Smith & Malik*, LLP - Attorneys at Law

WHAT HAPPENED?

  • Cryptolocker virus (ransomware) was downloaded by a user (employee) and infected an individual computer and shared file server

WHAT DATA WAS POTENTIALLY Compromised?

  • Social Security Number, Driver's License or Identification Card Number, Account Number, Credit or Debit Card Number, Medical History, Medical Treatment or Diagnosis, Mental or Physical Condition, Health Insurance Information to include ID Number and Claims History

WHAT WERE THE CONSEQUENCES?

  • Firm sent this data breach notification letter to all clients for whom they had any data stored on the affected systems
  • Firm did not pay ransom to "unlock" the data, and so were unable to recover files from the infected systems
  • Firm paid for TransUnion credit monitoring service for one year for affected customers that opted in
  • Firm hired computer specialist for four weeks to assess attack, determine scope, assist with recovery,  and implement security solutions to help prevent future attacks
  • Estimated cost: $143,857

HOW COULD ARIENTO HAVE HELPED?

A subscription from Ariento could have helped in these ways:

  • Minimum privilege access control policy wouldn't have allowed user to download malware without approval and would have limited spread of malware to other files
  • Managed firewall may have prevented malware download
  • User training & awareness would have educated user on risk of clicking links and/or downloading files and email attachments, potentially preventing incident from occurring
  • File backup service would have enabled firm to recover lost files and return to work quickly

*We have changed the name of the firm involved in this case study in order to protect their identity