Skip to content
11:11 Systems
Rethink Connected
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • Cloud Console
          Cloud Console
          Compliance
          Compliance

      • Column 2
        • Global Regions
          Cloud Regions
          Catalyst
          Planning and Assessment

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      •  
      • Careers
      • Technology Partners
      • Customer Stories
  • Products & Services
    • Products & Services
      • CLOUD
      • Cloud Overview
      • Public Cloud
      • Private Cloud
      • Object Storage
      • Cloud Labs
      • Colocation/Bare-Metal
      • BACKUP
      • Backup Overview
      • Veeam Backup
      • Microsoft 365 Backup
      • Managed Backup for Cohesity
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS for Veeam
      • DRaaS for Zerto
      • DRaaS for Azure
      • Managed Recovery
      • Autopilot
      • Cyber Incident Recovery
      • SECURITY
      • Security Overview
      • Continuous Risk Scanning
      • Managed Detection and Response
      • Managed SIEM
      • Managed EDR
      • Managed Firewall
      • CONNECTIVITY
      • Connectivity Overview
      • SD-WAN
      • Multi-Cloud Connect
      • Managed IP
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Console Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Cloud Console
    • Compliance
    • Cloud Regions
    • Planning and Assessment
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Colocation/Bare-Metal
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • Managed Recovery
    • Autopilot
    • Cyber Incident Recovery
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed Detection and Response
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • CLOUD CONNECTIVITY
    • Connectivity Overview
    • SD-WAN
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact
  • Console Login
  • Free Trial
Author: 11:11 Systems
Date: December 5, 2019

Proof of Life: The Extreme Circumstances That Have Befallen Our State and City Governments

As of January 2022, iland is now 11:11 Systems, a managed infrastructure solutions provider at the forefront of cloud, connectivity, and security. As a legacy iland.com blog post, this article likely contains information that is no longer relevant. For the most up-to-date product information and resources, or if you have further questions, please refer to the 11:11 Systems Success Center or contact us directly.

 
Last month Hannah Murphy wrote a story in the Financial Times about how organizations are having to learn “how to negotiate with hackers.”  The article was fascinating in a number of ways but especially in how ransomware attacks have become so common that we’re actually having conversations about how to talk to hackers.

Murphy’s article covered topics like how to determine “proof of life” for your data but in a slightly more sophisticated way than the 2000-era movie with Meg Ryan and Russell Crowe (not to besmirch the movie; it was a good flick).

It’s hard to believe we’ve reached a point where you need to know how to deal with the thieves that breach your networks and lock up all your data in exchange for currency that very few of us know how to access or use.

The article also introduced a cottage industry of ransomware negotiators and the growth of ransomware insurance providers. It’s a nightmare scenario, especially for state and local governments. It seems a week doesn’t go by without another story of a small city being shut down by a ransomware attack.

State and city governments are more vulnerable than businesses because they lack the money and resources to update their systems and data. City IT professionals have to receive budget approval from their city councils, and their teams are typically small and responsible for supporting almost every aspect of city services.

They’re also prone to falling behind the technology and IT compliance regulations as newer, younger IT-certified professionals gravitate to corporations with higher salaries and benefits. As a result, patches may be delayed and backup systems go unchecked. Hackers know small cities are soft entry points with direct links into federal databanks.

Instead of making investments in IT, some city governments set aside funds to purchase cyber insurance and keep their fingers crossed they never have to use it. That seems like a budget-friendly approach except that using the insurance to pay ransoms doesn’t protect their reputations or prevent their residents’ data from being shared after the handoff is made. In addition, as global insurers begin to feel the pinch from paying out ransoms, they’ll be more selective about who they’ll cover. It’s like State Farm covering your 16-year-old driver after their second or third wreck.

According to an article in ProPublica, cyber insurance sold by domestic and foreign companies has grown into an estimated $7 billion to $8 billion-a-year market in the U.S. The average ransom payment is $36,295 according to Coveware, a firm that helps negotiate and facilitate cyber-ransom payments. The average price for $1 million in liability insurance is $1,500 a year.

When looking at the numbers, it makes more sense to spend about the same or even a little less to build out a cloud backup system with subscription-based services paired with IT and compliance experts.  11:11 Systems works with hundreds of city governments around the world to move their data to the cloud and level the playing field against ransomware attackers to keep their data safe and operations up and running.

We have you covered in all three areas: backup, disaster recovery, and infrastructure. 11:11 DRaaS enables IT workloads to be replicated from virtual or physical environments to a secure cloud infrastructure.  11:11’s Cloud Backup for Veeam Cloud Connect technology offers an easy and cost-effective cloud solution for offsite backup and archives. And 11:11’s Infrastructure as a Service (IaaS) provides a self-service cloud infrastructure built on VMware vCloud and Cisco PoweredTM technology designed to support a variety of workloads, disaster recovery, and compliance needs.

From San Jose, California to Berlin, New Hampshire, we’re helping state and city governments leverage the cloud to protect their data and operations, which is so much easier than establishing proof of life or understanding bitcoin.

Category: RansomwareBy 11:11 SystemsDecember 5, 2019
11:11 Systems

Author: 11:11 Systems

Post navigation

PreviousPrevious post:Holiday Readiness is a Real GiftNextNext post:Geneseo Builds its City Cloud from Scratch with 11:11 Systems

Related Posts

Veeam Innovation Award
And the winner is….
May 17, 2023
11:11 Catalyst
More Risk, No Reward
May 5, 2023
Security Assessment
The security assessment: Why it’s crucial for businesses and how to maximize its benefits
April 5, 2023
Security
You Can’t Win: Learning to Live with Security Pessimism
March 13, 2023
Building a Championship-Caliber Data Security Strategy
February 15, 2023
Veeam 12
Veeam 12 Preview: Multi-Factor Authentication
February 7, 2023
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Connectivity Solutions
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • Twitter
  • Youtube

© 2023 11:11 Systems Inc., All Rights Reserved | Privacy Notice

Go to Top
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information that allows us to process data such as browsing behavior. Not consenting or withdrawing consent, may adversely affect certain features and functions. By clicking Accept, closing this message, or continuing to browse, you consent to these technologies and accept our Privacy Notice.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}

https://1111systems.com/wp-content/uploads/2023/04/HPE-video-for-1111-SKO.mp4

https://1111systems.com/wp-content/uploads/2023/04/Dell-Global-Alliance-video-for-1111-SKO.mp4