Ransomware Revisited - HUB TechMinutes

HUB TechMinutes

Business technology news, tips and events.

HUB TechMinutes

Better business through better information.
2 minutes reading time (424 words)

Ransomware Revisited

Ransomware Revisited

Ransom: a sum of money is demanded in order for the release of goods.
Software: the programs and other operating information used by a computer.

What do you get when you combine the two? Ransomware. 

Ransomware is a form of a cyberattack in which a cybercriminal encrypts some of the files your business has stored on network-attached drives. Cybercriminals use phishing attacks or other methods to leverage encryption of your business’ devices, and potentially the rest of your network. Ransomware has proven effective over the years due many businesses fulfilling the demands of these cybercriminals - payment. 

Who Ransomware Affects 

Ransomware could affect anybody, but cybercriminals have acquired experience over the years. They are learning who to target, and who is willing to pay a sum of money to acquire their own documents, devices, and servers back. The target of choice? Municipalities. 

While the number of ransomware infections has decreased, the FBI’s Internet Crime Complaint Center has stated that the damages experienced by these infections has risen. This is partly due to the fact that entire cities can essentially be shut down by these cybercriminals. Cities such as Lake City and the City of Riviera Beach, felt as though they had no other option than to pay ransom. Indiana’s LaPorte county paid a ransom of roughly $130,000 in early 2019.  

Since cybercriminals have been strategically targeting municipalities, insurance is offered to cover such attacks. Since insurance is offered to cover these attacks, cybercriminals have been more strategically targeting municipalities. This is a chaotic snowball effect which does not show signs it will be slowing in the near future. The best way to prevent your business from being rolled into this chaotic era of cyberattacks is by being prepared. 

Preparation Is Key

Minimizing the risk of your data being lost to a ransomware attack, starts with a backup plan. Up-to-date backups of your data should be kept isolated, ensuring a cybercriminal cannot gain access. These backups must also be thoroughly tested. The only thing worse than finding out your business has been affected by a ransomware attack, is finding out your business has been affected by a ransomware attack and your backup has failed. 

Education is another key element in preparing for a ransomware attack. Employees must be trained to spot phishy emails to ensure cybercriminals are not able to penetrate your security layers and encrypt your computer, or your server. 

For more help and assistance defending against ransomware, reach out to your local experts at HUB Technology Solutions by calling 204-772-8822 or 1-833-874-0725  today.

Tip of the Week: Reduce Your Costs with Managed IT...
Technology Basics: Virtual Machine

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Guest
Wednesday, August 12, 2020

Captcha Image

Get Updates On Our New Blog Posts!

Book your free introductory consultation now.

Let's Talk

Happy Clients

Don't Miss Our Next Newsletter!

Subscribe to our free monthly newsletter! It's packed with valuable information, useful tips, and important security alerts.
* indicates required
Your email address is secure with us - we never share our subscriber information.

HUB Tech Minutes

11 August 2020
 Recently, HUB team member Andrew Baluta was interviewed by CTV News Winnipeg about the new COVID alert app. Andrew addresses the security concerns that some people are having with this new app.What are your...
11 August 2020
Small businesses have been leaning on cloud computing for a few years now as it presents a lot of options to compete without having to make huge--often unavailable--capital investments in their information systems. Public cloud computing can provide ...
10 August 2020
As people have increasingly shifted to working remotely, the importance of accessible support for their devices has risen substantially. This has led many businesses to use managed IT service providers, or MSPs, like us to provide this kind of suppor...