Call (716) 373-4467
06Aug

The 3 ways criminals infect you with ransomware..

 
There has been a lot in the news over the last few weeks about ransomware attacks and we want to help clarify some things.
 
First, what is a ransomware attack? During a ransomware attack, a criminal gains access to your data and then encrypts it. The data is still there, but you can no longer read it or use it.
 
If you don’t have secured, unaffected backups in place, the most common way to get your data back is to pay a large ransom fee, typically in Bitcoin. (Do you know how much downtime costs your business? Check out our calculator to help determine what your potential recovery costs could be!)
 
Second, what effect can ransomware have on your business? It can be devastating. It can cost your business thousands of dollars to reinstate your data and secure your network even without paying the ransom. It can also cause days of downtime.
 
Third, how do criminals get in? There are typically three ransomware attack methods:
  • Exploit kits: These are used to compromise a website with hidden code in advertisements (known as malvertizing). They secretly redirect you to an unsecure page and download a malicious payload which infects your system.
  • Malicious attachments in email: Often, malicious emails look genuine and appear to be sent by someone you know and trust within your business, a supplier, or even your bank. When you open the attachment, the ransomware is triggered and infects your device.
  • Malicious links in email: You receive a link via email, which infects your device when you click it. These emails also seem to be from a believable source which is why so many people are tricked into clicking them.
The more prepared and protected you are, the better off you will be. Give us a call at 716-373-4467 x 15 or email info@databranch.com to learn more about how our team can help prevent malicious attacks and keep your organization safe!
comments powered by Disqus
Administrative Privileges Annual Security Training Anti-Virus Backup and Recovery Breaches business continuity Business Email Compromise Business Phone System BYOD Call Directory Cisco Cloud Infrastructure Cloud Security Cloud Solutions Compromised Credentials computer support Computer Upgrades Conditional Access Cyber Attacks Cyber Criminals Cyber Insurance Cyberattacks cybersecurity Cybersecurity Breach Cybersecurity Training Dark Web Monitoring Data Backup Data Backup Solution Data Breach Data Breaches data protection Data Recovery Device Security Disaster Recovery DNS Filtering doug wilson field technician Foundation Security Gift Card Scams Hackers Hosted VoIP i.t. service provider Internet Explorer IT Compliance IT Policies IT Security IT Services Juice Jacking Local Admin local admin privileges Lost Devices malware managed service provider managed services MFA Microsoft Microsoft 356 Microsoft Office Mobile Devices MSP MSP501 Multi-Factor Authentication New Computer Offboarding Office 365 Outlook Password Manager Password Managers Password Protection password security Passwords Patches Patching PC Performance Penetration Testing Personal Data phishing Phishing Attacks PII Proactive Monitoring Processor productivity Professional Tune-Up Public WiFi RAM Ransomware repeatbusinesssystems Ring Groups Rock-It VoIP RTO Costs Scammers Scams security Security Assessment Security Awareness Training Security Key SLAM Method Smishing SMS Social Media Security Solid-State Drive SSD stolen credentials Storage Teams technology best practices Technology Policies Technology Review Updates virus VoIP Systems VPN Vulnerabilities Vulnerability Assessment Warning Signs Work Computers