Skip to content
11:11 Systems
The Resilient Cloud Platform
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • 11:11 Systems Consulting
          Consulting Services
          Global Regions
          Cloud Regions
          11:11 Systems Security
          Security

      • Column 2
        • Cloud Console
          Cloud Console
          Catalyst
          Planning and Assessment
          Compliance
          Compliance

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      • ESG Program
      •  
      • Careers
      • Technology Partners
      • Customer Stories
      • Innovation Blog
  • Products & Services
    • Products & Services

        • Cloud Overview
        • Managed Public Cloud
        • Private Cloud
        • Object Storage
        • Cloud Labs
        • Flexible Cloud Environment/Colocation
        • AWS Solutions
        • Managed OS Services
        • Managed DB Services

        Infrastructure as a Service

        Take a 30-day free trial of 11:11 Cloud.

        Cloud hosting built for your business.
        START FREE TRIAL
        REQUEST A QUOTE

        • Backup Overview
        • Veeam Backup
        • Microsoft 365 Backup
        • Managed Backup for Cohesity
        • Cyber Vault
        • Data Protection Services
        Backup as a Service

        11:11 Cloud Backup

        Protect your data wherever it lives.
        REQUEST A QUOTE
        REQUEST A DEMO

        • DRaaS Overview
        • DRaaS for Veeam
        • DRaaS for Zerto
        • DRaaS for Azure
        • DRaaS for Cohesity
        • Managed Recovery
        • Cloud Recovery
        • Cyber Recovery Platform
        • Infrastructure Recovery
        • Continuity Consulting Services
        • Disaster Recovery Consulting
        Disaster Recovery

        5TB 30Day Free Trial of DRaaS for Veeam

        Protect your business-critical workloads and reduce recovery time with the Leader in Disaster Recovery.
        START FREE TRIAL
        LEARN MORE

        • Security Overview
        • Continuous Risk Scanning
        • Managed Detection and Response
        • Managed SIEM
        • Managed EDR
        • Managed Firewall
        • Application and Zero Trust Services
        Security Services

        Take the first steps toward cyber resilience.

        Download our white paper and learn how to stay ahead of threats.
        REQUEST A QUOTE
        DOWNLOAD NOW

        • Networking Overview
        • SD-WAN
        • Managed Connectivity for AWS Direct Connect
        • Multi-Cloud Connect
        • Network Consulting Services
        Connectivity Services

        Transform your network.

        Take your infrastructure and performance to the next level.
        REQUEST A QUOTE
        WATCH VIDEO
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
    • Solutions Business Objective Submenu
      • BUSINESS OBJECTIVE
      • Cyber Resilience
      • Modernize
      • Protect
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Consulting Services
    • Cloud Console
    • Cloud Regions
    • Planning and Assessment
    • Security
    • Compliance
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • ESG Program
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Managed Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Flexible Cloud Environment/Colocation
    • AWS Solutions
    • Managed OS Services
    • Managed DB Services
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • Cyber Vault
    • Data Protection Services
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • DRaaS for Cohesity
    • Managed Recovery
    • Cloud Recovery
    • Cyber Recovery Platform
    • Infrastructure Recovery Services
    • Continuity Consulting
    • Disaster Recovery Consulting
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed Detection and Response
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • Application and Zero Trust Services
    • NETWORK
    • Network Overview
    • SD-WAN
    • Managed Connectivity for AWS Direct Connect
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • BUSINESS OBJECTIVE
    • Cyber Resilience
    • Modernize
    • Protect
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Product Documentation
    • API Documentation
  • Contact
  • Login
  • Free Trial
Tags: CybercrimeManaged Security Servicessecuritycyber threatsData ProtectionDisaster RecoveryRansomware
Author: Scott Gray
Date: September 18, 2023

As MGM Struggles Amid Ransomware Fallout, Data Recovery Lessons Abound

Picture this: Your IT infrastructure is breached by a nefarious actor, who then encrypts critical data and holds your organization hostage until a ransom is paid. Far from hypothetical, this is exactly what happened to multi-billion-dollar casino operator MGM Resorts International last week when hit with a ransomware attack – the latest in a string of large-scale, high-profile cyber security incidents.

The attack, which occurred on Sept. 10 and sent shockwaves throughout the company and around the world, caused disruptions across MGM’s computer systems and operations. It wreaked havoc on gaming machines, online room bookings, digital keys, card payments, and customer accounts. All told, the hackers claim to have stolen 6 terabytes of data from MGM and Caesars Entertainment, which also reported breaches, including the social security and driver’s license numbers of a significant number of casino loyalty program members.

In the aftermath, local law enforcement as well as the FBI were brought in to investigate and, while a ransom was demanded in exchange for restoring the data and systems, it remains unclear if MGM has agreed to pay up. The casino giant is reportedly collaborating with external experts to get operations and systems back online, which, over a week later, is still a work in progress. Yikes.

Now, here’s real the kicker: The entire breach unraveled over a simple 10-minute phone call.

According to both Yahoo News and  Gizmodo, the hacker group known as ALPHV or BlackCat carried out the attack, bringing MGM to its knees using only social engineering, including information it found on LinkedIn and a well-placed call to the casino’s helpdesk.

“A company valued at $33.9 billion was defeated by a 10-minute conversation,” vx-underground, a well-known malware archiving organization, wrote on X (formerly Twitter).

