Most of us think of summer as a time to relax; we think about our vacations, longer lunches, and extended breaks outside enjoying the weather. Susan (not her real name) thinks about summer a little differently. She remembers it as the season she almost lost her business because of a hacker.
Susan runs a twenty-person CPA firm in Philadelphia. She’s smart, hard-working and successful. She’s a great CPA and pretty good with technology, too.
But, like most small business owners, Susan juggles a lot. Competing priorities = sometimes things get missed. We can all relate to that. In most instances, the missed “thing” won’t cost a fortune to remedy and bring your business to a standstill … but in Susan’s case, that’s exactly what happened.
Although a strong advocate of cloud environments, many of Susan’s employees were still storing and maintaining files internally and on their devices. Her accounting system (QuickBooks) was also resident on an on-premises server, managed in-house. She hired an IT consultant for data protection. He sporadically appeared for mostly break/fix work; and at first glance, this basic support was fine.
Many CPA firms and small businesses’ IT systems look similar to Susan’s:
One day in mid-July, a ransomware virus attacked her firm. Once unleashed, the ransomware virus attacked all files, connected devices and servers on her network and encrypted them.
Encryption technology uses sophisticated mathematical functions to make data inaccessible and unreadable to individuals without the appropriate code or password. ¹ Used justly, encryption technology protects data from thieves. In Susan’s case however, the thieves were using their own encryption technology to block her from accessing her own data.
Users were delivered a red warning screen informing them that their files were encrypted, and to get the files back, they would need to enter a unique code. How to get the code? From the ransomware creator via email or phone number.
And (like the term ‘ransomware’ suggests) she would only get the code after paying a $100 ransom. In Susan’s case, the ransom payment needed to be in Bitcoin. Susan, of course, didn’t have a whole lot of Bitcoin laying around. And even though $100 wasn’t a lot of money for her, she was furious.
Plus, she was concerned about whether paying would truly end the problem. Would he now be able to return anytime he wanted a payday? Would the next ransom be 10x the amount? 100x?
First—Susan asked her IT guy when he had last backed up her data. To her dismay, he hadn’t performed a thorough data backup in months. So, restoring yesterday’s backup on new hardware (while they dealt with the hacker) wouldn’t be an option. Her firm was at a standstill. Her CPAs couldn’t do anything but wait.
So for five grueling days in July, Susan had her IT person try everything. She brought in another consultant. She shelled out a few thousand dollars to avert dealing with the hacker.
The business was at a standstill:
Weeks after the event, she admitted:
“Things were teetering on the brink … I had no options to fix this and a business to run.”
So this is what she did next.
After firing her IT person and her IT consultants, she contacted the team at Right Networks to learn more about their cloud hosting plans. Susan moved all of her files—and even her accounting system, QuickBooks Desktop—to a cloud hosting service.
Now, her data is in the cloud and the latest security software is on every network-connected device. No more self-managed, on-premises server; data is stored in multiple data centers and backed-up nightly. A team of network security experts monitor her company’s activity 24/7/365 (and immediately reports anything suspicious.)
Will the data be 100 percent secured by Susan’s new services? Well, no one cloud hosting or IT service can promise that. To remain secure, every employee and client must exercise caution and continuously educate themselves about the latest cyber threats.
But at the very least, she can take comfort that the people holding onto her data specialize in cloud services, cloud server security and are monitoring for intruders 24/7/365.
“One thing I’ve learned over the years,” she said to me recently. “Is that there are some things I do well and some things that are best left to the experts.”
Today, Susan is back on track. Business is good and the incident is behind her. Susan now even gives talks to her clients on the importance of working in the cloud to stay safe.
Will she ever forget that experience from the Summer of 2017? Not likely. Does she have a new respect for cloud data security? Oh yes.
Join our mailing list and get all of the latest news delivered straight to your inbox.