerading’ as ransomware—destroying total networks, data and service capabilities.

“Ransomware will continue to be a threat and evolve, not to just encrypting data, but also to blackmailing data owners based on the content of the data,” says National Health Information Sharing and Analysis Center President, Denise Anderson.

Financial services

 There’s plenty of ‘dramatic action’ here as financial services firms pit their ramped up security sophistication against cybercriminals targeting their investment records, personal savings information, tax records and other sensitive information. The latest threat is the ‘online wallet’, offering hackers multiple entry points for cyber attacks.

Already this year, the National Cash Register Company (NCR) has sent an advisory to its customers saying it has received reports from the Secret Service and other sources about ‘jackpotting’ hacks against ATMs in the United States. Jackpotting is done by installing malicious software and/or hardware at ATMs that forces the machines to give hackers large amounts of cash on demand. Jackpotting started in Europe and Asia and made its debut in early January here in the U.S.

Businesses

Cybercrime on business operations and online commerce is a ‘cautionary tale’ for any business owner who hasn’t taken security precautions. Half of all cyberattacks will be focused on small to midsize businesses in 2018.

Hackers have ‘cast’ small business as easier cash targets because they often lack adequate cyber-defenses. Payment from ransomware attacks is almost assured. Stolen information can be used for fraud, identify theft, or access to larger enterprises and more massive breach opportunities.

Hackers are count on users making ‘bloopers’ like falling for phishing attacks that will allow a large amount of private information to be sold on the Dark Web. It’s ‘dark comedy’ for hackers. Managed security service providers (MSSP) are working hard to make sure they get the last laugh!

Government Agencies

Movies are good at creating allusions. Often the unintended allusion created about government agencies is that they have unlimited resources for cybersecurity. Yet, they are often the least funded, making them a prime target for hackers.

One of the most despicable threats are the ones aimed at children. In Columbia Falls, Montana a “series of ominous text messages escalated into violent, graphic cyber threats targeting the valley’s schools, students and families,” the Flathead Beacon reported in October of 2017. The threats forced closure of more than 30 schools for three days.

The U.S. Department of Education is warning school districts nationwide to beef up their cybersecurity in response. Tina Rodrique, senior advisor for cybersecurity in the DPI’s Federal Student Aid Office, said the ransom demands relied “on the threat of releasing sensitive data from student records. In some cases, this included threats of violence and shaming or bullying of children unless payment was received.”

Beyond education entities, government bodies have the largest reservoir of personal     data on citizens, including healthcare and tax information. These agencies have multiple options for hacker access and the exploitation can filter into our cities and rural communities. In movie terms, this is a film reel best kept on the cutting room floor!

Transportation

Smart airports, e-enabled aircraft, automated/driverless trains, connected vehicles and self-driving cars—sound like a director’s action flick dream! Industry research shows development of operation technologies is so fast the impact is just being felt now in the transportation sector—and it’s presenting huge problems.

According to a recent report, poor cybersecurity is being applied to or implemented within transportation operation technologies and controls systems—including critical functions like engine and control flight control, electronic positioning systems, chart displays, and navigation systems within aircraft and ships. Most unsettling, many of these systems are using ‘commercial off-the-shelf software’ and are internet connected through Wi-Fi and cellular networks.

 

By now, you’re probably choking on the popcorn! Just remember most great Oscar winning movies end with the ‘good guys’ overpowering the evil doers. There’s no doubt a great battle is being waged in cyberspace and once again, good will overcome evil. Managed security service providers wield their ‘security swords’ every day—and around the clock. It may be time to give an MSSP an audition.

angle_down_right
click_Icon

angle_up_middle

No Comments Yet

Let us know what you think