 

Reckoning with Ransomware

Targeted ransomware attacks, like the one against MGM, continue to skyrocket around the world, striking a business or consumer every 11 seconds, according to Cybersecurity Ventures. By 2031, that rate is expected to increase to one attack every two seconds with global ransomware damages predicted to hit a staggering $265 billion. That amounts to nearly $245 billion lost over the next decade, an increase of 30 percent year over year.

At 11:11 Systems, we know that recovering from a data-compromising cyberattack requires planning, investment, capabilities, procedures, and more. We also understand how important it is for organizations to recognize the difference between traditional disaster recovery (in response to incidents such as hardware failure, wildfires, earthquakes, and other extreme weather conditions) and compromised data recovery (in the event of a cybersecurity incident).

We are here to help educate the market in understanding their own capabilities to get back to “business as usual” after an attack. An interruption to operations caused by a cyberattack can cost businesses an enormous amount both financially and reputationally.

In an interview with Las Vegas 8 News Now, Dante Orsini, chief strategy officer at 11:11 Systems, shared some valuable insights, namely, how organizations should respond and recover in the event of an attack.

“What we see most commonly these days are bad actors trying to infiltrate organizations, digging deep and wide into the system, encrypting data, and locking out parent companies,” Orsini said. “Right now, it’s all hands on deck [at MGM] to stabilize all those systems, find the best copy of the data, and restore business operations. Then they’ll go back and do the forensics process to figure out exactly how someone compromised their infrastructure.”

 

11:11 Systems Chief Strategy Officer Dante Orsini interviewed by local Las Vegas TV station

WATCH VIDEO

 

Ransomware: Response and Recovery

With both the frequency and sophistication of ransomware attacks on the rise, organizations must find ways to fortify themselves against such nightmare scenarios and significantly diminish their exposure to risk.

To navigate today’s landscape of heightened cyber threats, you must embrace a multi-disciplinary, multi-layered approach, marked by continuous diligence, comprehensive training, and strategic investments. In doing so, you’ll be prepared to minimize business interruptions in the face of a cyber event and shield your company from becoming the next alarming cyberattack headline.

In this article, Disaster Recovery Journal highlights a few simple, proactive measures any organization can take to fortify its defenses against cyber threats. For example:

    • Secure access controls like the use of strong passwords and multi-factor authentication.
    • Keep your software and hardware up to date.
    • Thorough data security, backing up your data, storing it offline or in the cloud.
    • Comprehensive employee training about phishing and other cyber threats.
    • Constant vulnerability management using tools such as continuous risk scanning.
    • Regularly tested incident response plans to understand and test plans to restore systems and data with business continuity being the primary objective.
    • Robust network security with multi-layered tools like firewalls, antivirus software, and other managed security measures focused on event management and mitigation.

By following this guidance, you will quickly improve and fortify your organization’s cyber defenses. While robust security measures require upfront costs, these expenses are minimal compared to the potential damage to your organization’s data and reputation. Remember, cybersecurity is not solely an IT concern; it’s an organizational imperative. Taking proactive steps today can be the key to ensuring your company remains resilient and avoids becoming the next headline in the ransomware saga. Stay vigilant, stay secure, and protect what matters most – your organization’s future.

 

To dive deeper into 11:11’s suite of managed security solutions, and ransomware insights check out the resources below.

    • How to Stay Out of the Headlines – Protect Your IT Data From Ransomware
    • Disaster Recovery: The Budget Item You Cannot Afford to Cut
    • Cyber Incident Recovery
    • Managed Security Services
Categories: Cybercrime, DRaaS, Ransomware, Security, UncategorizedBy Scott GraySeptember 18, 2023
Tags: CybercrimeManaged Security Servicessecuritycyber threatsData ProtectionDisaster RecoveryRansomware

Author: Scott Gray

Scott Gray is a Product Marketing Manager at 11:11 Systems focused on managed security where he helps create product messaging and communications. As a "product guy" at heart, Scott has over 30 years of experience working in the IT and Consumer Electronics industries. Before joining 11:11 Systems Scott held roles at Compaq, Dell, HP, Panasonic, and Sharp in a variety of product management and product marketing roles. Scott graduated with a master's degree in International Business from Roosevelt University and also holds an undergraduate degree in Marketing from Oklahoma State University. Scott enjoys spending time with his family and is an avid sports fan.

Post navigation

PreviousPrevious post:Best in ClassNextNext post:As MGM Struggles Amid Ransomware Fallout, Data Recovery Lessons Abound – Part 2

Related Posts

Better Network Visibility with New 11:11 Cloud Console Tools
August 21, 2025
Digital Operational Resilience Act (DORA)
Helping the Financial Sector Deliver Secure and Modern Infrastructure through Regulation
July 10, 2025
HPE Zerto Names 11:11 Systems Global Partner of the Year for 2024
HPE Zerto Names 11:11 Global Partner of the Year
June 26, 2025
vulnerability management
A Modern Approach to Managing Vulnerabilities
May 30, 2025
Cyber Resilience
Data Protection vs. Cyber Resilience: Mastering Both in the Complex World of Gambling
May 27, 2025
ransomware attack, worst day
The Remedy Against Ransomware: Insights from Our April 2025 Webinar
May 19, 2025
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Network as a Service
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • X
  • Youtube

© 2025 11:11 Systems Inc., All Rights Reserved | Privacy Notice | Website Terms of Use |

Go to Top