Threats from ransomware
Ransomware is malicious software that shuts down or locks personal and corporate computer systems, networks and smartphones until you pay a ransom. It is one of the fastest growing threats that severely damages those it targets.
Your computer can become infected by opening an email or clicking on links with malicious software attached. It can also be hidden on websites or masquerade as applications on peer-to-peer networks. Hackers can attack by issuing invoices or receipts for a payment. They issue an executable that manifests into a form of crypt locker requiring payment to get access to files or systems.
When someone opens the file, the malware installs itself onto the system. It is difficult to detect quickly and spreads like wildfire locking access to files. The hacker provides a text file with a ransom demand to restore access with a time limit to pay. They usually want payment by bitcoin or other untraceable cryptocurrencies. They threaten to destroy encrypted files if not paid on time or double the ransom every few hours. It does not matter who you are as all businesses have files you need to access.
Ransomware has two main types:
- Lockscreen ransomware. Lockscreen ransomware locks you out of your smartphone, files or computer. A message pops up telling you to pay a ransom if you want access to the device.
- Crypto ransomware. Crypto ransomware encrypts your device or files using a random password the hacker generates. It will be impossible to guess and you need to pay the hacker for the password to unlock your device to regain access.
Even if you pay the ransom you are not guaranteed the hacker will restore your files or return access to you. You are better off ignoring the ransom demand, reporting the incident to CERT and getting the help of an expert in cybersecurity. Paying the ransom may even make your devices more vulnerable in the future.
What makes businesses vulnerable to ransomware
The are three main reasons that can make your business vulnerable to a ransomware attack:
- Staff behaviour. How staff use business assets is the biggest threat. They download apps and files, and click on email links without thinking about the consequences.
- Software update installation. It is important to ensure all software updates are installed to prevent hackers taking advantage of software vulnerabilities.
- Regular system and file backups. It is a big mistake not to complete regular backups of files. When there are backups, it protects your business from losing anything. Without them your business risks losing everything. Make sure you keep a backup copy of important files offsite because you will not be able to access them when under a ransomware attack.
Make sure your antivirus is up-to-date to make it more difficult for a hacker to access your system. It is also worth implementing whitelisting policies and restricting staff from downloading software.
Talk to the experts in cybersecurity at Rightsize Technology for further insight into protecting your business from a ransomware attack.
Partnering with an MSP has many advantages. We tailor services to meet individual needs. Talk to us today about managed services for your business.
About Rightsize:
Enabling your business to grow efficiently and effectively – we’re the Rightsize for you.
Small businesses struggle to budget their IT operation and often spend inefficiently with a less than great return on their investment. Rightsize Technology understand: we deliver a minimum 30% reduction on IT overheads as a dedicated outside IT department for our clients. Our unlimited 24×7 support, both on and offsite increases their business productivity and capacity, enabling their business to grow efficiently and effectively – we’re the Rightsize for growing small businesses. Talk to our team today for more information.