RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Tyler Technologies

Company

width=200px

Content

History

2020: Attack of a virus racketeer

At the end of September, 2020 the Tyler Technologies company which delivers IT solutions for the state and local authorities of all states of the USA was attacked by a virus racketeer. Tyler Technologies reports that cyber attack struck only internal systems of the company and did not affect clients.

Tyler Technologies provides complete solutions on data management for more than 15,000 local government agencies in all 50 states of the USA, Canada, Caribbean countries and Australia. The company also sells solutions to the federal government. According to the regulating documentation, for the end of 2019 in the company 5368 employees worked.

The supplier of IT solutions of Tyler Technologies for state agencies of all states of the USA was attacked by a virus racketeer

On Wednesday September 23, 2020 on the homepage of tylertech.com the notification that "the corporate website is temporarily unavailable" appeared. The CIO of Tyler Technologies Matt Bieiri explained later that his command detected illegal penetration into the IT system of the company, disconnected access points to external systems and began investigation.

File:Aquote1.png
We also involved experts in IT security and criminalistics to carrying out the detailed analysis and safe recovery of the damaged equipment. We are ready to implement the improved monitoring systems and notified law enforcement agencies on cyber attack, - Biyeri reported. - We consider that this incident affected only our internal network and a telephone system. Now we have no bases to believe that the virus could affect data of clients, client servers or systems placed out of the company.
File:Aquote2.png

After the attack of the Tyler Technologies virus racketeer joined the long list of large suppliers of corporate IT solutions who in 2020 faced different forms of the malware, such as Cognizant, Conduent, Canon, Xerox and Konica Minolta.[1]

Notes