Cyber attacks are becoming increasingly common across both the public and private sectors. Cyber criminals use unauthorized access or malicious code to alter computer code, logic, or data resulting in disruptive consequences that can compromise data or misappropriate key systems and resources.
The United States Computer Emergency Response Team (US-CERT) program says a cyber-attack can include, but is not limited to:
- Attempts (either failed or successful) to gain unauthorized access to a system or its data
- Unwanted disruption or denial of service
- The unauthorized use of a system for the processing or storage of data
- Changes to system hardware, firmware or software characteristics without the owner's knowledge, instruction, or consent.
Cyber-attacks can also include the deployment of ransom malware or "ransomware." When a ransomware attack strikes an organization the end goal is not usually to expose personal information. Instead the attackers block access to certain operations or hold servers hostage. The attackers encrypt a number of systems and make them unusable. They also encrypt back-ups which can only be decrypted by a digital "key". In most cases, data theft or transfer is highly unlikely. Instead, it is of far greater benefit to the cyber-attacker to get paid by releasing the digital key.
In the last several years, many organizations - public and private sector - have taken significant steps to strengthen and harden their networks and other digital assets. Despite these wide-reaching efforts, some organizations may still fall victim to a ransomware attack.
When this occurs in a municipality, staff may encounter difficulties accessing and providing information you have requested, administering reservations and bookings, accepting and providing payments, and communicating electronically.
During these incidents, residents should be prepared to speak with municipal staff by phone or in person, expect longer processing times, and follow up on expected payments.
Types of Cyber Attacks
Resources
Information on this webpage is adapted from articles at:
https://www.getcybersafe.gc.ca/cnt/rsrcs/csam-tlkt-en.aspx
https://www.getcybersafe.gc.ca/cnt/rsrcs/nfgrphcs/index-en.aspx