Technology has long played a critical role in the work of accountants. Some of the oldest relics of human civilization dating back more than 7,000 years ...

Need a fresh perspective on IT Support in Los Angeles?
We deliver creative solutions to tough problems, without complicated contracts.
Our Los Angeles based team answers all calls live.
Stop worrying and get the IT Support your business needs.
Contact me for a FREE on-site walk through.
Learn moreNeed a fresh perspective on IT Support for your manufacturer, accounting, or distribution business?
We deliver creative solutions to tough problems, without complicated contracts.
Our Los Angeles based team answers all calls live and we respond quickly
Stop worrying and get the IT help your business needs.
Contact me for a FREE on-site walk through.
Learn moreTechnology has long played a critical role in the work of accountants. Some of the oldest relics of human civilization dating back more than 7,000 years ...
An important part of our CyberSAINTTM security platform is our FREE training. All DCG clients enjoy a new training method that you can leverage to better train and prepare your employees for social engineered cyber-attacks. The training is simple and fast, yet covers topics that will keep them safe. Are you onboarding new employees? ‘Get them trained and stay safe with DCG’s CyberSAINT FREE security training.
Contact me for a FREE on-site walk through.
Learn moreWhile there are many similarities among hackers, there are also some key differences among them. Some hackers want money for themselves and resort to ...
DCG exists to help our clients choose, deploy, and manage proven cloud technologies that achieve worry free, always on IT infrastructure. That's why forward thinking, and agile small businesses who need to leverage cloud technology to beat their competitors count on DCG.
Contact me for a free cloud readiness assessment.
Learn moreThe cloud is a rapidly emerging technology that is likely here to stay. Its flexibility allows businesses to mix and match their cloud exposure, keeping ...
Forward thinking, and agile small businesses who need to leverage Information technology to beat their competitors count on DCG. DCG exists to help their clients choose, deploy, and manage proven technologies that achieve worry free, always on IT infrastructure.
START NOWHackers recently stole schematics and data from Quanta Computer, an Apple supplier. This data pertains to products that have not been released. Sadly, the miscreants responsible for this digital attack insist they will sell the stolen information to the group that provides the highest bid unless Quanta and Apple provide a $50 million payment. The hacking group has already released a document cache pertaining to the yet-to-be-released MacBook pros. They even tacked on iMac schematics to boot. Below, our IT support team in Los Angeles provides a look at this hack.
Read more: IT Support in Los Angeles: Why You Should Never Make a Ransomware Payment
It appears as though the ransomware hack of Quanta/Apple is a sign of things to come. The criminals behind ransomware have refined their encryption techniques for mass data to lock users out of their systems. Extortion and the theft of data are central to digital attacks. These attacks and subsequent ransom payments are likely to worsen in the future. Sadly, Apple might have to buy back its own data to prevent its sale on the black market.
It was not long ago when ransomware attacks primarily involved encrypting a target’s files and demanding a ransom payment for access to the decryption key. Some digital miscreants encrypted files after stealing them and threatening to leak them. This means even if the target recovered its information from backups, there would be the potential for secrets to be shared on the web.
Keep reading: IT Support in Los Angeles: Determining If You Should Pay the Ransom for Ransomware
The Apple attack involved pilfering data and extorting the company without encrypting the files. It is quite possible data encryption will be used less frequently in these attacks as time progresses. As long as the data is stolen, it has the potential to damage the target regardless of encryption, making the assistance of IT support experts in Los Angeles all the more important.
One would assume Apple would take the threat of its data being leaked quite seriously. This is precisely why Apple and other businesses targeted in ransomware attacks will consider paying 7-figure ransoms. It is clear every business is at risk, regardless of its size or niche. In fact, some ransoms following these digital attacks have been paid in secret, meaning the threat is even greater than most assume.
Keep on reading: IT Consulting in Los Angeles: How Endpoint Security Works
If Apple ponies up the ransom and other companies follow suit after their data is stolen, ransomware attacks will only continue to increase.
DCG Technical Solutions can help your business avoid ransomware attacks and other digital challenges. Lean on us for tech guidance, and your organization’s digital security and efficiency will improve. Contact us now to schedule an initial consultation and to learn more about our IT support services in Los Angeles.