top of page

Ransomware 101

Ransomware attacks are typically carried out using a Trojan, entering a system through, for example, a malicious attachment, embedded link in a Phishing email, or a vulnerability in a network service.

A key element in making ransomware work for the attacker is a convenient payment system that is hard to trace.

As recent as April 2019, a British computer security researcher once hailed as a "hero" for helping stem a devastating ransomware outbreak was later accused of creating malware to attack the banking system. Quote: "CEO of security protocol OpenVPN, says local municipalities are becoming attractive targets for cyber criminals because they know how crucial local government is for the entire city to function."

There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or mailspam, which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites.

There are many types of ransomware, ranging in severity from mildly off-putting to Missile Crisis dangerous. Such as:

Today, over 93% of attacks occur on the endpoint, it needs to be a key focus in securing the data. “Organisations that ignore the endpoint do so at their peril,”

Now is a good time to get smart about protecting your business from ransomware and especially data theft.

  1. Backup your data. Assuming you have backups available

  2. Patch and update your software.

  3. Educate your users on malspam and creating strong passwords

  4. Invest in good cybersecurity technology.

Knowing where to look and what to watch out for is half the battle. “Ransomware isn’t worth it; it’s easier to just come and steal an organisation’s data.”

With the right tools, you can prevent, detect and respond quickly to ransomware attacks threatening your organization.

Contact your solutions architect NOW.

bottom of page