SOURCE: The Business Guide to Ransomware
When thinking about cybersecurity, it’s not just about “if” your business will be attacked; it’s about “when” it will be attacked. Infection methods are more sophisticated and phishing scams look more realistic. Two of the more recent ransomware attacks serve as valuable evidence.
In May 2017, a phishing scam posed as a Google Docs request. When people clicked a link within the email, the hacker was able to access all their emails and contacts, as well as send and delete emails within accounts. The attack compromised more than 1 million Gmail accounts. PayPal accounts were also targeted with a highly sophisticated phishing scam that asked people to take a selfie while holding credit cards and a form of identification.
Why were these attacks so successful? Because people immediately trusted the emails they received. By leveraging the logos and powerful brand recognition that Google and PayPal have, the creators of these attacks were able to catch people off guard and, in
turn, infect more devices
But perhaps the most destructive ransomware thus far is WannaCry, which also has worm-like capabilities. While most ransomware typically limits infection to the device that clicked and installed it, malware like WannaCry can spread across a network and replicate itself onto other devices.
Once WannaCry infects a device, it finds and encrypts files, displays a “ransom note” and demands bitcoin payment from infected users.
Reports indicate that the ransomware strain has spread to 150 countries, impacting 10,000 organizations, 200,000 individuals and 400,000 machines.
Recently, a new variant of WannaCry has emerged, infecting 3,600 computers per hour. These occurrences reaffirm that cybercriminals are more clever, their targets are larger and their attack methods are more aggressive. We want to help you be prepared in the event ransomware infects your devices and, most importantly, minimize or prevent
critical business data from being stolen.
With attacks like WannaCry dominating media headlines, it’s easy to believe that the cybercriminals that design these viruses have a lot of time and resources. But the truth reveals the contrary:
• Anyone can create a new strain of ransomware within hours.
• Virus protection can only detect existing Ransomware.
• Because new viruses are being developed every day, a virus checker needs to be used in conjunction with File/Folder Continuous Backup to provide the highest level of security.
Technic IT Group, LLC
753 East Drinker Street | Dunmore | PA 18512
Remote Monitoring and Management that Never Rests
Rain, sleet, and snow. This winter has brought – and continues to bring – that and more. Roads have been…
Clouds: Your Forecast for the 2020s
The word “cloud” floats everywhere in tech talk. From the personal phones and tablets on our coffee tables and nightstands…
Email Security: the Significance of Outbound Threats
It’s common knowledge that online threats are not limited to those posed by fraudulent and malicious websites. Anyone with an…