Invisible tracking pixel for analytics purposes

Cyber Express

cybersecurity lessons for Ohio businesses

What Ohio Businesses Can Learn from the Cuyahoga County CodeRED Cyber Incident

In early December 2025, Cuyahoga County issued a public warning that caught the attention of businesses and residents across Northeast Ohio. The county’s emergency alert system, ReadyNotify, had been compromised in a nationwide cybersecurity incident affecting the third-party CodeRED platform. While no financial data or Social Security numbers were exposed, subscriber information including names, addresses, phone numbers, and email addresses may have been accessed by unauthorized parties.

For Ohio business owners, this incident serves as a stark reminder that cyber threats do not discriminate based on size, sector, or perceived importance. If a platform designed to protect communities during emergencies can fall victim to cybercriminals, no organization is immune. The question is no longer whether your business will face a cyber threat, but when and whether you will be prepared to respond.

Understanding the CodeRED Incident and Its Implications

The CodeRED platform, operated by Crisis24, provides emergency alert services to municipalities across the United States. Cuyahoga County’s Office of Emergency Management learned of the breach on December 2, 2025, although Crisis24 had not yet disclosed the full extent of the security compromise at the time of the county’s announcement.

What makes this incident particularly instructive for Ohio businesses is its origin: a trusted third-party vendor. The county’s own IT systems were not connected to the CodeRED platform, yet subscribers’ data was potentially exposed through no fault of the county itself. This pattern of third-party vulnerability has become increasingly common, with vendors and subcontractors serving as entry points for cybercriminals seeking access to larger networks of personal and business data.

Reports indicate the attack was allegedly carried out by the INC Ransom group, which posted screenshots appearing to show customer credentials. This aligns with a broader trend in ransomware operations, where criminal organizations target service providers to maximize the impact of a single breach. For businesses relying on cloud services, payment processors, or managed IT solutions, the message is clear: your cybersecurity posture is only as strong as the weakest link in your supply chain.

Why Ohio Businesses Should Pay Attention

The Cuyahoga County incident did not occur in isolation. Throughout 2025, Ohio organizations faced an unprecedented wave of cyberattacks. The City of Middletown experienced a cybersecurity incident that paused in-person services for days. West Chester Township suffered two separate attacks in a single month. Union County disclosed a ransomware attack that compromised the personal data of over 45,000 individuals, including Social Security numbers and financial account information.

These incidents share common threads that Ohio IT companies see repeatedly: insufficient monitoring, inadequate backup systems, and gaps in employee training. When the Village of Golf Manor was hit with ransomware that encrypted all computer files and backups, officials faced the difficult decision of whether to pay a ransom for data recovery. In contrast, Trumbull County successfully thwarted an attempted attack by working swiftly with Ohio Homeland Security and cybersecurity response teams. The difference often comes down to preparation and having the right partnerships in place before an incident occurs.

Building a Stronger Cybersecurity Foundation

For small and medium-sized businesses in Ohio, developing robust cyber defenses does not require enterprise-level budgets. It requires strategic thinking, consistent implementation, and often the guidance of a trusted IT partner who understands the local business landscape. Here are three critical areas where proactive measures can make a meaningful difference.

Layered Security and 24/7 Monitoring: Modern cyberattacks rarely announce themselves during business hours. The most sophisticated threats operate quietly, probing for vulnerabilities and exfiltrating data over extended periods. The Kettering Health ransomware attack, for example, involved attackers accessing the network for weeks before deploying their payload. Implementing 24/7 system monitoring and proactive threat detection allows businesses to identify suspicious activity before it escalates into a full breach. This approach combines endpoint protection, network monitoring, and security information management to create multiple barriers against intrusion.

Robust Backup Solutions and Disaster Recovery Planning: When the Village of Golf Manor discovered that ransomware had encrypted not only their primary systems but also their backups, they faced a scenario that keeps IT professionals awake at night. Effective backup strategies involve more than simply copying files to an external drive. They require air-gapped or immutable backups that cannot be accessed through the same network pathways as primary systems, regular testing of restoration procedures, and comprehensive disaster planning and recovery plans that account for various threat scenarios. A well-designed backup solution combined with disaster planning ensures that even if attackers breach your defenses, they cannot hold your data hostage.

Employee Training and Credential Protection: Human error remains the primary vector for successful cyberattacks. Phishing attempts, weak password policies, and mishandling of sensitive data create opportunities that technical controls alone cannot address. Following the CodeRED breach, Cuyahoga County advised subscribers to reset passwords and enable multi-factor authentication, fundamental practices that should already be standard across business operations. Regular employee training transforms your workforce from a vulnerability into a defensive asset, helping staff recognize suspicious communications, understand proper data handling procedures, and maintain the vigilance necessary to protect organizational assets.

The Value of a Local IT Partner

When cyber incidents occur, response time matters. Trumbull County’s successful defense against their attempted breach hinged on swift coordination between local officials, state resources, and cybersecurity experts who could assess the threat in real time. For Ohio businesses, having a relationship with an IT company that understands your operations, your industry, and the specific challenges facing organizations in this region provides advantages that distant support centers cannot replicate.

At Cyber Express, we have served Ohio businesses for over two decades, providing the hands-on support and proactive maintenance that small and medium-sized organizations need to operate securely. Our approach combines the comprehensive IT services of a full-service provider with the responsive, personalized attention that only a local partner can deliver. From implementing layered cybersecurity measures and building reliable server support infrastructure to developing data compliance frameworks and conducting employee training programs, we help businesses throughout the Youngstown area and across Ohio strengthen their defenses against an evolving threat landscape.

Taking the Next Step

The Cuyahoga County CodeRED incident demonstrates that cybersecurity is no longer an optional consideration for organizations of any size. Third-party vulnerabilities, ransomware operations, and credential theft affect municipalities, healthcare systems, and private businesses alike. The question facing Ohio business owners is whether to address these risks proactively or wait until an incident forces their hand.

Ready to evaluate your cybersecurity posture? Contact Cyber Express for a no-obligation consultation and discover how our tailored solutions can help your Ohio business stay protected. Local threats require a local cybersecurity partner, one that understands Ohio businesses and delivers tailored solutions to reduce exposure and strengthen resilience.

cybersecurity lessons for Ohio businesses

cyber express logo

David Stanley

Experienced General Manager with a demonstrated history of working in the information technology and services industry.