Call (716) 373-4467
06Aug

The 3 ways criminals infect you with ransomware..

 
There has been a lot in the news over the last few weeks about ransomware attacks and we want to help clarify some things.
 
First, what is a ransomware attack? During a ransomware attack, a criminal gains access to your data and then encrypts it. The data is still there, but you can no longer read it or use it.
 
If you don’t have secured, unaffected backups in place, the most common way to get your data back is to pay a large ransom fee, typically in Bitcoin. (Do you know how much downtime costs your business? Check out our calculator to help determine what your potential recovery costs could be!)
 
Second, what effect can ransomware have on your business? It can be devastating. It can cost your business thousands of dollars to reinstate your data and secure your network even without paying the ransom. It can also cause days of downtime.
 
Third, how do criminals get in? There are typically three ransomware attack methods:
  • Exploit kits: These are used to compromise a website with hidden code in advertisements (known as malvertizing). They secretly redirect you to an unsecure page and download a malicious payload which infects your system.
  • Malicious attachments in email: Often, malicious emails look genuine and appear to be sent by someone you know and trust within your business, a supplier, or even your bank. When you open the attachment, the ransomware is triggered and infects your device.
  • Malicious links in email: You receive a link via email, which infects your device when you click it. These emails also seem to be from a believable source which is why so many people are tricked into clicking them.
The more prepared and protected you are, the better off you will be. Give us a call at 716-373-4467 x 15 or email info@databranch.com to learn more about how our team can help prevent malicious attacks and keep your organization safe!
comments powered by Disqus
2FA AI APC backup business continuity BYOD client of the month cloud computing computer services computer support computer upgrade Computer Upgrades Control Chief covid-19 CryptoLocker CryptoWall Cyber Attacks cyber criminal cyberattack cybercrime cybersecurity Cybersecurity Training Dark Web Monitoring Dark web scan data protection Data-Loss Prevention Databranch Databranch Comprehensive Care databranch cto databranch employees Discounts doug wilson dura-bilt email migration email security End of Support Exchange Online Facebook field technician Hardware Refresh heat-induced server crash holiday computer tips holiday internet tips How Long Do I have to Upgrade my Windows 7 Computers? ID Agent Information Technology Internet Security IT Outsourcing IT Services J.P. Morgan malware managed service managed services Microsoft Microsoft End of Support Microsoft Patching Microsoft Support Microsoft Telephone Scam mike wilson mobile device security Multi-Factor Authentication Network Infrastructure Office 2013 Office 365 old UPS password management password security Penn-Troy Manufacturing Phishing Attacks Power Failure proper server environment Ransomware remote access repeatbusinesssystems SBS2011 security security vulnerabilty Server 2008 Server 2008R2 Server Upgrade server virtualization Small Business Small Business Server 2011 smb SMS intercept Social Media stolen credentials Symantec Symantec Backup Exec temperature Tips Two-Factor Authentication Upgrading to Windows 10 UPS virus Western New York Windows 10 Windows 7 Windows Server 2003 Windows Server 2012 winrar