In light of a cyberattack nearly three weeks ago that continues to disrupt services, the city of Akron is spending $100,000 for protection against malware. And the expense of the attack and recovery is expected to grow exponentially.
The city believes the attack was launched at least in part by a phishing email, and the goal was to transfer city money into fraudulent credit cards. Chief of Staff James Hardy says none of the money left city coffers, but that鈥檚 about the only piece of good news.
鈥淲e caught it immediately, stopped it, and as I鈥檝e been explaining to people, essentially on their way out they decided to set the house on fire with the virus,鈥 Hardy said. 鈥淪o that virus really created the havoc.鈥
That havoc continues to impact emails, the courts, utility and tax bills and scores of other ways the city does business, and full recovery could take another month.
An FBI investigation continues, and federal and state experts recommended the city spend $100,000 to install a secondary malware protection on all 1,200 of its computers. Hardy says the city鈥檚 also trying to track lost productivity and personnel costs, and is going to need a major upgrade of its computer system by the end of the year.
Any upgrade will likely include cloud backup, rather than relying solely on the city鈥檚 servers. Councilman Russ Neel says the city has little choice given the sophistication of hackers.
鈥淚 think it鈥檚 just the nature of the world we live in now. These folks that use technology for doing wrong understand that small municipal governments don鈥檛 have the infrastructure like an IBM, Microsoft, Google or an Amazon. So if they鈥檙e using servers,鈥 Neel said, referring to city IT systems, 鈥渢hey attack them.鈥
Hardy says the recovery is taking so long in part because of the sophistication of the attack and in part because the city doesn鈥檛 want to reintroduce the virus if every computer isn鈥檛 clean.
Investigators believe the attack was to try to siphon money from the city, not to steal identities.
Copyright 2021 90.3 WCPN ideastream. To see more, visit .