Cyberattack on Lincoln University

Ransomware continues to ramp up and escalate as one of the major areas of concern for enterprises and businesses worldwide. It is also one of the fastest developing avenues of threat, with an increasingly decentralized and complex system. Thanks to the new Ransomware as a Service model, malware developers are separated from its spread and operations making the attacks both more frequent and harder to stop. At the same time, many industries remain manifestly unprepared for dealing with the challenges a modern cybersecurity environment presents. Last month, as reported by Cybernews, there was a cyberattack on Lincoln University by ransomware.

In combination with the financial difficulties thrust upon them by the COVID pandemic, the impact of the ransomware has been sufficiently severe that the University is forced to close their doors permanently. Other universities have previously suffered similar attacks, with Austin Peay in Tennessee finding themselves temporarily forced to suspend day-to-day operations this April.

Your sensitive data is exposed in a digital environment

Imagine you are in the role of any institution – be it a university or more standard business – in either case, all your important data collected over the years and all the know-how you rely on are digitized. Your payroll, employee or enrollment information, and other sensitive data are in all likelihood shifted online. With employees or students increasingly online in their day-to-day life, your internal systems have a high-risk posture with regards to external threats. And with a high probability, your organization will not have given much priority or investment to security infrastructure. When an attack comes, your most important data are left exposed.

The first and most obvious steps any institution should take to secure themselves against ransomware or other online threats is to make sure they have an archiving system in place; thanks to the presence of an archive, their data can be kept insulated from the effects of an attack and it becomes possible to “roll back” to unaffected versions.

Secure yourselves against online threats with contentACCESS archive and backup

As demonstrated by the cyberattack on Emil Frey, TECH-ARROW has experience in helping our clients ride out cybersecurity breaches with minimal interference on their day-to-day activities. Our contentACCESS archive keeps your data secured and ensures a quick and easy roll-back and continuity of business. Ask right now for a free consultation with our team.


Take the best steps to protect your data – with TECH-ARROW.

Microsoft 365 archive


Source: Cybernews

by Matúš Koronthály