New Cyber Threats Pose New Security Realities

New Cyber Threats Pose New Security Realities
John Martines

SOURCE: The Business Guide to Ransomware

When thinking about cybersecurity, it’s not just about “if” your business will be attacked; it’s about “when” it will be attacked. Infection methods are more sophisticated and phishing scams look more realistic. Two of the more recent ransomware attacks serve as valuable evidence.

In May 2017, a phishing scam posed as a Google Docs request. When people clicked a link within the email, the hacker was able to access all their emails and contacts, as well as send and delete emails within accounts. The attack compromised more than 1 million Gmail accounts. PayPal accounts were also targeted with a highly sophisticated phishing scam that asked people to take a selfie while holding credit cards and a form of identification.

Why were these attacks so successful? Because people immediately trusted the emails they received. By leveraging the logos and powerful brand recognition that Google and PayPal have, the creators of these attacks were able to catch people off guard and, in
turn, infect more devices

But perhaps the most destructive ransomware thus far is WannaCry, which also has worm-like capabilities. While most ransomware typically limits infection to the device that clicked and installed it, malware like WannaCry can spread across a network and replicate itself onto other devices.

Once WannaCry infects a device, it finds and encrypts files, displays a “ransom note” and demands bitcoin payment from infected users.

Reports indicate that the ransomware strain has spread to 150 countries, impacting 10,000 organizations, 200,000 individuals and 400,000 machines.

Recently, a new variant of WannaCry has emerged, infecting 3,600 computers per hour. These occurrences reaffirm that cybercriminals are more clever, their targets are larger and their attack methods are more aggressive. We want to help you be prepared in the event ransomware infects your devices and, most importantly, minimize or prevent
critical business data from being stolen.

With attacks like WannaCry dominating media headlines, it’s easy to believe that the cybercriminals that design these viruses have a lot of time and resources. But the truth reveals the contrary:

• Anyone can create a new strain of ransomware within hours.
• Virus protection can only detect existing Ransomware.
• Because new viruses are being developed every day, a virus checker needs to be used in conjunction with File/Folder Continuous Backup to provide the highest level of security.

Technic IT Group, LLC
753 East Drinker Street | Dunmore | PA 18512

4 Reasons CEOs Should Care About BCDR

4 Reasons CEOs Should Care About BCDR

As a proactive CEO, you know that implementing a solid business continuity and disaster recovery (BCDR) plan is essential for…

How to Make Sure Your WiFi Doesn’t Let You Down

How to Make Sure Your WiFi Doesn’t Let You Down

We provide the most complete, simple, and affordable solution for protecting business emails and data in Office 365. As a comprehensive email security suite that filters every inbound and outbound email to stop spam, viruses, data leaks, and malware, we enable you to stay safe, 365 days a year.

Microsoft Windows 7 Upgrade vs. Replacement Checklist

Microsoft Windows 7 Upgrade vs. Replacement Checklist

We provide the most complete, simple, and affordable solution for protecting business emails and data in Office 365. As a comprehensive email security suite that filters every inbound and outbound email to stop spam, viruses, data leaks, and malware, we enable you to stay safe, 365 days a year.

Technic Email Protection + Office 365

Technic Email Protection + Office 365

We provide the most complete, simple, and affordable solution for protecting business emails and data in Office 365. As a comprehensive email security suite that filters every inbound and outbound email to stop spam, viruses, data leaks, and malware, we enable you to stay safe, 365 days a year.

0 Comments

Leave a reply

Your email address will not be published. Required fields are marked *

*